


default search action
8. FPS 2015: Clermont-Ferrand, France
- Joaquín García-Alfaro

, Evangelos Kranakis, Guillaume Bonfante:
Foundations and Practice of Security - 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9482, Springer 2016, ISBN 978-3-319-30302-4
Keynote Talks
- Evangelos Kranakis

, Danny Krizanc:
Optimization Problems in Infrastructure Security. 3-13 - Geoffroy Couteau

, Thomas Peters, David Pointcheval
:
Secure Distributed Computation on Private Inputs. 14-26
RFID, Sensors and Secure Computation
- Agnès Brelurut, David Gérault, Pascal Lafourcade

:
Survey of Distance Bounding Protocols and Threats. 29-49 - Pascal Bissig, Philipp Brandes, Jonas Passerini, Roger Wattenhofer:

Inferring Touch from Motion in Real World Data. 50-65 - Toomas Krips, Jan Willemson:

Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation. 66-82
Security Policies and Biometrics
- Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:

Security Mechanisms Planning to Enforce Security Policies. 85-101 - Raphaël Khoury, Sylvain Hallé

:
Runtime Enforcement with Partial Control. 102-116 - Masaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada, Takashi Shinzaki, Takeshi Koshiba

:
Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes. 117-133
Evaluation of Protocols and Obfuscation Security
- Pascal Lafourcade

, Maxime Puys
:
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties. 137-155 - Paolo Modesti

:
AnBx: Automatic Generation and Verification of Security Protocols Implementations. 156-173 - Rabih Mohsen, Alexandre Miranda Pinto:

Evaluating Obfuscation Security: A Quantitative Approach. 174-192
Spam Emails, Botnets and Malware
- Mina Sheikhalishahi, Andrea Saracino

, Mohamed Mejri, Nadia Tawbi
, Fabio Martinelli:
Fast and Effective Clustering of Spam Emails Based on Structural Similarity. 195-211 - Fariba Haddadi, Nur Zincir-Heywood

:
A Closer Look at the HTTP and P2P Based Botnets from a Detector's Perspective. 212-228 - Minh Hai Nguyen, Mizuhito Ogawa, Quan Thanh Tho:

Obfuscation Code Localization Based on CFG Generation of Malware. 229-247
Short Papers
- Sylvain Hallé

, Raphaël Khoury:
Runtime Monitoring of Stream Logic Formulae. 251-258 - Fabio Bellini, Roberto Chiodi, Isabella Mastroeni

:
MIME: A Formal Approach to (Android) Emulation Malware Analysis. 259-267 - Erik Bergström

, Rose-Mharie Åhlfeldt:
Information Classification Enablers. 268-276 - Meriam Ben-Ghorbel-Talbi, François Lesueur, Gaetan Perrin:

Information Flow Control on a Multi-paradigm Web Application for SQL Injection Prevention. 277-285 - Tim Waage, Ramaninder Singh Jhajj, Lena Wiese

:
Searchable Encryption in Apache Cassandra. 286-293 - François Gagnon, Marc-Antoine Ferland, Marc-Antoine Fortier, Simon Desloges, Jonathan Ouellet, Catherine Boileau:

AndroSSL: A Platform to Test Android Applications Connection Security. 294-302 - Adrian Antunez-Veas, Guillermo Navarro-Arribas

:
Onion Routing in Deterministic Delay Tolerant Networks. 303-310 - Guangye Sui, Mohamed Mejri:

Security Enforcement by Rewriting: An Algebraic Approach. 311-321

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














