


default search action
12th FPS 2019: Toulouse, France
- Abdelmalek Benzekri, Michel Barbeau

, Guang Gong, Romain Laborde
, Joaquín García-Alfaro
:
Foundations and Practice of Security - 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12056, Springer 2020, ISBN 978-3-030-45370-1
Machine Learning Approaches
- Mohamad Mansouri

, Beyza Bozdemir, Melek Önen, Orhan Ermis:
PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks. 3-19 - Routa Moussaileb, Nora Cuppens, Jean-Louis Lanet, Hélène Le Bouder:

Ransomware Network Traffic Analysis for Pre-encryption Alert. 20-38 - Hossein Shirazi

, Indrakshi Ray, Charles Anderson
:
Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles. 39-55 - Bruno Reis

, Eva Maia
, Isabel Praça
:
Selection and Performance Analysis of CICIDS2017 Features Importance. 56-71 - Nadjate Saidani, Kamel Adi

, Mohand Saïd Allili:
Semantic Representation Based on Deep Learning for Spam Detection. 72-81 - William Briguglio, Sherif Saad:

Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis. 82-97 - Maël Nogues, David Brosset, Hanan Hindy

, Xavier J. A. Bellekens, Yvon Kermarrec:
Labelled Network Capture Generation for Anomaly Detection. 98-113
Attack Prevention and Trustworthiness
- Meng Yang, Guang Gong:

Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS. 117-136 - Sepideh Avizheh, Reihaneh Safavi-Naini, Shuai Li:

Secure Logging with Security Against Adaptive Crash Attack. 137-155 - Silvio Ranise

, Giada Sciarretta
, Alessandro Tomasi
:
Enroll, and Authentication Will Follow - eID-Based Enrollment for a Customized, Secure, and Frictionless Authentication Experience. 156-171 - Davy Preuveneers, Wouter Joosen:

TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE. 172-188 - Simon Tanner, Ilian Vogels, Roger Wattenhofer:

Protecting Android Apps from Repackaging Using Native Code. 189-204
Access Control Models and Cryptography
- Peter Amthor, Martin Rabe:

Command Dependencies in Heuristic Safety Analysis of Access Control Models. 207-224 - Charles Morisset, Sowmya Ravidas, Nicola Zannone

:
On Attribute Retrieval in ABAC. 225-241 - Daniel Servos

, Michael Bauer:
Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control. 242-260 - Guang Gong, Morgan He, Raghvendra Rohit, Yunjie Yi:

U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme. 261-272 - Edoukou Berenger Ayebie

, Hafsa Assidi, El Mamoun Souidi
:
An Efficient Identification Scheme Based on Rank Metric. 273-289 - Pascal Lafourcade, Mike Nopere, Jérémy Picot, Daniela Pizzuti, Etienne Roudeix:

Security Analysis of Auctionity: A Blockchain Based E-Auction. 290-307 - Johannes Blömer, Nils Löken:

Dynamic Searchable Encryption with Access Control. 308-324
Short Papers
- Pascal Lafourcade, Marius Lombard-Platet:

Get-your-ID: Decentralized Proof of Identity. 327-336 - David Gérault, Pascal Lafourcade:

Towards Secure TMIS Protocols. 337-344 - Jaimin Modi, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif Ahmed:

Detecting Ransomware in Encrypted Web Traffic. 345-353 - Alessandro Cantelli-Forti

, Michele Colajanni:
Digital Forensics in Vessel Transportation Systems. 354-362 - Muhammad Mohzary

, Srikanth Tadisetty, Kambiz Ghazinour:
A Privacy Protection Layer for Wearable Devices. 363-370 - Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, Kazuo Sakiyama:

Validating the DFA Attack Resistance of AES (Short Paper). 371-378 - Lalia Saoudi, Kamel Adi

, Younes Boudraa:
A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications. 379-386 - Mohammed Alshahrani, Issa Traoré, Sherif Saad:

Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History. 387-397 - Emil Shirima, Kambiz Ghazinour:

Towards Privacy-Aware Smart Surveillance. 398-406

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














