Search dblp for Publications

export results for "stream:streams/conf/nordsec:"

 download as .bib file

@proceedings{DBLP:conf/nordsec/2023,
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-47748-5},
  doi          = {10.1007/978-3-031-47748-5},
  isbn         = {978-3-031-47747-8},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BergHA23,
  author       = {Lars Berg and
                  Kirsi Helkala and
                  Andr{\'{e}} {\AA}rnes},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {Legal Considerations on Gray Zone Operations - From a Norwegian Perspective},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {162--181},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_10},
  doi          = {10.1007/978-3-031-47748-5\_10},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/BergHA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BrorssonG23,
  author       = {Joakim Brorsson and
                  Martin Gunnarsson},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {{DIPSAUCE:} Efficient Private Stream Aggregation Without Trusted Parties},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {204--222},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_12},
  doi          = {10.1007/978-3-031-47748-5\_12},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/BrorssonG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/CotanT23,
  author       = {Paul Cotan and
                  George Teseleanu},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {Small Private Key Attack Against a Family of RSA-Like Cryptosystems},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {57--72},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_4},
  doi          = {10.1007/978-3-031-47748-5\_4},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/CotanT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/DaiDJLMS23,
  author       = {Tianxiang Dai and
                  Li Duan and
                  Yufan Jiang and
                  Yong Li and
                  Fei Mei and
                  Yulian Sun},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning
                  on {GPU}},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {330--349},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_18},
  doi          = {10.1007/978-3-031-47748-5\_18},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/DaiDJLMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/EichhammerR23,
  author       = {Philipp Eichhammer and
                  Hans P. Reiser},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {A Self-forming Community Approach for Intrusion Detection in Heterogeneous
                  Networks},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {263--280},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_15},
  doi          = {10.1007/978-3-031-47748-5\_15},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/EichhammerR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Guri23,
  author       = {Mordechai Guri},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {{RAMBO:} Leaking Secrets from Air-Gap Computers by Spelling Covert
                  Radio Signals from Computer {RAM}},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {144--161},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_9},
  doi          = {10.1007/978-3-031-47748-5\_9},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/Guri23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HamidiG23,
  author       = {Amirreza Hamidi and
                  Hossein Ghodosi},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits:
                  Compute-as-a-Service},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_5},
  doi          = {10.1007/978-3-031-47748-5\_5},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/HamidiG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/JenkePB23,
  author       = {Thorsten Jenke and
                  Elmar Padilla and
                  Lilli Bruckschen},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {Towards Generic Malware Unpacking: {A} Comprehensive Study on the
                  Unpacking Behavior of Malicious Run-Time Packers},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {245--262},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_14},
  doi          = {10.1007/978-3-031-47748-5\_14},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/JenkePB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KhanNM23,
  author       = {Tanveer Khan and
                  Khoa Nguyen and
                  Antonis Michalas},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {A More Secure Split: Enhancing the Security of Privacy-Preserving
                  Split Learning},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {307--329},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_17},
  doi          = {10.1007/978-3-031-47748-5\_17},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/KhanNM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KjonasW23,
  author       = {Karianne Kj{\o}n{\aa}s and
                  Gaute Wangen},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {Cybersecurity Challenges and Smart Technology Adoption in Norwegian
                  Livestock Farming},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {107--125},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_7},
  doi          = {10.1007/978-3-031-47748-5\_7},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/KjonasW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KlierB23,
  author       = {Samantha Klier and
                  Harald Baier},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {To Possess or Not to Possess - WhatsApp for Android Revisited with
                  a Focus on Stickers},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {281--303},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_16},
  doi          = {10.1007/978-3-031-47748-5\_16},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/KlierB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LinsMRB23,
  author       = {Mario Lins and
                  Ren{\'{e}} Mayrhofer and
                  Michael Roland and
                  Alastair R. Beresford},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {Mobile App Distribution Transparency {(MADT):} Design and Evaluation
                  of a System to Mitigate Necessary Trust in Mobile App Distribution
                  Systems},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {185--203},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_11},
  doi          = {10.1007/978-3-031-47748-5\_11},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/LinsMRB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MangeardYMY23,
  author       = {Philippe Mangeard and
                  Xiufen Yu and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support
                  Websites},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {18--36},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_2},
  doi          = {10.1007/978-3-031-47748-5\_2},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MangeardYMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PalmJ23,
  author       = {Jonas Palm and
                  Meiko Jensen},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {Analysis of a Consent Management Specification and Prototype Under
                  the {GDPR}},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_1},
  doi          = {10.1007/978-3-031-47748-5\_1},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/PalmJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PatilFE23,
  author       = {Rajendra Patil and
                  Viktoria Fodor and
                  Mathias Ekstedt},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {Mean Value Analysis of Critical Attack Paths with Multiple Parameters},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {126--143},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_8},
  doi          = {10.1007/978-3-031-47748-5\_8},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/PatilFE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/RossbergerK23,
  author       = {Marc Ro{\ss}berger and
                  Dogan Kesdogan},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {Smart Noise Detection for Statistical Disclosure Attacks},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {87--103},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_6},
  doi          = {10.1007/978-3-031-47748-5\_6},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/RossbergerK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SchmittCSM23,
  author       = {Vera Schmitt and
                  Daniel Sivizaca Conde and
                  Premtim Sahitaj and
                  Sebastian M{\"{o}}ller},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {What is Your Information Worth? {A} Systematic Analysis of the Endowment
                  Effect of Different Data Types},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {223--242},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_13},
  doi          = {10.1007/978-3-031-47748-5\_13},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/SchmittCSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/VuorinenPRL23,
  author       = {Esko Vuorinen and
                  Panu Puhtila and
                  Sampsa Rauti and
                  Ville Lepp{\"{a}}nen},
  editor       = {Lothar Fritsch and
                  Ismail Hassan and
                  Ebenezer Paintsil},
  title        = {From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channels},
  booktitle    = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo,
                  Norway, November 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14324},
  pages        = {37--53},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47748-5\_3},
  doi          = {10.1007/978-3-031-47748-5\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/VuorinenPRL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AlishahiGV22,
  author       = {Mina Alishahi and
                  Daan Gast and
                  Sam Vermeiren},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Local Differential Privacy for Private Construction of Classification
                  Algorithms},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {58--79},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_4},
  doi          = {10.1007/978-3-031-22295-5\_4},
  timestamp    = {Mon, 09 Jan 2023 17:58:32 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/AlishahiGV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ArnalCFH22,
  author       = {Xavier Arnal and
                  Abraham Cano and
                  Tamara Finogina and
                  Javier Herranz},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge
                  Proofs},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {253--269},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_14},
  doi          = {10.1007/978-3-031-22295-5\_14},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/ArnalCFH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BjerreWVHAHA22,
  author       = {Alexander Bjerre and
                  Andreas Philip Westh and
                  Emil Villefrance and
                  A S. M. Farhan Al Haque and
                  Jonas Bukrinski Andersen and
                  Lucas K. Helgogaard and
                  Marios Anagnostopoulos},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {A Wide Network Scanning for Discovery of UDP-Based Reflectors in the
