default search action
SEC 2016: Ghent, Belgium
- Jaap-Henk Hoepman, Stefan Katzenbeisser:
ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings. IFIP Advances in Information and Communication Technology 471, Springer 2016, ISBN 978-3-319-33629-9
Cryptographic Protocols
- Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer:
Coercion-Resistant Proxy Voting. 3-16 - Xavier Bultel, Pascal Lafourcade:
A Posteriori Openable Public Key Encryption. 17-31 - Sérgio M. Câmara, Dhananjay Anand, Victoria Pillitteri, Luiz F. R. C. Carmo:
Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid. 32-46
Human Aspects of Security
- Gurpreet Dhillon, Spyridon Samonas, Ugo Etudo:
Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research. 49-61 - Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray:
Evaluating CVSS Base Score Using Vulnerability Rewards Programs. 62-75 - Gurpreet Dhillon, Chandrashekar Challa, Kane Smith:
Defining Objectives for Preventing Cyberstalking. 76-87
Cyber Infrastructure
- Sridhar Adepu, Aditya Mathur:
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System. 91-104 - Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey:
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud. 105-118 - Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens:
Software Defined Networking Reactive Stateful Firewall. 119-132
Phishing and Data Sharing
- Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, Daniel Lehmann:
Teaching Phishing-Security: Which Way is Best? 135-149 - Markus Tschersich, Shinsaku Kiyomoto, Sebastian Pape, Toru Nakamura, Gökhan Bal, Haruo Takasaki, Kai Rannenberg:
On Gender Specific Perception of Data Sharing in Japan. 150-160 - Melanie Volkamer, Karen Renaud, Benjamin Reinheimer:
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. 161-175
Social Networks
- Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray:
SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks. 179-193 - Iraklis Symeonidis, Fatemeh Shirazi, Gergely Biczók, Cristina Pérez-Solà, Bart Preneel:
Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence. 194-208
Software Vulnerabilities
- Hongzhe Li, Jaesang Oh, Hakjoo Oh, Heejo Lee:
Automated Source Code Instrumentation for Verifying Potential Vulnerabilities. 211-226 - Daniela Oliveira, Jedidiah R. Crandall, Harry A. Kalodner, Nicole Morin, Megan Maher, Jesús Navarro, Felix Emiliano:
An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities. 227-242 - Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero:
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners. 243-258
TPM and Internet of Things
- Benjamin Aziz, Paul Fremantle, Rui Wei, Álvaro Enrique Arenas:
A Utility-Based Reputation Model for the Internet of Things. 261-275 - Andreas Fuchs, Christoph Krauß, Jürgen Repp:
Advanced Remote Firmware Upgrades Using TPM 2.0. 276-289
Sidechannel Analysis
- Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, Ziqiang Ma:
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks. 293-307 - Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Uncertain? No, It's Very Certain! - Recovering the Key from Guessing Entropy Enhanced CPA. 308-320
Software Security
- Ping Chen, Christophe Huygens, Lieven Desmet, Wouter Joosen:
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware. 323-336 - Yu-Yang Hong, Yu-Ping Wang, Jie Yin:
NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries. 337-351 - Andrew Bedford, Stephen Chong, Josée Desharnais, Nadia Tawbi:
A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor. 352-366
Privacy
- Frederik Möllers, Christoph Sorge:
Deducing User Presence from Inter-Message Intervals in Home Automation Systems. 369-383 - Ella Kolkowska, Annica Kristoffersson:
Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies. 384-397 - Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie:
A Trustless Privacy-Preserving Reputation System. 398-411
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.