


default search action
6. FPS 2013: La Rochelle, France
- Jean-Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquín García-Alfaro

, Nur Zincir-Heywood:
Foundations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8352, Springer 2014, ISBN 978-3-319-05301-1
Keynote Address
- Jean Goubault-Larrecq, Julien Olivain:

On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case. 3-16
Security Protocols
- Matthias Wachs, Martin Schanzenbach

, Christian Grothoff:
On the Feasibility of a Censorship Resistant Decentralized Name System. 19-30 - Huihui Yang

, Lei Jiao, Vladimir A. Oleshchuk:
A General Framework for Group Authentication and Key Exchange Protocols. 31-45 - Zheng Yang

:
Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange. 46-62
Formal Methods
- Brahim Hamid

, Christian Percebois:
Model-Based Specification and Validation of Security and Dependability Patterns. 65-82 - Andrew Bedford

, Josée Desharnais
, Théophane G. Godonou, Nadia Tawbi
:
Enforcing Information Flow by Combining Static and Dynamic Analysis. 83-101
Physical Security
- Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria:

Fault Injection to Reverse Engineer DES-Like Cryptosystems. 105-121 - Sylvain Guilley, Damien Marion, Zakaria Najm, Youssef Souissi, Antoine Wurcker:

Software Camouflage. 122-139 - Thomas Korak:

Investigation of Parameters Influencing the Success of Optical Fault Attacks. 140-157
Attack Classification and Assessment
- Alireza Sadighian, José M. Fernandez

, Antoine Lemay, Saman Taghavi Zargar:
ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework. 161-177 - Vincenzo Ciancia

, Fabio Martinelli, Ilaria Matteucci
, Charles Morisset:
Quantitative Evaluation of Enforcement Strategies - Position Paper. 178-186
Access Control
- Firas Al Khalil

, Alban Gabillon, Patrick Capolsini:
Collusion Resistant Inference Control for Cadastral Databases. 189-208 - Eugenia I. Papagiannakopoulou

, Maria N. Koukovini, Georgios V. Lioudakis
, Nikolaos L. Dellas, Joaquín García-Alfaro
, Dimitra I. Kaklamani, Iakovos S. Venieris, Nora Cuppens-Boulahia, Frédéric Cuppens:
Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model. 209-226 - Alessandro Armando

, Sander Oudkerk, Silvio Ranise
, Konrad S. Wrona
:
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations. 227-244
Cipher Attacks
- Hideki Sakurada:

Computational Soundness of Symbolic Blind Signatures under Active Attacker. 247-263 - Yi Lu, Yvo Desmedt:

Improved Davies-Murphy's Attack on DES Revisited. 264-271 - Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta, Kazuo Sakiyama:

Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts. 272-287
Ad-hoc and Sensor Networks
- Zeeshan Bilal, Keith Martin:

A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs. 291-305 - Ali Kassem, Pascal Lafourcade

, Yassine Lakhnech:
A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks. 306-322 - Bao Liu, Lei Zhang, Josep Domingo-Ferrer

:
On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs. 323-335
Resilience
- Roberto Di Pietro

, Flavio Lombardi
, Fabio Martinelli, Daniele Sgandurra:
CheR: Cheating Resilience in the Cloud via Smart Resource Allocation. 339-352 - Lukas Malina

, Vlastimil Clupek, Zdenek Martinasek
, Jan Hajny, Kimio Oguchi, Vaclav Zeman:
Evaluation of Software-Oriented Block Ciphers on Smartphones. 353-368 - Christian Brandt, Michael Kasper:

Don't Push It: Breaking iButton Security. 369-387
Intrusion Detection
- Raphaël Jamet, Pascal Lafourcade

:
Discovering Flaws in IDS Through Analysis of Their Inputs. 391-407 - Ashkan Rahimian, Raha Ziarati, Stere Preda, Mourad Debbabi

:
On the Reverse Engineering of the Citadel Botnet. 408-425 - Erwan Le Malécot, Daisuke Inoue:

The Carna Botnet Through the Lens of a Network Telescope. 426-441

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














