![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
10th WISTP 2016: Heraklion, Greece
- Sara Foresti, Javier López:
Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Lecture Notes in Computer Science 9895, Springer 2016, ISBN 978-3-319-45930-1
Authentication and Key Management
- Frank Morgner, Paul Bastian, Marc Fischlin:
Securing Transactions with the eIDAS Protocols. 3-18 - Kim Thuat Nguyen, Nouha Oualha
, Maryline Laurent
:
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY. 19-34 - Vlasta Stavova, Vashek Matyas, Mike Just
:
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms. 35-50
Secure Hardware Systems
- Jan Tobias Mühlberg
, Sara Cleemput, Mustafa A. Mustafa
, Jo Van Bulck
, Bart Preneel
, Frank Piessens:
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures. 53-69 - Vassilios G. Vassilakis
, Emmanouil Panaousis
, Haralambos Mouratidis:
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments. 70-84 - Kyriakos Stefanidis
, Artemios G. Voyiatzis:
An HMM-Based Anomaly Detection Approach for SCADA Systems. 85-99
Attacks to Software and Network Systems
- Ishai Rosenberg, Ehud Gudes:
Attacking and Defending Dynamic Analysis System-Calls Based IDS. 103-119 - Leonardo Regano
, Daniele Canavese
, Cataldo Basile
, Alessio Viticchié, Antonio Lioy
:
Towards Automatic Risk Analysis and Mitigation of Software Applications. 120-135 - Damien Couroussé
, Thierno Barry, Bruno Robisson
, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet:
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. 136-152 - Guillaume Barbu, Alberto Battistello
:
Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks. 153-168
Access Control and Data Protection
- Leila Bahri
, Barbara Carminati
, Elena Ferrari
, William Lucia:
LAMP - Label-Based Access-Control for More Privacy in Online Social Networks. 171-186 - Ling Chen, Ting Yu, Rada Chirkova:
Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data. 187-203 - Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust:
Fault-Channel Watermarks. 204-219
Short Papers
- Ahmad Sabouri:
The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs - An Empirical Experiment. 223-235 - Hervé Chabanne
, Julien Keuffer, Roch Lescuyer:
Delegating Biometric Authentication with the Sumcheck Protocol. 236-244 - Fatma Al Maqbali, Chris J. Mitchell
:
Password Generators: Old Ideas and New. 245-253 - Panagiotis Papadopoulos
, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos:
Provable Network Activity for Protecting Users Against False Accusation. 254-261 - Madeline Cheah
, Siraj A. Shaikh
, Jeremy W. Bryans
, Hoang Nga Nguyen:
Combining Third Party Components Securely in Automotive Systems. 262-269
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.