default search action
10th FPS 2017: Nancy, France
- Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquín García-Alfaro:
Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10723, Springer 2018, ISBN 978-3-319-75649-3
Access Control
- Johannes Blömer, Peter Günther, Volker Krummel, Nils Löken:
Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. 3-17 - Richard Gay, Jinwei Hu, Heiko Mantel, Sogol Mazaheri:
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks. 18-34 - Alexey Rabin, Ehud Gudes:
Secure Protocol of ABAC Certificates Revocation and Delegation. 35-50
Formal Verification
- Elliott Blot, Jannik Dreier, Pascal Lafourcade:
Formal Analysis of Combinations of Secure Protocols. 53-67 - Olivier Pereira, Florentin Rochet, Cyrille Wiedling:
Formal Analysis of the FIDO 1.x Protocol. 68-82 - Harry Halpin:
A Roadmap for High Assurance Cryptography. 83-91
Privacy
- Tushar Kanti Saha, Takeshi Koshiba:
Privacy-Preserving Equality Test Towards Big Data. 95-110 - Luigi Logrippo:
Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy. 111-123
Physical Security
- Maxime Puys, Marie-Laure Potet, Abdelaziz Khaled:
Generation of Applicative Attacks Scenarios Against Industrial Systems. 127-143 - Mohamed Recem Boussaha, Raphaël Khoury, Sylvain Hallé:
Monitoring of Security Properties Using BeepBeep. 160-169
Network Security, Encrypted DBs and Blockchain
- Konrad-Felix Krentz, Christoph Meinel, Hendrik Graupner:
More Lightweight, yet Stronger 802.15.4 Security Through an Intra-layer Optimization. 173-188 - Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage. 189-205 - Sergei Tikhomirov:
Ethereum: State of Knowledge and Research Perspectives. 206-221
Vulnerability Analysis and Deception Systems
- Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber:
Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics. 225-241 - Alberto Ferrante, Miroslaw Malek, Fabio Martinelli, Francesco Mercaldo, Jelena Milosevic:
Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection. 242-258 - Daniel Fraunholz, Christoph Lipps, Marc Zimmermann, Simon Duque Antón, Johannes Karl Martin Mueller, Hans Dieter Schotten:
Deception in Information Security: Legal Considerations in the Context of German and European Law. 259-274
Defence Against Attacks and Anonymity
- Sunny Raj, Laura Pullum, Arvind Ramanathan, Sumit Kumar Jha:
SATYA : Defending Against Adversarial Attacks Using Statistical Hypothesis Testing. 277-292 - Gustavo Gonzalez Granadillo, Elena Doynikova, Igor V. Kotenko, Joaquín García-Alfaro:
Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric. 293-302 - Khalid Shahbar, Nur Zincir-Heywood:
Weighted Factors for Evaluating Anonymity. 303-318
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.