                  Nordic Countries},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {176--193},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_10},
  doi          = {10.1007/978-3-031-22295-5\_10},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/BjerreWVHAHA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BlumbergsDPNSR22,
  author       = {Bernhards Blumbergs and
                  Eriks Dobelis and
                  Peteris Paikens and
                  Krisjanis Nesenbergs and
                  Kirils Solovjovs and
                  Artis Rusins},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {WearSec: Towards Automated Security Evaluation of Wireless Wearable
                  Devices},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {311--325},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_17},
  doi          = {10.1007/978-3-031-22295-5\_17},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/BlumbergsDPNSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ColeP22,
  author       = {Matthew Cole and
                  Aravind Prakash},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Simplex: Repurposing Intel Memory Protection Extensions for Secure
                  Storage},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {215--233},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_12},
  doi          = {10.1007/978-3-031-22295-5\_12},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/ColeP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/DamirN22,
  author       = {Mohamed Taoufiq Damir and
                  Valtteri Niemi},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Location Privacy, 5G AKA, and Enhancements},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {40--57},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_3},
  doi          = {10.1007/978-3-031-22295-5\_3},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/DamirN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/FraunholzBBBKR22,
  author       = {Daniel Fraunholz and
                  Dominik Brunke and
                  Simon Beidenhauser and
                  Sebastian Berger and
                  Hartmut Koenig and
                  Daniel Reti},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {{IMSI} Probing: Possibilities and Limitations},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {80--97},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_5},
  doi          = {10.1007/978-3-031-22295-5\_5},
  timestamp    = {Thu, 12 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/FraunholzBBBKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GaballahATZM22,
  author       = {Sarah Abdelwahab Gaballah and
                  Lamya Abdullah and
                  Minh Tung Tran and
                  Ephraim Zimmer and
                  Max M{\"{u}}hlh{\"{a}}user},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {On the Effectiveness of Intersection Attacks in Anonymous Microblogging},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_1},
  doi          = {10.1007/978-3-031-22295-5\_1},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/GaballahATZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Guri22,
  author       = {Mordechai Guri},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {{GPU-FAN:} Leaking Sensitive Data from Air-Gapped Machines via Covert
                  Noise from {GPU} Fans},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {194--211},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_11},
  doi          = {10.1007/978-3-031-22295-5\_11},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/Guri22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HesselmannRGM22,
  author       = {Carsten Hesselmann and
                  Delphine Reinhardt and
                  Jan Gertheiss and
                  J{\"{o}}rg P. M{\"{u}}ller},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Data Privacy in Ride-Sharing Services: From an Analysis of Common
                  Practices to Improvement of User Awareness},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {20--39},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_2},
  doi          = {10.1007/978-3-031-22295-5\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/HesselmannRGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LantzBA22,
  author       = {David Lantz and
                  Felipe Boeira and
                  Mikael Asplund},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance
                  Counters},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {120--138},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_7},
  doi          = {10.1007/978-3-031-22295-5\_7},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/LantzBA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LatzoHKHCFA22,
  author       = {Tobias Latzo and
                  Andreas Hellmich and
                  Annika Knepper and
                  Lukas Hardi and
                  Tim Phillip Castello{-}Waldow and
                  Felix C. Freiling and
                  Andreas Attenberger},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Maraudrone's Map: An Interactive Web Application for Forensic Analysis
                  and Visualization of {DJI} Drone Log Data},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {329--345},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_18},
  doi          = {10.1007/978-3-031-22295-5\_18},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/LatzoHKHCFA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LeiteHSC22,
  author       = {Cristoffer Leite and
                  Jerry den Hartog and
                  Daniel Ricardo dos Santos and
                  Elisa Costante},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Actionable Cyber Threat Intelligence for Automated Incident Response},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {368--385},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_20},
  doi          = {10.1007/978-3-031-22295-5\_20},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/LeiteHSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MsaadSAAOV22,
  author       = {Mohamed Msaad and
                  Shreyas Srinivasa and
                  Mikkel M{\o}ller Andersen and
                  David Holm Audran and
                  Charity U. Orji and
                  Emmanouil Vasilomanolakis},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {101--119},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_6},
  doi          = {10.1007/978-3-031-22295-5\_6},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MsaadSAAOV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/OuytselL22,
  author       = {Charles{-}Henry Bertrand Van Ouytsel and
                  Axel Legay},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Malware Analysis with Symbolic Execution and Graph Kernel},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {292--310},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_16},
  doi          = {10.1007/978-3-031-22295-5\_16},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/OuytselL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PillaiLR22,
  author       = {Arun Sankar Muttathu Sivasankara Pillai and
                  Phillip L. De Leon and
                  Utz Roedig},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Detection of Voice Conversion Spoofing Attacks Using Voiced Speech},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {159--175},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_9},
  doi          = {10.1007/978-3-031-22295-5\_9},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/PillaiLR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PlnyHC22,
  author       = {Richard Pln{\'{y}} and
                  Karel Hynek and
                  Tom{\'{a}}s Cejka},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {DeCrypto: Finding Cryptocurrency Miners on {ISP} Networks},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {139--158},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_8},
  doi          = {10.1007/978-3-031-22295-5\_8},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/PlnyHC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SchrittwieserKP22,
  author       = {Sebastian Schrittwieser and
                  Patrick Kochberger and
                  Michael Pucher and
                  Caroline Lawitschka and
                  Philip K{\"{o}}nig and
                  Edgar R. Weippl},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Obfuscation-Resilient Semantic Functionality Identification Through
                  Program Simulation},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {273--291},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_15},
  doi          = {10.1007/978-3-031-22295-5\_15},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/SchrittwieserKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SivelleDPLF22,
  author       = {Camille Sivelle and
                  Lorys Debbah and
                  Maxime Puys and
                  Pascal Lafourcade and
                  Thibault Franco{-}Rondisson},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Automatic Implementations Synthesis of Secure Protocols and Attacks
                  from Abstract Models},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {234--252},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_13},
  doi          = {10.1007/978-3-031-22295-5\_13},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/SivelleDPLF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/TabibanZJPW22,
  author       = {Azadeh Tabiban and
                  Heyang Zhao and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {VinciDecoder: Automatically Interpreting Provenance Graphs into Textual
                  Forensic Reports with Application to OpenStack},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {346--367},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_19},
  doi          = {10.1007/978-3-031-22295-5\_19},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/TabibanZJPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2022,
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5},
  doi          = {10.1007/978-3-031-22295-5},
  isbn         = {978-3-031-22294-8},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AbdelliCP21,
  author       = {Khouloud Abdelli and
                  Joo Yeon Cho and
                  Stephan Pachnicke},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {Secure Collaborative Learning for Predictive Maintenance in Optical
                  Networks},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {114--130},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_7},
  doi          = {10.1007/978-3-030-91625-1\_7},
  timestamp    = {Fri, 19 Nov 2021 16:08:34 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/AbdelliCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AtiiqG21,
  author       = {Syafiq Al Atiiq and
                  Christian Gehrmann},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {X-Pro: Distributed {XDP} Proxies Against Botnets of Things},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {51--71},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_4},
  doi          = {10.1007/978-3-030-91625-1\_4},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/AtiiqG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BrierleyABH21,
