default search action
12th FPS 2019: Toulouse, France
- Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquín García-Alfaro:
Foundations and Practice of Security - 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12056, Springer 2020, ISBN 978-3-030-45370-1
Machine Learning Approaches
- Mohamad Mansouri, Beyza Bozdemir, Melek Önen, Orhan Ermis:
PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks. 3-19 - Routa Moussaileb, Nora Cuppens, Jean-Louis Lanet, Hélène Le Bouder:
Ransomware Network Traffic Analysis for Pre-encryption Alert. 20-38 - Hossein Shirazi, Indrakshi Ray, Charles Anderson:
Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles. 39-55 - Bruno Reis, Eva Maia, Isabel Praça:
Selection and Performance Analysis of CICIDS2017 Features Importance. 56-71 - Nadjate Saidani, Kamel Adi, Mohand Saïd Allili:
Semantic Representation Based on Deep Learning for Spam Detection. 72-81 - William Briguglio, Sherif Saad:
Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis. 82-97 - Maël Nogues, David Brosset, Hanan Hindy, Xavier J. A. Bellekens, Yvon Kermarrec:
Labelled Network Capture Generation for Anomaly Detection. 98-113
Attack Prevention and Trustworthiness
- Meng Yang, Guang Gong:
Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS. 117-136 - Sepideh Avizheh, Reihaneh Safavi-Naini, Shuai Li:
Secure Logging with Security Against Adaptive Crash Attack. 137-155 - Silvio Ranise, Giada Sciarretta, Alessandro Tomasi:
Enroll, and Authentication Will Follow - eID-Based Enrollment for a Customized, Secure, and Frictionless Authentication Experience. 156-171 - Davy Preuveneers, Wouter Joosen:
TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE. 172-188 - Simon Tanner, Ilian Vogels, Roger Wattenhofer:
Protecting Android Apps from Repackaging Using Native Code. 189-204
Access Control Models and Cryptography
- Peter Amthor, Martin Rabe:
Command Dependencies in Heuristic Safety Analysis of Access Control Models. 207-224 - Charles Morisset, Sowmya Ravidas, Nicola Zannone:
On Attribute Retrieval in ABAC. 225-241 - Daniel Servos, Michael Bauer:
Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control. 242-260 - Guang Gong, Morgan He, Raghvendra Rohit, Yunjie Yi:
U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme. 261-272 - Edoukou Berenger Ayebie, Hafsa Assidi, El Mamoun Souidi:
An Efficient Identification Scheme Based on Rank Metric. 273-289 - Pascal Lafourcade, Mike Nopere, Jérémy Picot, Daniela Pizzuti, Etienne Roudeix:
Security Analysis of Auctionity: A Blockchain Based E-Auction. 290-307 - Johannes Blömer, Nils Löken:
Dynamic Searchable Encryption with Access Control. 308-324
Short Papers
- Pascal Lafourcade, Marius Lombard-Platet:
Get-your-ID: Decentralized Proof of Identity. 327-336 - David Gérault, Pascal Lafourcade:
Towards Secure TMIS Protocols. 337-344 - Jaimin Modi, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif Ahmed:
Detecting Ransomware in Encrypted Web Traffic. 345-353 - Alessandro Cantelli Forti, Michele Colajanni:
Digital Forensics in Vessel Transportation Systems. 354-362 - Muhammad Mohzary, Srikanth Tadisetty, Kambiz Ghazinour:
A Privacy Protection Layer for Wearable Devices. 363-370 - Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, Kazuo Sakiyama:
Validating the DFA Attack Resistance of AES (Short Paper). 371-378 - Lalia Saoudi, Kamel Adi, Younes Boudraa:
A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications. 379-386 - Mohammed Alshahrani, Issa Traoré, Sherif Saad:
Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History. 387-397 - Emil Shirima, Kambiz Ghazinour:
Towards Privacy-Aware Smart Surveillance. 398-406
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.