


Остановите войну!
for scientists:


default search action
1st ICISSP 2015: Angers, Loire Valley, France
- Olivier Camp, Edgar R. Weippl, Christophe Bidan, Esma Aïmeur:
ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015. SciTePress 2015, ISBN 978-989-758-081-9
Invited Speakers
Keynote Speakers
- Rafael Accorsi:
A Posteriori Process Security Control. IS-5 - Steven Furnell:
From Passwords to Biometrics - In Pursuit of a Panacea. IS-7 - Bryan Ford:
Hiding in a Panopticon - Grand Challenges in Internet Anonymity. IS-9 - Günther Pernul:
Privacy in Social Networks - Existing Challenges and Proposals for Solution. IS-11 - Patrick D. McDaniel:
A New Science of Security Decision Making. IS-13
Invited Lecture
- Philippe Desfray:
Model Repositories at the Enterprises and Systems Scale - The Modelio Constellation Solution. IS-17
Data and Software Security
Full Papers
- Sylvestre Uwizeyemungu, Placide Poba-Nzaou:
Understanding Information Technology Security Standards Diffusion - An Institutional Perspective. 5-16 - Taegyu Kim, Woomin Hwang, Chulmin Kim, Dong-Jae Shin, Ki-Woong Park, Kyu Ho Park:
Malfinder: Accelerated Malware Classification System through Filtering on Manycore System. 17-26 - Davide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto:
A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files. 27-36
Short Papers
- Stuart Jacobs:
Optimizing Cryptographically based Security in Wireless Networks. 39-45 - Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor
:
Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security. 46-55 - Inger Anne Tøndel, Maria B. Line, Gorm Johansen:
Assessing Information Security Risks of AMI - What Makes it so Difficult?. 56-63 - Michael Kunz, Ludwig Fuchs, Michael Netter, Günther Pernul:
Analyzing Quality Criteria in Role-based Identity and Access Management. 64-72 - Preetam Mukherjee, Chandan Mazumdar:
A Novel Model of Security Policies and Requirements. 73-82 - Matrazali Noorafiza, Hiroshi Maeda, Ryuya Uda, Toshiyuki Kinoshita, M. Shiratori:
Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine. 83-89 - Mina Sheikh Alishahi, Mohamed Mejri, Nadia Tawbi
:
Clustering Spam Emails into Campaigns. 90-97 - Nicolas T. Courtois, Pinar Emirdag, Zhouyixing Wang:
On Detection of Bitcoin Mining Redirection Attacks. 98-105 - Sriram Krishnamachari, Mehrdad Nojoumian, Kemal Akkaya:
Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security. 106-113 - Mehmud Abliz, Taieb F. Znati:
Defeating DDoS using Productive Puzzles. 114-123 - Jayagopal Narayanaswamy, Raghav V. Sampangi, Srinivas Sampalli:
HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption. 124-131 - Puloma Roy, Chandan Mazumdar:
Modelling of Enterprise Insider Threats. 132-136 - Gregor Bonney, Hans Höfken, Benedikt Paffen, Marko Schuba:
ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC. 137-142
Trust
Short Papers
- Bushra Anjum, Manish Rajangam, Harry G. Perros, Wenjuan Fan:
Filtering Unfair Users - A Hidden Markov Model Approach. 147-154 - Vassilis Prevelakis, Mohammad Hamad
:
A Policy-based Communications Architecture for Vehicles. 155-162 - Ansgar R. Koene, Elvira Perez, Christopher James Carter, Ramona Statache, Svenja Adolphs, Claire O'Malley, Tom Rodden, Derek McAuley:
Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate Research. 163-168
Privacy and Confidentiality
Full Papers
- Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frîncu, Viktor K. Prasanna:
Model-driven Privacy Assessment in the Smart Grid. 173-181 - Henrik Nergaard, Nils Ulltveit-Moe, Terje Gjøsæter:
A Scratch-based Graphical Policy Editor for XACML. 182-190 - Aderonke Busayo Sakpere, Anne V. D. M. Kayem:
Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss. 191-201
Short Papers
- Bolam Kang, Sung Cheol Goh, Myungsun Kim:
Private Web Search with Constant Round Efficiency. 205-212 - Masaki Inamura:
Expansions of CHAP - Modificationless on Its Structures of Packet and Data Exchange. 213-220 - Jan Lehnhardt, Tobias Rho, Adrian Spalka, Armin B. Cremers:
Performance-optimized Indexes for Inequality Searches on Encrypted Data in Practice. 221-229 - Hyoyoung Lim, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
Malware Classification Method Based on Sequence of Traffic Flow. 230-237 - Andrea Huszti
, Zita Kovács:
Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation. 238-245 - Al Amin Hossain, Weining Zhang:
Privacy and Security Concern of Online Social Networks from User Perspective. 246-253
Mobile Systems Security
Full Papers
- Carsten Büttner, Sorin A. Huss:
A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. 259-269 - Wei-Han Lee, Ruby B. Lee:
Multi-sensor Authentication to Improve Smartphone Security. 270-280
Short Paper
- Abdulhadi Shoufan, Hassan Alnoon, Joonsang Baek:
On the Power Consumption of Cryptographic Processors in Civil Microdrones. 283-290
Biometric Authentication
Full Papers
- Arathi Arakala, Hao Hao, Stephen A. Davis, Kathy J. Horadam:
The Palm Vein Graph - Feature Extraction and Matching. 295-303 - Mélanie Favre, Sylvaine Picard, Julien Bringer, Hervé Chabanne:
Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment. 304-311
Short Papers
- Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger
:
Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation. 315-321 - Josselyn Le Moing, Ingo Stengel:
The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition. 322-328 - Benoît Vibert, Zhigang Yao, Sylvain Vernois, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger
:
EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices. 329-335 - Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger
:
Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features. 336-343

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.