default search action
6. FPS 2013: La Rochelle, France
- Jean-Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquín García-Alfaro, Nur Zincir-Heywood:
Foundations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8352, Springer 2014, ISBN 978-3-319-05301-1
Keynote Address
- Jean Goubault-Larrecq, Julien Olivain:
On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case. 3-16
Security Protocols
- Matthias Wachs, Martin Schanzenbach, Christian Grothoff:
On the Feasibility of a Censorship Resistant Decentralized Name System. 19-30 - Huihui Yang, Lei Jiao, Vladimir A. Oleshchuk:
A General Framework for Group Authentication and Key Exchange Protocols. 31-45 - Zheng Yang:
Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange. 46-62
Formal Methods
- Brahim Hamid, Christian Percebois:
Model-Based Specification and Validation of Security and Dependability Patterns. 65-82 - Andrew Bedford, Josée Desharnais, Théophane G. Godonou, Nadia Tawbi:
Enforcing Information Flow by Combining Static and Dynamic Analysis. 83-101
Physical Security
- Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria:
Fault Injection to Reverse Engineer DES-Like Cryptosystems. 105-121 - Sylvain Guilley, Damien Marion, Zakaria Najm, Youssef Souissi, Antoine Wurcker:
Software Camouflage. 122-139 - Thomas Korak:
Investigation of Parameters Influencing the Success of Optical Fault Attacks. 140-157
Attack Classification and Assessment
- Alireza Sadighian, José M. Fernandez, Antoine Lemay, Saman Taghavi Zargar:
ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework. 161-177 - Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Charles Morisset:
Quantitative Evaluation of Enforcement Strategies - Position Paper. 178-186
Access Control
- Firas Al Khalil, Alban Gabillon, Patrick Capolsini:
Collusion Resistant Inference Control for Cadastral Databases. 189-208 - Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Nikolaos L. Dellas, Joaquín García-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris, Nora Cuppens-Boulahia, Frédéric Cuppens:
Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model. 209-226 - Alessandro Armando, Sander Oudkerk, Silvio Ranise, Konrad S. Wrona:
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations. 227-244
Cipher Attacks
- Hideki Sakurada:
Computational Soundness of Symbolic Blind Signatures under Active Attacker. 247-263 - Yi Lu, Yvo Desmedt:
Improved Davies-Murphy's Attack on DES Revisited. 264-271 - Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta, Kazuo Sakiyama:
Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts. 272-287
Ad-hoc and Sensor Networks
- Zeeshan Bilal, Keith Martin:
A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs. 291-305 - Ali Kassem, Pascal Lafourcade, Yassine Lakhnech:
A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks. 306-322 - Bao Liu, Lei Zhang, Josep Domingo-Ferrer:
On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs. 323-335
Resilience
- Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra:
CheR: Cheating Resilience in the Cloud via Smart Resource Allocation. 339-352 - Lukas Malina, Vlastimil Clupek, Zdenek Martinasek, Jan Hajny, Kimio Oguchi, Vaclav Zeman:
Evaluation of Software-Oriented Block Ciphers on Smartphones. 353-368 - Christian Brandt, Michael Kasper:
Don't Push It: Breaking iButton Security. 369-387
Intrusion Detection
- Raphaël Jamet, Pascal Lafourcade:
Discovering Flaws in IDS Through Analysis of Their Inputs. 391-407 - Ashkan Rahimian, Raha Ziarati, Stere Preda, Mourad Debbabi:
On the Reverse Engineering of the Citadel Botnet. 408-425 - Erwan Le Malécot, Daisuke Inoue:
The Carna Botnet Through the Lens of a Network Telescope. 426-441
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.