


default search action
SEC 2015: Hamburg, Germany
- Hannes Federrath, Dieter Gollmann:
ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 455, Springer 2015, ISBN 978-3-319-18466-1
Privacy
- Aydin Abadi
, Sotirios Terzis
, Changyu Dong:
O-PSI: Delegated Private Set Intersection on Outsourced Datasets. 3-17 - Josep Domingo-Ferrer
, Qianhong Wu, Alberto Blanco-Justicia
:
Flexible and Robust Privacy-Preserving Implicit Authentication. 18-34 - Dang Vinh Pham, Dogan Kesdogan:
Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack. 35-50 - Esra Erdin, Eric Klukovich, Gurhan Gunduz, Mehmet Hadi Gunes:
POSN: A Personal Online Social Network. 51-66 - Wojciech Jamroga
, Masoud Tabatabaei:
Strategic Noninterference. 67-81 - Jaber Karimpour
, Ayaz Isazadeh, Ali A. Noroozi:
Verifying Observational Determinism. 82-93
Web Security
- Chetan Bansal, Sören Preibusch, Natasa Milic-Frayling:
Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing. 97-111 - Jinwei Hu, Heiko Mantel, Sebastian Ruhleder:
Enforcing Usage Constraints on Credentials for Web Applications. 112-125 - Amrit Kumar, Cédric Lauradoux:
A Survey of Alerting Websites: Risks and Solutions. 126-141
Access Control, Trust and Identity Management
- Asahiko Yamada:
A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant. 145-158 - Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford:
Enhancing Passwords Security Using Deceptive Covert Communication. 159-173 - Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri:
Information Sharing and User Privacy in the Third-Party Identity Management Landscape. 174-188 - Mohsen Rezvani, Mohammad Allahbakhsh, Lorenzo Vigentini, Aleksandar Ignjatovic, Sanjay K. Jha
:
An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems. 189-203 - Timothy J. Carbino, Michael A. Temple, Juan Lopez Jr.:
A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control. 204-217 - Salvador Martínez Perez
, Joaquín García-Alfaro
, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot
:
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems. 218-233
Network Security
- Simão Reis
, André Zúquete
, Carlos Faneca, José M. N. Vieira:
Authenticated File Broadcast Protocol. 237-251 - Nizar Kheir, Gregory Blanc
, Hervé Debar
, Joaquín García-Alfaro
, Dingqi Yang:
Automated Classification of C&C Connections Through Malware URL Clustering. 252-266 - Christoph Pohl, Alf Zugenmaier, Michael Meier
, Hans-Joachim Hof
:
B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications. 267-280
Security Management and Human Aspects of Security
- Lena Yuryna Connolly
, Michael Lang
, J. Doug Tygar:
Investigation of Employee Security Behaviour: A Grounded Theory Approach. 283-296 - Fredrik Karlsson, Göran Goldkuhl, Karin Hedström
:
Practice-Based Discourse Analysis of InfoSec Policies. 297-310 - Maria B. Line, Nils Brede Moe
:
Understanding Collaborative Challenges in IT Security Preparedness Exercises. 311-324 - Teodor Sommestad:
Social Groupings and Information Security Obedience Within Organizations. 325-338 - Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic
, Rolando Trujillo-Rasua
:
Attack Trees with Sequential Conjunction. 339-353 - David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural
, Vijayalakshmi Atluri
:
Enhancing the Security of Image CAPTCHAs Through Noise Addition. 354-368
Software Security
- Enrico Lovat, Alexander Fromm, Martin Mohr, Alexander Pretschner:
SHRIFT System-Wide HybRid Information Flow Tracking. 371-385 - Liang Deng, Qingkai Zeng, Yao Liu:
ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries. 386-400 - Quoc Huy Do, Richard Bubel, Reiner Hähnle
:
Exploit Generation for Information Flow Leaks in Object-Oriented Programs. 401-415 - Jiang Ming, Dongpeng Xu, Dinghao Wu:
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference. 416-430 - Zhijiao Zhang, Ya-Shuai Lü, Yu Chen, Yongqiang Lu, Yuanchun Shi:
Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach. 431-445 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia
, Stefano Paraboschi
, Pierangela Samarati
:
Integrity for Approximate Joins on Untrusted Computational Servers. 446-459
Applied Cryptography
- Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. 463-478 - Toan-Thinh Truong, Minh-Triet Tran
, Anh Duc Duong, Isao Echizen:
Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment. 479-494 - Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini
, Peter Y. A. Ryan
:
A Secure Exam Protocol Without Trusted Parties. 495-509
Mobile and Cloud Services Security
- Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein
, Yves Le Traon
:
ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. 513-527 - Francisco Vigário, Miguel Neto, Diogo Fonseca, Mário M. Freire, Pedro R. M. Inácio
:
Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases. 528-541 - Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang:
An Empirical Study on Android for Saving Non-shared Data on Public Storage. 542-556 - Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah:
The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation. 557-570 - Konstantin Knorr, David Aspinall, Maria Wolters
:
On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps. 571-584 - Alevtina Dubovitskaya, Visara Urovi
, Matteo Vasirani, Karl Aberer, Michael Ignaz Schumacher:
A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration. 585-598
Cyber-physical Systems and Critical Infrastructures Security
- Konstantinos Maraslis, Theodoros Spyridopoulos
, George C. Oikonomou
, Theo Tryfonas
, Mo Haghighi:
Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems. 601-615 - Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel
, Michael Meier
:
Securing BACnet's Pitfalls. 616-629 - Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
:
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios. 630-644

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.