  author       = {Calvin Brierley and
                  Budi Arief and
                  David J. Barnes and
                  Julio C. Hernandez{-}Castro},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {Industrialising Blackmail: Privacy Invasion Based IoT Ransomware},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {72--92},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_5},
  doi          = {10.1007/978-3-030-91625-1\_5},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/BrierleyABH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ChenR21,
  author       = {Hsin Yi Chen and
                  Siddharth Prakash Rao},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {Adversarial Trends in Mobile Communication Systems: From Attack Patterns
                  to Potential Defenses Strategies},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {153--171},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_9},
  doi          = {10.1007/978-3-030-91625-1\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/ChenR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/FrimpongRM21,
  author       = {Eugene Frimpong and
                  Reyhaneh Rabbaninejad and
                  Antonis Michalas},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {Arrows in a Quiver: {A} Secure Certificateless Group Key Distribution
                  Protocol for Drones},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {31--48},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_3},
  doi          = {10.1007/978-3-030-91625-1\_3},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/FrimpongRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GarciaS21,
  author       = {Cesar Pereida Garc{\'{\i}}a and
                  Sampo Sovio},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {Size, Speed, and Security: An Ed25519 Case Study},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_2},
  doi          = {10.1007/978-3-030-91625-1\_2},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/GarciaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HagemanHP21,
  author       = {Kaspar Hageman and
                  Ren{\'{e}} Rydhof Hansen and
                  Jens Myrup Pedersen},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {Gollector: Measuring Domain Name Dark Matter from Different Vantage
                  Points},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_8},
  doi          = {10.1007/978-3-030-91625-1\_8},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/HagemanHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MollerSJPBCPLHJ21,
  author       = {Bjarke Hilmer M{\o}ller and
                  Jacob Gosch S{\o}ndergaard and
                  Kristoffer Skagb{\ae}k Jensen and
                  Magnus Winkel Pedersen and
                  Tobias Worm B{\o}gedal and
                  Anton Christensen and
                  Danny B{\o}gsted Poulsen and
                  Kim Guldstrand Larsen and
                  Ren{\'{e}} Rydhof Hansen and
                  Thomas Rosted Jensen and
                  Heino Juvoll Madsen and
                  Henrik Uhrenfeldt},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {Preliminary Security Analysis, Formalisation, and Verification of
                  OpenTitan Secure Boot Code},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_11},
  doi          = {10.1007/978-3-030-91625-1\_11},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MollerSJPBCPLHJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/NiemiPE21,
  author       = {Arto Niemi and
                  Vasile Adrian Bogdan Pop and
                  Jan{-}Erik Ekberg},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {Trusted Sockets Layer: {A} {TLS} 1.3 Based Trusted Channel Protocol},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {175--191},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_10},
  doi          = {10.1007/978-3-030-91625-1\_10},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/NiemiPE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Teseleanu21,
  author       = {George Teseleanu},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {Communicating Through Subliminal-Free Signatures},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_1},
  doi          = {10.1007/978-3-030-91625-1\_1},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/Teseleanu21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/VermeSETZ21,
  author       = {Manuel Del Verme and
                  {\AA}vald {\AA}slaugson Sommervoll and
                  L{\'{a}}szl{\'{o}} Erd{\"{o}}di and
                  Simone Totaro and
                  Fabio Massimo Zennaro},
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {{SQL} Injections and Reinforcement Learning: An Empirical Evaluation
                  of the Role of Action Structure},
  booktitle    = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  pages        = {95--113},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1\_6},
  doi          = {10.1007/978-3-030-91625-1\_6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/VermeSETZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2020,
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-70852-8},
  doi          = {10.1007/978-3-030-70852-8},
  isbn         = {978-3-030-70851-1},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2021,
  editor       = {Nicola Tuveri and
                  Antonis Michalas and
                  Billy Bob Brumley},
  title        = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual
                  Event, November 29-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13115},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91625-1},
  doi          = {10.1007/978-3-030-91625-1},
  isbn         = {978-3-030-91624-4},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AfzalBL20,
  author       = {Zeeshan Afzal and
                  Anna Brunstr{\"{o}}m and
                  Stefan Lindskog},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {Using Features of Encrypted Network Traffic to Detect Malware},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {37--53},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_3},
  doi          = {10.1007/978-3-030-70852-8\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AfzalBL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BakasMU20,
  author       = {Alexandros Bakas and
                  Antonis Michalas and
                  Amjad Ullah},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {(F)unctional Sifting: {A} Privacy-Preserving Reputation System Through
                  Multi-Input Functional Encryption},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {111--126},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_7},
  doi          = {10.1007/978-3-030-70852-8\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BakasMU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BellizziVCH20,
  author       = {Jennifer Bellizzi and
                  Mark Vella and
                  Christian Colombo and
                  Julio C. Hernandez{-}Castro},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {20--36},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_2},
  doi          = {10.1007/978-3-030-70852-8\_2},
  timestamp    = {Sun, 23 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/BellizziVCH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BourBBM20,
  author       = {Guillaume Bour and
                  Karin Bernsmed and
                  Ravishankar Borgaonkar and
                  Per H{\aa}kon Meland},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {On the Certificate Revocation Problem in the Maritime Sector},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {142--157},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_9},
  doi          = {10.1007/978-3-030-70852-8\_9},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BourBBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BrierleyPABH20,
  author       = {Calvin Brierley and
                  Jamie Pont and
                  Budi Arief and
                  David J. Barnes and
                  Julio C. Hernandez{-}Castro},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {Persistence in Linux-Based IoT Malware},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_1},
  doi          = {10.1007/978-3-030-70852-8\_1},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/BrierleyPABH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ChoS20,
  author       = {Joo Yeon Cho and
                  Andrew Sergeev},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {TLV-to-MUC Express: Post-quantum MACsec in {VXLAN}},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {127--141},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_8},
  doi          = {10.1007/978-3-030-70852-8\_8},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/ChoS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/DanglTR20,
  author       = {Thomas Dangl and
                  Benjamin Taubmann and
                  Hans P. Reiser},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {Agent-Based File Extraction Using Virtual Machine Introspection},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {174--191},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_11},
  doi          = {10.1007/978-3-030-70852-8\_11},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/DanglTR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GjosteenHS20,
  author       = {Kristian Gj{\o}steen and
                  Thomas Haines and
                  Morten Rotvold Solberg},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How
                  to Verifiably Mix the {PPATC} Scheme},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {92--107},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_6},
  doi          = {10.1007/978-3-030-70852-8\_6},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/GjosteenHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GustafssonA20,
  author       = {Tommy Gustafsson and
                  Jonas Almroth},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {Cyber Range Automation Overview with a Case Study of {CRATE}},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {192--209},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_12},
  doi          = {10.1007/978-3-030-70852-8\_12},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GustafssonA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HainesGS20,
  author       = {Thomas Haines and
                  Rajeev Gor{\'{e}} and
                  Jack Stodart},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {Machine-Checking the Universal Verifiability of ElectionGuard},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {57--73},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_4},
  doi          = {10.1007/978-3-030-70852-8\_4},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/HainesGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KaramiOS20,
  author       = {Farzane Karami and
                  Olaf Owe and
                  Gerardo Schneider},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {Information-Flow Control by Means of Security Wrappers for Active
                  Object Languages with Futures},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {74--91},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_5},
