


default search action
SEC 2014: Marrakech, Morocco
- Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia

, Anas Abou El Kalam, Thierry Sans:
ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. IFIP Advances in Information and Communication Technology 428, Springer 2014, ISBN 978-3-642-55414-8
Intrusion Detection
- Nizar Kheir, Frédéric Tran, Pierre Caron, Nicolas Deschamps:

Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists. 1-14 - Andrew Fielder, Emmanouil A. Panaousis

, Pasquale Malacaria, Chris Hankin
, Fabrizio Smeraldi:
Game Theory Meets Information Security Management. 15-29 - Marco Rocchetto, Martín Ochoa, Mohammad Torabi Dashti

:
Model-Based Detection of CSRF. 30-43 - Ibnu Mubarok, Kiryong Lee, Sihyung Lee

, Heejo Lee:
Lightweight Resource Management for DDoS Traffic Isolation in a Cloud Environment. 44-51
Data Security
- Mikhail Strizhov, Indrajit Ray:

Multi-keyword Similarity Search over Encrypted Cloud Data. 52-65 - Mee-Loong Yang, Adnan Al-Anbuky, William Liu:

Security of the Multiple-Key Blom's Key Agreement Scheme for Sensor Networks. 66-79 - Thomas Bourgeat

, Julien Bringer, Hervé Chabanne
, Robin Champenois, Jérémie Clément, Houda Ferradi, Marc Heinrich, Paul Melotti
, David Naccache, Antoine Voizard:
New Algorithmic Approaches to Point Constellation Recognition. 80-90 - Andrea Kolberger, Ingrid Schaumüller-Bichl, Verena Brunner, Martin Deutschmann:

Protection Profile for PUF-Based Devices. 91-98
Mobile Security
- Hataichanok Saevanee, Nathan L. Clarke

, Steven Furnell, Valerio Biscione:
Text-Based Active Authentication for Mobile Devices. 99-112 - Gökhan Bal, Kai Rannenberg, Jason I. Hong

:
Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones. 113-126 - Bastian Braun, Johannes Köstler, Joachim Posegga, Martin Johns

:
A Trusted UI for the Mobile Web. 127-141 - Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie:

Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph. 142-155
Privacy I
- Zacharias Tzermias, Vassilis Prevelakis, Sotiris Ioannidis:

Privacy Risks from Public Data Sources. 156-168 - Qasim Mahmood Rajpoot, Christian Damsgaard Jensen

:
Security and Privacy in Video Surveillance: Requirements and Challenges. 169-184 - Guojun Qin, Constantinos Patsakis, Mélanie Bouroche:

Playing Hide and Seek with Mobile Dating Applications. 185-196 - Fatbardh Veseli

, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri
:
Towards a Framework for Benchmarking Privacy-ABC Technologies. 197-204
Metrics and Risk Assessment
- Dominik Herrmann, Max Maaß

, Hannes Federrath:
Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing. 205-219 - Khalid Nasr, Anas Abou El Kalam

:
A Novel Metric for the Evaluation of IDSs Effectiveness. 220-233 - Gabriela Varona Cervantes, Stefan Fenz

:
How to Assess Confidentiality Requirements of Corporate Assets? 234-241 - Suhaila Ismail, Elena Sitnikova

, Jill Slay
:
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks. 242-249
Information Flow Control
- Thomas Bauereiss, Dieter Hutter

:
Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS. 250-263 - Bastian Braun, Caspar Gries, Benedikt Petschkuhn, Joachim Posegga:

Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications. 264-277 - José Fragoso Santos

, Tamara Rezk:
An Information Flow Monitor-Inlining Compiler for Securing a Core of JavaScript. 278-292
Identity Management
- Kevin Atighehchi, Alexis Bonnecaze, Traian Muntean:

Authenticated Dictionary Based on Frequency. 293-306 - Daniela Pöhn

, Stefan Metzger, Wolfgang Hommel:
Géant-TrustBroker: Dynamic, Scalable Management of SAML-Based Inter-federation Authentication and Authorization Infrastructures. 307-320 - Miaomiao Tian, Liusheng Huang:

Efficient Identity-Based Signature from Lattices. 321-329 - Yair Diaz-Tellez, Eliane L. Bodanese, Theo Dimitrakos, Michael Turner:

Context-Aware Multifactor Authentication Based on Dynamic Pin. 330-338
Identifiability and Decision Making
- Min Yang, Kam-Pui Chow:

Authorship Attribution for Forensic Investigation with Thousands of Authors. 339-350 - Christoph Bier, Jonas Prior:

Detection and Labeling of Personal Identifiable Information in E-mails. 351-358 - Nor Athiyah Abdullah, Dai Nishioka, Yuko Tanaka, Yuko Murayama:

A Preliminary Study on User's Decision Making towards Retweet Messages. 359-365
Malicious Behavior and Fraud
- Abdallah Ghourabi

, Tarek Abbes, Adel Bouhoula
:
Behavior Analysis of Web Service Attacks. 366-379 - Michele Carminati

, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero:
BankSealer: An Online Banking Fraud Analysis and Decision Support System. 380-394 - Serif Bahtiyar

, Gürkan Gür
, Levent Altay:
Security Assessment of Payment Systems under PCI DSS Incompatibilities. 395-402
Organizational Security
- Andreas Put, Italo Dacosta, Milica Milutinovic, Bart De Decker:

PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications. 403-416 - Lena Yuryna Connolly, Michael Lang

, J. Doug Tygar:
Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values. 417-430 - Gurpreet Dhillon

, Romilla Chowdhuri, Cristiane Pedron
:
Organizational Transformation and Information Security Culture: A Telecom Case Study. 431-437 - Theodoros Spyridopoulos

, Ioanna-Aikaterini Topa, Theo Tryfonas
, Maria Karyda:
A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model. 438-445
Privacy II
- Jaap-Henk Hoepman:

Privacy Design Strategies - (Extended Abstract). 446-459 - Alberto Blanco-Justicia, Josep Domingo-Ferrer

, Oriol Farràs, David Sánchez:
Distance Computation between Two Private Preference Functions. 460-470 - Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti

:
Privacy-Preserving Implicit Authentication. 471-484 - Jan Vossaert, Jorn Lapon

, Bart De Decker, Vincent Naessens:
Trusted Computing to Increase Security and Privacy in eID Authentication. 485-492

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














