


default search action
5. FPS 2012: Montreal, QC, Canada
- Joaquín García-Alfaro

, Frédéric Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi
:
Foundations and Practice of Security - 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7743, Springer 2013, ISBN 978-3-642-37118-9
Cryptography and Information Theory
- Jie Li, Jianliang Zheng:

MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption. 1-17 - Sumanta Sarkar, Reihaneh Safavi-Naini:

Proofs of Retrievability via Fountain Code. 18-32 - Jianliang Zheng, Jie Li:

MARC: Modified ARC4. 33-44 - Pawel Chwalinski, Roman V. Belavkin

, Xiaochun Cheng
:
Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements. 45-61
Key Management and Cryptographic Protocols
- Khair Eddin Sabri

, Ridha Khédri:
A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes. 62-77 - Hadi Ahmadi, Reihaneh Safavi-Naini:

Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities. 78-94 - Nick Mailloux, Ali Miri, Monica Nevins

:
COMPASS: Authenticated Group Key Agreement from Signcryption. 95-114
Privacy and Trust
- Cristina Pérez-Solà

, Jordi Herrera-Joancomartí
:
Classifying Online Social Network Users through the Social Graph. 115-131 - Tim Muller, Patrick Schweitzer:

A Formal Derivation of Composite Trust. 132-148 - Ahmad AlSa'deh

, Hosnieh Rafiee, Christoph Meinel:
IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability. 149-161
Policies and Applications Security
- Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone

:
Policy Administration in Tag-Based Authorization. 162-179 - Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens:

Enabling Dynamic Security Policy in the Java Security Manager. 180-193 - Christophe Foket, Bjorn De Sutter, Bart Coppens, Koen De Bosschere:

A Novel Obfuscation: Class Hierarchy Flattening. 194-210 - Ashkan Rahimian, Philippe Charland, Stere Preda, Mourad Debbabi

:
RESource: A Framework for Online Matching of Assembly with Open Source Code. 211-226 - Tongbo Luo, Xing Jin, Ajai Ananthanarayanan, Wenliang Du:

Touchjacking Attacks on Web in Android, iOS, and Windows Phone. 227-243
Network and Adaptive Security
- Lukas Malina

, Jordi Castellà-Roca, Arnau Vives-Guasch, Jan Hajny:
Short-Term Linkable Group Signatures with Categorized Batch Verification. 244-260 - Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere:

GHUMVEE: Efficient, Effective, and Flexible Replication. 261-277 - Sherif Saad, Issa Traoré:

Extracting Attack Scenarios Using Intrusion Semantics. 278-292 - Houari Mahfoud, Abdessamad Imine:

On Securely Manipulating XML Data. 293-307 - Isaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi, Issa Traoré:

Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks. 308-323 - Tahsin Arafat Reza

, Michel Barbeau
:
QoS Aware Adaptive Security Scheme for Video Streaming in MANETs. 324-340 - Colin O'Flynn, Zhizhang Chen

:
A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC. 341-356
Short Papers
- Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin

:
Towards Modelling Adaptive Attacker's Behaviour. 357-364 - Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona

:
Scalable Deniable Group Key Establishment. 365-373 - Darakhshan J. Mir:

Information-Theoretic Foundations of Differential Privacy. 374-381

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