  doi          = {10.1007/978-3-030-70852-8\_5},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/KaramiOS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/RaileanR20,
  author       = {Alexandr Railean and
                  Delphine Reinhardt},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {OnLITE: On-line Label for IoT Transparency Enhancement},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {229--245},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_14},
  doi          = {10.1007/978-3-030-70852-8\_14},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/RaileanR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ShiS20,
  author       = {Canyang Shi and
                  Huiping Sun},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {HoneyHash: Honeyword Generation Based on Transformed Hashes},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {161--173},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_10},
  doi          = {10.1007/978-3-030-70852-8\_10},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/ShiS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/WairimuM20,
  author       = {Samuel Wairimu and
                  Nurul Momen},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {Privacy Analysis of {COVID-19} Contact Tracing Apps in the {EU}},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {213--228},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_13},
  doi          = {10.1007/978-3-030-70852-8\_13},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/WairimuM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/WatsonJB20,
  author       = {Katie Watson and
                  Mike Just and
                  Tessa Berg},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {An Investigation of Comic-Based Permission Requests},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {246--261},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_15},
  doi          = {10.1007/978-3-030-70852-8\_15},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/WatsonJB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AfzalGLB19,
  author       = {Zeeshan Afzal and
                  Johan Garcia and
                  Stefan Lindskog and
                  Anna Brunstr{\"{o}}m},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Using Partial Signatures in Intrusion Detection for Multipath {TCP}},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {71--86},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_5},
  doi          = {10.1007/978-3-030-35055-0\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AfzalGLB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BisztrayG19,
  author       = {Tam{\'{a}}s Bisztray and
                  Nils Gruschka},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Privacy Impact Assessment: Comparing Methodologies with a Focus on
                  Practicality},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_1},
  doi          = {10.1007/978-3-030-35055-0\_1},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/BisztrayG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BuiAA19,
  author       = {Thanh Bui and
                  Markku Antikainen and
                  Tuomas Aura},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Analysis of Topology Poisoning Attacks in Software-Defined Networking},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {87--102},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_6},
  doi          = {10.1007/978-3-030-35055-0\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BuiAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BuiRAA19,
  author       = {Thanh Bui and
                  Siddharth Prakash Rao and
                  Markku Antikainen and
                  Tuomas Aura},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Client-Side Vulnerabilities in Commercial VPNs},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {103--119},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_7},
  doi          = {10.1007/978-3-030-35055-0\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BuiRAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Cho19,
  author       = {Joo Yeon Cho},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Securing Optical Networks by Modern Cryptographic Techniques},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {120--133},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_8},
  doi          = {10.1007/978-3-030-35055-0\_8},
  timestamp    = {Wed, 13 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/Cho19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/DehlingMI19,
  author       = {Florian Dehling and
                  Tobias Mengel and
                  Luigi Lo Iacono},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Rotten Cellar: Security and Privacy of the Browser Cache Revisited},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {20--36},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_2},
  doi          = {10.1007/978-3-030-35055-0\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/DehlingMI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/DutertreRPR19,
  author       = {Jean{-}Max Dutertre and
                  Timoth{\'{e}}e Riom and
                  Olivier Potin and
                  Jean{-}Baptiste Rigaud},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Experimental Analysis of the Laser-Induced Instruction Skip Fault
                  Model},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {221--237},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_14},
  doi          = {10.1007/978-3-030-35055-0\_14},
  timestamp    = {Wed, 13 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/DutertreRPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GoovaertsAGPV19,
  author       = {Frederik Goovaerts and
                  Gunes Acar and
                  Rafael Galvez and
                  Frank Piessens and
                  Mathy Vanhoef},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Improving Privacy Through Fast Passive Wi-Fi Scanning},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_3},
  doi          = {10.1007/978-3-030-35055-0\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/GoovaertsAGPV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GrimsdalLVBA19,
  author       = {Gunnar Grimsdal and
                  Patrik Lundgren and
                  Christian Vestlund and
                  Felipe Boeira and
                  Mikael Asplund},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Can Microkernels Mitigate Microarchitectural Attacks?},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {238--253},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_15},
  doi          = {10.1007/978-3-030-35055-0\_15},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GrimsdalLVBA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Haines19,
  author       = {Thomas Haines},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Cronus: Everlasting Privacy with Audit and Cast},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {53--68},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_4},
  doi          = {10.1007/978-3-030-35055-0\_4},
  timestamp    = {Wed, 13 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/Haines19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MelandJS19,
  author       = {Per H{\aa}kon Meland and
                  Bent Heier Johansen and
                  Guttorm Sindre},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {An Experimental Analysis of Cryptojacking Attacks},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {155--170},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_10},
  doi          = {10.1007/978-3-030-35055-0\_10},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MelandJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MichalasBDZ19,
  author       = {Antonis Michalas and
                  Alexandros Bakas and
                  Hai{-}Van Dang and
                  Alexandr Zalitko},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {MicroSCOPE: Enabling Access Control in Searchable Encryption with
                  the Use of Attribute-Based Encryption and {SGX}},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {254--270},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_16},
  doi          = {10.1007/978-3-030-35055-0\_16},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MichalasBDZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PontOBAH19,
  author       = {Jamie Pont and
                  Osama Abu Oun and
                  Calvin Brierley and
                  Budi Arief and
                  Julio C. Hernandez{-}Castro},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {A Roadmap for Improving the Impact of Anti-ransomware Research},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {137--154},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_9},
  doi          = {10.1007/978-3-030-35055-0\_9},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/PontOBAH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/RothNHKKRK19,
  author       = {Christian Roth and
                  Mirja Nitschke and
                  Christian Hutzler and
                  Maximilian Koller and
                  Rolf K{\"{u}}ffner and
                  Marc Ro{\ss}berger and
                  Dogan Kesdogan},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {My Smartwatch Is Mine - Machine Learning Based Theft Detection of
                  Smartwatches},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {171--187},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_11},
  doi          = {10.1007/978-3-030-35055-0\_11},
  timestamp    = {Fri, 01 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/RothNHKKRK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SentanoeTR19,
  author       = {Stewart Sentanoe and
                  Benjamin Taubmann and
                  Hans P. Reiser},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {VMIGuard: Detecting and Preventing Service Integrity Violations by
                  Malicious Insiders Using Virtual Machine Introspection},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {271--282},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_17},
  doi          = {10.1007/978-3-030-35055-0\_17},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/SentanoeTR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/WieflingGI19,
  author       = {Stephan Wiefling and
                  Nils Gruschka and
                  Luigi Lo Iacono},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid
                  Usage Behavior for Exploratory Studies of Online Services},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {188--203},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_12},
  doi          = {10.1007/978-3-030-35055-0\_12},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/WieflingGI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/XiongGKL19,
  author       = {Wenjun Xiong and
                  Melek G{\"{u}}lsever and
                  Koray Mustafa Kaya and
                  Robert Lagerstr{\"{o}}m},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {A Study of Security Vulnerabilities and Software Weaknesses in Vehicles},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {204--218},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_13},
  doi          = {10.1007/978-3-030-35055-0\_13},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/XiongGKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2019,
