default search action
10th WISTP 2016: Heraklion, Greece
- Sara Foresti, Javier López:
Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Lecture Notes in Computer Science 9895, Springer 2016, ISBN 978-3-319-45930-1
Authentication and Key Management
- Frank Morgner, Paul Bastian, Marc Fischlin:
Securing Transactions with the eIDAS Protocols. 3-18 - Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY. 19-34 - Vlasta Stavova, Vashek Matyas, Mike Just:
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms. 35-50
Secure Hardware Systems
- Jan Tobias Mühlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, Frank Piessens:
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures. 53-69 - Vassilios G. Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis:
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments. 70-84 - Kyriakos Stefanidis, Artemios G. Voyiatzis:
An HMM-Based Anomaly Detection Approach for SCADA Systems. 85-99
Attacks to Software and Network Systems
- Ishai Rosenberg, Ehud Gudes:
Attacking and Defending Dynamic Analysis System-Calls Based IDS. 103-119 - Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy:
Towards Automatic Risk Analysis and Mitigation of Software Applications. 120-135 - Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet:
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. 136-152 - Guillaume Barbu, Alberto Battistello:
Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks. 153-168
Access Control and Data Protection
- Leila Bahri, Barbara Carminati, Elena Ferrari, William Lucia:
LAMP - Label-Based Access-Control for More Privacy in Online Social Networks. 171-186 - Ling Chen, Ting Yu, Rada Chirkova:
Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data. 187-203 - Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust:
Fault-Channel Watermarks. 204-219
Short Papers
- Ahmad Sabouri:
The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs - An Empirical Experiment. 223-235 - Hervé Chabanne, Julien Keuffer, Roch Lescuyer:
Delegating Biometric Authentication with the Sumcheck Protocol. 236-244 - Fatma Al Maqbali, Chris J. Mitchell:
Password Generators: Old Ideas and New. 245-253 - Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos:
Provable Network Activity for Protecting Users Against False Accusation. 254-261 - Madeline Cheah, Siraj A. Shaikh, Jeremy W. Bryans, Hoang Nga Nguyen:
Combining Third Party Components Securely in Automotive Systems. 262-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.