


default search action
SEC 2015: Hamburg, Germany
- Hannes Federrath, Dieter Gollmann:

ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 455, Springer 2015, ISBN 978-3-319-18466-1
Privacy
- Aydin Abadi

, Sotirios Terzis
, Changyu Dong:
O-PSI: Delegated Private Set Intersection on Outsourced Datasets. 3-17 - Josep Domingo-Ferrer

, Qianhong Wu, Alberto Blanco-Justicia
:
Flexible and Robust Privacy-Preserving Implicit Authentication. 18-34 - Dang Vinh Pham, Dogan Kesdogan:

Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack. 35-50 - Esra Erdin, Eric Klukovich, Gurhan Gunduz, Mehmet Hadi Gunes:

POSN: A Personal Online Social Network. 51-66 - Wojciech Jamroga

, Masoud Tabatabaei:
Strategic Noninterference. 67-81 - Jaber Karimpour

, Ayaz Isazadeh, Ali A. Noroozi:
Verifying Observational Determinism. 82-93
Web Security
- Chetan Bansal, Sören Preibusch, Natasa Milic-Frayling:

Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing. 97-111 - Jinwei Hu, Heiko Mantel, Sebastian Ruhleder:

Enforcing Usage Constraints on Credentials for Web Applications. 112-125 - Amrit Kumar, Cédric Lauradoux:

A Survey of Alerting Websites: Risks and Solutions. 126-141
Access Control, Trust and Identity Management
- Asahiko Yamada:

A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant. 145-158 - Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford

:
Enhancing Passwords Security Using Deceptive Covert Communication. 159-173 - Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri:

Information Sharing and User Privacy in the Third-Party Identity Management Landscape. 174-188 - Mohsen Rezvani, Mohammad Allahbakhsh, Lorenzo Vigentini, Aleksandar Ignjatovic, Sanjay K. Jha

:
An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems. 189-203 - Timothy J. Carbino, Michael A. Temple, Juan Lopez Jr.:

A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control. 204-217 - Salvador Martínez Perez

, Joaquín García-Alfaro
, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot
:
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems. 218-233
Network Security
- Simão Reis

, André Zúquete
, Carlos Faneca, José M. N. Vieira:
Authenticated File Broadcast Protocol. 237-251 - Nizar Kheir, Gregory Blanc

, Hervé Debar
, Joaquín García-Alfaro
, Dingqi Yang:
Automated Classification of C&C Connections Through Malware URL Clustering. 252-266 - Christoph Pohl, Alf Zugenmaier, Michael Meier

, Hans-Joachim Hof
:
B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications. 267-280
Security Management and Human Aspects of Security
- Lena Yuryna Connolly

, Michael Lang
, J. Doug Tygar:
Investigation of Employee Security Behaviour: A Grounded Theory Approach. 283-296 - Fredrik Karlsson

, Göran Goldkuhl, Karin Hedström
:
Practice-Based Discourse Analysis of InfoSec Policies. 297-310 - Maria B. Line, Nils Brede Moe

:
Understanding Collaborative Challenges in IT Security Preparedness Exercises. 311-324 - Teodor Sommestad:

Social Groupings and Information Security Obedience Within Organizations. 325-338 - Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic

, Rolando Trujillo-Rasua
:
Attack Trees with Sequential Conjunction. 339-353 - David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural

, Vijayalakshmi Atluri
:
Enhancing the Security of Image CAPTCHAs Through Noise Addition. 354-368
Software Security
- Enrico Lovat, Alexander Fromm, Martin Mohr, Alexander Pretschner:

SHRIFT System-Wide HybRid Information Flow Tracking. 371-385 - Liang Deng, Qingkai Zeng, Yao Liu:

ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries. 386-400 - Quoc Huy Do, Richard Bubel, Reiner Hähnle

:
Exploit Generation for Information Flow Leaks in Object-Oriented Programs. 401-415 - Jiang Ming, Dongpeng Xu, Dinghao Wu:

Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference. 416-430 - Zhijiao Zhang, Ya-Shuai Lü, Yu Chen, Yongqiang Lu, Yuanchun Shi:

Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach. 431-445 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia

, Stefano Paraboschi
, Pierangela Samarati
:
Integrity for Approximate Joins on Untrusted Computational Servers. 446-459
Applied Cryptography
- Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:

Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. 463-478 - Toan-Thinh Truong, Minh-Triet Tran

, Anh Duc Duong, Isao Echizen:
Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment. 479-494 - Giampaolo Bella

, Rosario Giustolisi, Gabriele Lenzini
, Peter Y. A. Ryan
:
A Secure Exam Protocol Without Trusted Parties. 495-509
Mobile and Cloud Services Security
- Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein

, Yves Le Traon
:
ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. 513-527 - Francisco Vigário, Miguel Neto, Diogo Fonseca, Mário M. Freire

, Pedro R. M. Inácio
:
Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases. 528-541 - Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang:

An Empirical Study on Android for Saving Non-shared Data on Public Storage. 542-556 - Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah:

The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation. 557-570 - Konstantin Knorr, David Aspinall, Maria Wolters

:
On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps. 571-584 - Alevtina Dubovitskaya, Visara Urovi

, Matteo Vasirani, Karl Aberer, Michael Ignaz Schumacher:
A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration. 585-598
Cyber-physical Systems and Critical Infrastructures Security
- Konstantinos Maraslis, Theodoros Spyridopoulos

, George C. Oikonomou
, Theo Tryfonas
, Mo Haghighi:
Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems. 601-615 - Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel

, Michael Meier
:
Securing BACnet's Pitfalls. 616-629 - Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph

:
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios. 630-644

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