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0},
  doi          = {10.1007/978-3-030-35055-0},
  isbn         = {978-3-030-35054-3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/0001KLH18,
  author       = {Zheng Yang and
                  Mohsin Khan and
                  Wanping Liu and
                  Jun He},
  editor       = {Nils Gruschka},
  title        = {On Security Analysis of Generic Dynamic Authenticated Group Key Exchange},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {121--137},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_8},
  doi          = {10.1007/978-3-030-03638-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/0001KLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AktasS18,
  author       = {Kursat Aktas and
                  Sevil Sen},
  editor       = {Nils Gruschka},
  title        = {UpDroid: Updated Android Malware and Its Familial Classification},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {352--368},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_22},
  doi          = {10.1007/978-3-030-03638-6\_22},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/AktasS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AtashpendarPRR18,
  author       = {Arash Atashpendar and
                  Guru{-}Vamsi Policharla and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Nils Gruschka},
  title        = {Revisiting Deniability in Quantum Key Exchange - via Covert Communication
                  and Entanglement Distillation},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {104--120},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_7},
  doi          = {10.1007/978-3-030-03638-6\_7},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AtashpendarPRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BackendalBSS18,
  author       = {Matilda Backendal and
                  Mihir Bellare and
                  Jessica Sorrell and
                  Jiahao Sun},
  editor       = {Nils Gruschka},
  title        = {The Fiat-Shamir Zoo: Relating the Security of Different Signature
                  Variants},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {154--170},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_10},
  doi          = {10.1007/978-3-030-03638-6\_10},
  timestamp    = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/BackendalBSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BajicB18,
  author       = {Alexander Bajic and
                  Georg T. Becker},
  editor       = {Nils Gruschka},
  title        = {Attack Simulation for a Realistic Evaluation and Comparison of Network
                  Security Techniques},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {236--254},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_15},
  doi          = {10.1007/978-3-030-03638-6\_15},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/BajicB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BastysPS18,
  author       = {Iulia Bastys and
                  Frank Piessens and
                  Andrei Sabelfeld},
  editor       = {Nils Gruschka},
  title        = {Tracking Information Flow via Delayed Output - Addressing Privacy
                  in IoT and Emailing Apps},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {19--37},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_2},
  doi          = {10.1007/978-3-030-03638-6\_2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/BastysPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BuldasLT18,
  author       = {Ahto Buldas and
                  Risto Laanoja and
                  Ahto Truu},
  editor       = {Nils Gruschka},
  title        = {A Blockchain-Assisted Hash-Based Signature Scheme},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {138--153},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_9},
  doi          = {10.1007/978-3-030-03638-6\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BuldasLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/DahlbergP18,
  author       = {Rasmus Dahlberg and
                  Tobias Pulls},
  editor       = {Nils Gruschka},
  title        = {Verifiable Light-Weight Monitoring for Certificate Transparency Logs},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {171--183},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_11},
  doi          = {10.1007/978-3-030-03638-6\_11},
  timestamp    = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/DahlbergP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GencLR18,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Nils Gruschka},
  title        = {Next Generation Cryptographic Ransomware},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {385--401},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_24},
  doi          = {10.1007/978-3-030-03638-6\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GencLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Guanciale18,
  author       = {Roberto Guanciale},
  editor       = {Nils Gruschka},
  title        = {Protecting Instruction Set Randomization from Code Reuse Attacks},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {421--436},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_26},
  doi          = {10.1007/978-3-030-03638-6\_26},
  timestamp    = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/Guanciale18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HamannHMM0T18,
  author       = {Tobias Hamann and
                  Mihai Herda and
                  Heiko Mantel and
                  Martin Mohr and
                  David Schneider and
                  Markus Tasch},
  editor       = {Nils Gruschka},
  title        = {A Uniform Information-Flow Security Benchmark Suite for Source Code
                  and Bytecode},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {437--453},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_27},
  doi          = {10.1007/978-3-030-03638-6\_27},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/HamannHMM0T18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KimKLKK18,
  author       = {Kuyju Kim and
                  Taeyun Kim and
                  Seungjin Lee and
                  Soolin Kim and
                  Hyoungshick Kim},
  editor       = {Nils Gruschka},
  title        = {When Harry Met Tinder: Security Analysis of Dating Apps on Android},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {454--467},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_28},
  doi          = {10.1007/978-3-030-03638-6\_28},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/KimKLKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KrumayBW18,
  author       = {Barbara Krumay and
                  Edward W. N. Bernroider and
                  Roman Walser},
  editor       = {Nils Gruschka},
  title        = {Evaluation of Cybersecurity Management Controls and Metrics of Critical
                  Infrastructures: {A} Literature Review Considering the {NIST} Cybersecurity
                  Framework},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {369--384},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_23},
  doi          = {10.1007/978-3-030-03638-6\_23},
  timestamp    = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/KrumayBW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LashermesB018,
  author       = {Ronan Lashermes and
                  H{\'{e}}l{\`{e}}ne Le Bouder and
                  Ga{\"{e}}l Thomas},
  editor       = {Nils Gruschka},
  title        = {Hardware-Assisted Program Execution Integrity: {HAPEI}},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {405--420},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_25},
  doi          = {10.1007/978-3-030-03638-6\_25},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/LashermesB018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LiangWYY18,
  author       = {Hongliang Liang and
                  Yudong Wang and
                  Tianqi Yang and
                  Yue Yu},
  editor       = {Nils Gruschka},
  title        = {AppLance: {A} Lightweight Approach to Detect Privacy Leak for Packed
                  Applications},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {54--70},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_4},
  doi          = {10.1007/978-3-030-03638-6\_4},
  timestamp    = {Mon, 12 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/LiangWYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MaennelMM18,
  author       = {Kaie Maennel and
                  Sten M{\"{a}}ses and
                  Olaf Maennel},
  editor       = {Nils Gruschka},
  title        = {Cyber Hygiene: The Big Picture},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {291--305},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_18},
  doi          = {10.1007/978-3-030-03638-6\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/MaennelMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MandalAZ18,
  author       = {Avikarsha Mandal and
                  Frederik Armknecht and
                  Erik Zenner},
  editor       = {Nils Gruschka},
  title        = {Privacy-Preserving Distributed Economic Dispatch Protocol for Smart
                  Grid},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_1},
  doi          = {10.1007/978-3-030-03638-6\_1},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MandalAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/NitschkeHHK18,
  author       = {Mirja Nitschke and
                  Philipp Holler and
                  Lukas Hartmann and
                  Dogan Kesdogan},
  editor       = {Nils Gruschka},
  title        = {MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication
                  in Mix Zones},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {38--53},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_3},
  doi          = {10.1007/978-3-030-03638-6\_3},
  timestamp    = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/NitschkeHHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/NurmiN18,
  author       = {Juha Nurmi and
                  Mikko S. Niemel{\"{a}}},
  editor       = {Nils Gruschka},
  title        = {{PESTEL} Analysis of Hacktivism Campaign Motivations},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {323--335},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_20},
  doi          = {10.1007/978-3-030-03638-6\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/NurmiN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PullsD18,
  author       = {Tobias Pulls and
                  Rasmus Dahlberg},
  editor       = {Nils Gruschka},
  title        = {Steady - {A} Simple End-to-End Secure Logging System},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_6},
  doi          = {10.1007/978-3-030-03638-6\_6},
  timestamp    = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/PullsD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ReinthalFA18,
  author       = {Alexander Reinthal and
                  Eleftherios Lef Filippakis and
                  Magnus Almgren},
  editor       = {Nils Gruschka},
  title        = {Data Modelling for Predicting Exploits},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {336--351},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_21},
  doi          = {10.1007/978-3-030-03638-6\_21},
  timestamp    = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/ReinthalFA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/RooneyF18,
  author       = {Vivien M. Rooney and
