


default search action
STM 2013: Egham, UK
- Rafael Accorsi, Silvio Ranise
:
Security and Trust Management - 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings. Lecture Notes in Computer Science 8203, Springer 2013, ISBN 978-3-642-41097-0
Privacy
- Costas Delakouridis, Christos Anagnostopoulos
:
On Enhancement of 'Share The Secret' Scheme for Location Privacy. 1-16 - Peeter Laud
, Alisa Pankova:
New Attacks against Transformation-Based Privacy-Preserving Linear Programming. 17-32 - Ryan D. Riley
, Chris Clifton, Qutaibah M. Malluhi:
Maintaining Database Anonymity in the Presence of Queries. 33-48
Network, Web, and Mobile Security
- Alessandra De Benedictis
, Behzad Koosha, Massimiliano Albanese
, Valentina Casola
:
A Probabilistic Framework for Distributed Localization of Attackers in MANETs. 49-64 - Mauro Conti
, Nicola Dragoni
, Sebastiano Gottardo:
MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities. 65-81 - Alexios Mylonas
, Nikolaos Tsalis, Dimitris Gritzalis:
Evaluating the Manageability of Web Browsers Controls. 82-98
Security Protocols
- Marco Rocchetto, Luca Viganò, Marco Volpe, Giacomo Dalle Vedove:
Using Interpolation for the Verification of Security Protocols. 99-114 - Lil María Rodríguez-Henríquez
, Debrup Chakraborty
:
RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases. 115-130
Security Policies and Trust Management
- Ana Ferreira
, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas:
Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names. 131-143 - Yannis Mallios, Lujo Bauer
, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset:
Probabilistic Cost Enforcement of Security Policies. 144-159 - Nik Sultana, Moritz Y. Becker, Markulf Kohlweiss
:
Selective Disclosure in Datalog-Based Trust Management. 160-175
Business Process Security
- Thomas G. Koslowski, Christian Zimmermann:
Towards a Detective Approach to Process-Centered Resilience. 176-190 - Thomas Stocker, Frank Böhr:
IF-Net: A Meta-Model for Security-Oriented Process Specification. 191-206
Watermarking for Security
- Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation. 207-222 - Marco Botta, Davide Cavagnino, Victor Pomponiu:
Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain. 223-234

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.