                  Simon N. Foley},
  editor       = {Nils Gruschka},
  title        = {What You Can Change and What You Can't: Human Experience in Computer
                  Network Defenses},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {219--235},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_14},
  doi          = {10.1007/978-3-030-03638-6\_14},
  timestamp    = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/RooneyF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/RyggeJ18,
  author       = {Hanne Rygge and
                  Audun J{\o}sang},
  editor       = {Nils Gruschka},
  title        = {Threat Poker: Solving Security and Privacy Threats in Agile Software
                  Development},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {468--483},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_29},
  doi          = {10.1007/978-3-030-03638-6\_29},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/RyggeJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SentanoeTR18,
  author       = {Stewart Sentanoe and
                  Benjamin Taubmann and
                  Hans P. Reiser},
  editor       = {Nils Gruschka},
  title        = {Sarracenia: Enhancing the Performance and Stealthiness of {SSH} Honeypots
                  Using Virtual Machine Introspection},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {255--271},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_16},
  doi          = {10.1007/978-3-030-03638-6\_16},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/SentanoeTR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/StylianopoulosJ18,
  author       = {Charalampos Stylianopoulos and
                  Linus Johansson and
                  Oskar Olsson and
                  Magnus Almgren},
  editor       = {Nils Gruschka},
  title        = {CLort: High Throughput and Low Energy Network Intrusion Detection
                  on IoT Devices with Embedded GPUs},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_12},
  doi          = {10.1007/978-3-030-03638-6\_12},
  timestamp    = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/StylianopoulosJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Teseleanu18,
  author       = {George Teseleanu},
  editor       = {Nils Gruschka},
  title        = {Unifying Kleptographic Attacks},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {73--87},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_5},
  doi          = {10.1007/978-3-030-03638-6\_5},
  timestamp    = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/Teseleanu18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/YesufP18,
  author       = {Ahmed Seid Yesuf and
                  Christian W. Probst},
  editor       = {Nils Gruschka},
  title        = {Estimating the Risk of Fraud Against E-Services},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {306--322},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_19},
  doi          = {10.1007/978-3-030-03638-6\_19},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/YesufP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ZahoorIA018,
  author       = {Ehtesham Zahoor and
                  Asim Ikram and
                  Sabina Akhtar and
                  Olivier Perrin},
  editor       = {Nils Gruschka},
  title        = {Authorization Policies Specification and Consistency Management within
                  Multi-cloud Environments},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {272--288},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_17},
  doi          = {10.1007/978-3-030-03638-6\_17},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/ZahoorIA018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ZillienW18,
  author       = {Sebastian Zillien and
                  Steffen Wendzel},
  editor       = {Nils Gruschka},
  title        = {Detection of Covert Channels in {TCP} Retransmissions},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {203--218},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_13},
  doi          = {10.1007/978-3-030-03638-6\_13},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/ZillienW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2018,
  editor       = {Nils Gruschka},
  title        = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6},
  doi          = {10.1007/978-3-030-03638-6},
  isbn         = {978-3-030-03637-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AbedBL17,
  author       = {Farzaneh Abed and
                  Francesco Berti and
                  Stefan Lucks},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Is {RCB} a Leakage Resilient Authenticated Encryption Scheme?},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {39--52},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_3},
  doi          = {10.1007/978-3-319-70290-2\_3},
  timestamp    = {Mon, 26 Jun 2023 20:48:37 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AbedBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BalthasarH17,
  author       = {Thibault de Balthasar and
                  Julio C. Hernandez{-}Castro},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {An Analysis of Bitcoin Laundry Services},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {297--312},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_18},
  doi          = {10.1007/978-3-319-70290-2\_18},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BalthasarH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BuiA17,
  author       = {Thanh Bui and
                  Tuomas Aura},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {{GPASS:} {A} Password Manager with Group-Based Access Control},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {229--244},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_14},
  doi          = {10.1007/978-3-319-70290-2\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BuiA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BuldasLT17,
  author       = {Ahto Buldas and
                  Risto Laanoja and
                  Ahto Truu},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {A Server-Assisted Hash-Based Signature Scheme},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_1},
  doi          = {10.1007/978-3-319-70290-2\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BuldasLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ChockalingamPTG17,
  author       = {Sabarathinam Chockalingam and
                  Wolter Pieters and
                  Andr{\'{e}} Teixeira and
                  Pieter H. A. J. M. van Gelder},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Bayesian Network Models in Cyber Security: {A} Systematic Review},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {105--122},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_7},
  doi          = {10.1007/978-3-319-70290-2\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/ChockalingamPTG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/CostaMM17,
  author       = {N{\'{u}}ria Costa and
                  Ramiro Mart{\'{\i}}nez and
                  Paz Morillo},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Proof of a Shuffle for Lattice-Based Cryptography},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {280--296},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_17},
  doi          = {10.1007/978-3-319-70290-2\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/CostaMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GayHMS17,
  author       = {Richard Gay and
                  Jinwei Hu and
                  Heiko Mantel and
                  Johannes Schickel},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Towards Accelerated Usage Control Based on Access Correlations},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {245--261},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_15},
  doi          = {10.1007/978-3-319-70290-2\_15},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/GayHMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GeniolaAA17,
  author       = {Alberto Geniola and
                  Markku Antikainen and
                  Tuomas Aura},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {A Large-Scale Analysis of Download Portals and Freeware Installers},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {209--225},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_13},
  doi          = {10.1007/978-3-319-70290-2\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GeniolaAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GeraudKLNS17,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  Mirko Koscina and
                  Paul Lenczner and
                  David Naccache and
                  David Saulpic},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Generating Functionally Equivalent Programs Having Non-isomorphic
                  Control-Flow Graphs},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {265--279},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_16},
  doi          = {10.1007/978-3-319-70290-2\_16},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/GeraudKLNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Giustolisi17,
  author       = {Rosario Giustolisi},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport
                  Tickets},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {159--174},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_10},
  doi          = {10.1007/978-3-319-70290-2\_10},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/Giustolisi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KiennertKLRG17,
  author       = {Christophe Kiennert and
                  Nesrine Kaaniche and
                  Maryline Laurent and
                  Pierre{-}Olivier Rocher and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Anonymous Certification for an e-Assessment Framework},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {70--85},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_5},
  doi          = {10.1007/978-3-319-70290-2\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/KiennertKLRG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LaudP17,
  author       = {Peeter Laud and
                  Alisa Pankova},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {139--155},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_9},
  doi          = {10.1007/978-3-319-70290-2\_9},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/LaudP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MaennelOM17,
  author       = {Kaie Maennel and
                  Rain Ottis and
                  Olaf Maennel},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Improving and Measuring Learning Effectiveness at Cyber Defense Exercises},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {123--138},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_8},
  doi          = {10.1007/978-3-319-70290-2\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/MaennelOM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MiyoshiYFM17,
  author       = {Ryuji Miyoshi and
                  Hiroaki Yamamoto and
                  Hiroshi Fujiwara and
                  Takashi Miyazaki},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Practical and Secure Searchable Symmetric Encryption with a Small
                  Index},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {53--69},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_4},
  doi          = {10.1007/978-3-319-70290-2\_4},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MiyoshiYFM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MorganP17,
  author       = {Danielle Morgan and
                  Arnis Parsovs},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Using the Estonian Electronic Identity Card for Authentication to
                  a Machine},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {175--191},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_11},
  doi          = {10.1007/978-3-319-70290-2\_11},
  timestamp    = {Fri, 24 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MorganP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/OhtakeSZ17,
  author       = {Go Ohtake and
                  Reihaneh Safavi{-}Naini and
                  Liang Feng Zhang},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Outsourcing of Verifiable Attribute-Based Keyword Search},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {18--35},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_2},
  doi          = {10.1007/978-3-319-70290-2\_2},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/OhtakeSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PalisseDBGL17,
  author       = {Aur{\'{e}}lien Palisse and
                  Antoine Durand and
                  H{\'{e}}l{\`{e}}ne Le Bouder and
                  Colas Le Guernic and
                  Jean{-}Louis Lanet},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Data Aware Defense (DaD): Towards a Generic and Practical Ransomware
                  Countermeasure},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {192--208},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_12},
  doi          = {10.1007/978-3-319-70290-2\_12},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/PalisseDBGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/RothHK17,
  author       = {Christian Roth and
                  Lukas Hartmann and
                  Dogan Kesdogan},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {{PARTS} - Privacy-Aware Routing with Transportation Subgraphs},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {86--101},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_6},
  doi          = {10.1007/978-3-319-70290-2\_6},
  timestamp    = {Fri, 01 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/RothHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2017,
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2},
  doi          = {10.1007/978-3-319-70290-2},
  isbn         = {978-3-319-70289-6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AhmadCG16,
  author       = {Maqsood Ahmad and
                  Bruno Crispo and
                  Teklay Gebremichael},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Empirical Analysis on the Use of Dynamic Code Updates in Android and
                  Its Security Implications},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {119--134},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_8},
  doi          = {10.1007/978-3-319-47560-8\_8},
  timestamp    = {Sun, 25 Oct 2020 22:36:50 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/AhmadCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BlumbergsPKMV16,
  author       = {Bernhards Blumbergs and
                  Mauno Pihelgas and
                  Markus Kont and
                  Olaf Maennel and
                  Risto Vaarandi},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Creating and Detecting IPv6 Transition Mechanism-Based Information
                  Exfiltration Covert Channels},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {85--100},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_6},
  doi          = {10.1007/978-3-319-47560-8\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BlumbergsPKMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/DahlbergPP16,
  author       = {Rasmus Dahlberg and
                  Tobias Pulls and
                  Roel Peeters},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Efficient Sparse Merkle Trees - Caching Strategies and Secure (Non-)Membership
                  Proofs},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {199--215},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_13},
  doi          = {10.1007/978-3-319-47560-8\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/DahlbergPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/FabreDVB16,
  author       = {Pierre{-}Edouard Fabre and
                  Herv{\'{e}} Debar and
                  Jouni Viinikka and
                  Gr{\'{e}}gory Blanc},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {{ML:} DDoS Damage Control with {MPLS}},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {101--116},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_7},
  doi          = {10.1007/978-3-319-47560-8\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/FabreDVB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GadyatskayaLZ16,
  author       = {Olga Gadyatskaya and
                  Andra{-}Lidia Lezza and
                  Yury Zhauniarovich},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Evaluation of Resource-Based App Repackaging Detection in Android},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {135--151},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_9},
  doi          = {10.1007/978-3-319-47560-8\_9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GadyatskayaLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GranadilloAMMGD16,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Ender Alvarez and
                  Alexander Motzek and
                  Matteo Merialdo and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Towards an Automated and Dynamic Risk Management Response System},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {37--53},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_3},
  doi          = {10.1007/978-3-319-47560-8\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/GranadilloAMMGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GuAP16,
  author       = {Min Gu and
                  Zaruhi Aslanyan and
                  Christian W. Probst},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Understanding How Components of Organisations Contribute to Attacks},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {54--66},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_4},
  doi          = {10.1007/978-3-319-47560-8\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/GuAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GueronS16,
  author       = {Shay Gueron and
                  Fabian Schlieker},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Speeding up {R-LWE} Post-quantum Key Exchange},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {187--198},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_12},
  doi          = {10.1007/978-3-319-47560-8\_12},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GueronS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HalunenV16,
  author       = {Kimmo Halunen and
                  Visa Antero Vallivaara},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Secure, Usable and Privacy-Friendly User Authentication from Keystroke
                  Dynamics},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {256--268},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_16},
  doi          = {10.1007/978-3-319-47560-8\_16},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/HalunenV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KonigSR16,
  author       = {Sandra K{\"{o}}nig and
                  Stefan Schauer and
                  Stefan Rass},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous
                  Networks},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {67--81},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_5},
  doi          = {10.1007/978-3-319-47560-8\_5},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/KonigSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KouchamMHTM16,
  author       = {Oualid Koucham and
                  St{\'{e}}phane Mocanu and
                  Guillaume Hiet and
                  Jean{-}Marc Thiriet and
                  Fr{\'{e}}d{\'{e}}ric Majorczyk},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Detecting Process-Aware Attacks in Sequential Control Systems},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {20--36},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_2},
  doi          = {10.1007/978-3-319-47560-8\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/KouchamMHTM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LaudP16,
  author       = {Peeter Laud and
                  Martin Pettai},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Secure Multiparty Sorting Protocols with Covert Privacy},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {216--231},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_14},
  doi          = {10.1007/978-3-319-47560-8\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/LaudP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PotthastFLL16,
  author       = {Martin Potthast and
                  Christian Forler and
                  Eik List and
                  Stefan Lucks},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Passphone: Outsourcing Phone-Based Web Authentication While Protecting
                  User Privacy},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {235--255},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_15},
  doi          = {10.1007/978-3-319-47560-8\_15},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/PotthastFLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/RautiLUHRHL16,
  author       = {Sampsa Rauti and
                  Samuel Laur{\'{e}}n and
                  Joni Uitto and
                  Shohreh Hosseinzadeh and
                  Jukka Ruohonen and
                  Sami Hyrynsalmi and
                  Ville Lepp{\"{a}}nen},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {A Survey on Internal Interfaces Used by Exploits and Implications
                  on Interface Diversification},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {152--168},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_10},
  doi          = {10.1007/978-3-319-47560-8\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/RautiLUHRHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Rubio-HernanCG16,
  author       = {Jose Rubio{-}Hernan and
                  Luca De Cicco and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity
                  Attacks},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {3--19},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_1},
  doi          = {10.1007/978-3-319-47560-8\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Rubio-HernanCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Ruiter16,
  author       = {Joeri de Ruiter},
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {A Tale of the OpenSSL State Machine: {A} Large-Scale Black-Box Analysis},
  booktitle    = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  pages        = {169--184},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8\_11},
  doi          = {10.1007/978-3-319-47560-8\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Ruiter16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2016,
  editor       = {Billy Bob Brumley and
                  Juha R{\"{o}}ning},
  title        = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu,
                  Finland, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10014},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47560-8},
  doi          = {10.1007/978-3-319-47560-8},
  isbn         = {978-3-319-47559-2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BahsiM15,
  author       = {Hayretdin Bahsi and
                  Olaf Manuel Maennel},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {A Conceptual Nationwide Cyber Situational Awareness Framework for
                  Critical Infrastructures},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {3--10},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_1},
  doi          = {10.1007/978-3-319-26502-5\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BahsiM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BoskKB15,
  author       = {Daniel Bosk and
                  Martin Kjellqvist and
                  Sonja Buchegger},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {Towards Perfectly Secure and Deniable Communication Using an NFC-Based
                  Key-Exchange Scheme},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {72--87},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_6},
  doi          = {10.1007/978-3-319-26502-5\_6},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BoskKB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Brumley15,
  author       = {Billy Bob Brumley},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {Faster Binary Curve Software: {A} Case Study},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {91--105},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_7},
  doi          = {10.1007/978-3-319-26502-5\_7},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Brumley15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/CatuognoGP15,
  author       = {Luigi Catuogno and
                  Clemente Galdi and
                  Giuseppe Persiano},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {Guaranteeing Dependency Enforcement in Software Updates},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {205--212},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_15},
  doi          = {10.1007/978-3-319-26502-5\_15},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/CatuognoGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Gorton15,
  author       = {Dan Gorton},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {IncidentResponseSim: An Agent-Based Simulation Tool for Risk Management
                  of Online Fraud},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {172--187},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_12},
  doi          = {10.1007/978-3-319-26502-5\_12},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Gorton15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GreschbachREB15,
  author       = {Benjamin Greschbach and
                  Guillermo Rodr{\'{\i}}guez{-}Cano and
                  Tomas Ericsson and
                  Sonja Buchegger},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {Design of a Privacy-Preserving Document Submission and Grading System},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {64--71},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_5},
  doi          = {10.1007/978-3-319-26502-5\_5},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GreschbachREB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HolmKVW15,
  author       = {Hannes Holm and
                  Martin Karresand and
                  Arne Vidstr{\"{o}}m and
                  Erik Westring},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {A Survey of Industrial Control System Testbeds},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {11--26},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_2},
  doi          = {10.1007/978-3-319-26502-5\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/HolmKVW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/JagerRAH15,
  author       = {Bernd J{\"{a}}ger and
                  Christian R{\"{o}}pke and
                  Iris Adam and
                  Thorsten Holz},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {Multi-layer Access Control for SDN-Based Telco Clouds},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {197--204},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_14},
  doi          = {10.1007/978-3-319-26502-5\_14},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/JagerRAH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/JinP15,
  author       = {Hongyu Jin and
                  Panos Papadimitratos},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {Resilient Collaborative Privacy for Location-Based Services},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {47--63},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_4},
  doi          = {10.1007/978-3-319-26502-5\_4},
  timestamp    = {Fri, 09 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/JinP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Lopez-RojasA15,
  author       = {Edgar Alonso Lopez{-}Rojas and
                  Stefan Axelsson},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage
                  of Retail Fraud},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_11},
  doi          = {10.1007/978-3-319-26502-5\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/Lopez-RojasA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LoutfiJ15,
  author       = {Ijlal Loutfi and
                  Audun J{\o}sang},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {{FIDO} Trust Requirements},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {139--155},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_10},
  doi          = {10.1007/978-3-319-26502-5\_10},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/LoutfiJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PedersenSLNH15,
  author       = {Martin Leth Pedersen and
                  Michael Hedegaard S{\o}rensen and
                  Daniel Lux and
                  Ulrik Nyman and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {The Timed Decentralised Label Model},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {27--43},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_3},
  doi          = {10.1007/978-3-319-26502-5\_3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/PedersenSLNH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SaarinenB15,
  author       = {Markku{-}Juhani O. Saarinen and
                  Billy Bob Brumley},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {WHIRLBOB, the Whirlpool Based Variant of {STRIBOB}},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {106--122},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_8},
  doi          = {10.1007/978-3-319-26502-5\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/SaarinenB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SuorantaHA15,
  author       = {Sanna Suoranta and
                  Lari Haataja and
                  Tuomas Aura},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {Electronic Citizen Identities and Strong Authentication},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {213--230},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_16},
  doi          = {10.1007/978-3-319-26502-5\_16},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/SuorantaHA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/VoronkovLM15,
  author       = {Artem Voronkov and
                  Stefan Lindskog and
                  Leonardo A. Martucci},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {Challenges in Managing Firewalls},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {191--196},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_13},
  doi          = {10.1007/978-3-319-26502-5\_13},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/VoronkovLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/YangO15,
  author       = {Huihui Yang and
                  Vladimir A. Oleshchuk},
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {An Efficient Traceable Attribute-Based Authentication Scheme with
                  One-Time Attribute Trees},
  booktitle    = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  pages        = {123--135},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5\_9},
  doi          = {10.1007/978-3-319-26502-5\_9},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/YangO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2015,
  editor       = {Sonja Buchegger and
                  Mads Dam},
  title        = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm,
                  Sweden, October 19-21, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9417},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26502-5},
  doi          = {10.1007/978-3-319-26502-5},
  isbn         = {978-3-319-26501-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AnguloWH14,
  author       = {Julio Angulo and
                  Erik W{\"{a}}stlund and
                  Johan H{\"{o}}gberg},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {What Would It Take for You to Tell Your Secrets to a Cloud? - Studying
                  Decision Factors When Disclosing Information to Cloud Services},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_8},
  doi          = {10.1007/978-3-319-11599-3\_8},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AnguloWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AntikainenAS14,
  author       = {Markku Antikainen and
                  Tuomas Aura and
                  Mikko S{\"{a}}rel{\"{a}}},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Spook in Your Network: Attacking an {SDN} with a Compromised OpenFlow
                  Switch},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {229--244},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_14},
  doi          = {10.1007/978-3-319-11599-3\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AntikainenAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BergstromA14,
  author       = {Erik Bergstr{\"{o}}m and
                  Rose{-}Mharie {\AA}hlfeldt},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Information Classification Issues},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {27--41},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_2},
  doi          = {10.1007/978-3-319-11599-3\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BergstromA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BessonBJ14,
  author       = {Fr{\'{e}}d{\'{e}}ric Besson and
                  Nataliia Bielova and
                  Thomas P. Jensen},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Browser Randomisation against Fingerprinting: {A} Quantitative Information
                  Flow Approach},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_11},
  doi          = {10.1007/978-3-319-11599-3\_11},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BessonBJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BogdanovLT14,
  author       = {Dan Bogdanov and
                  Sven Laur and
                  Riivo Talviste},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party
                  Computation},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {59--74},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_4},
  doi          = {10.1007/978-3-319-11599-3\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BogdanovLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BuldasTLG14,
  author       = {Ahto Buldas and
                  Ahto Truu and
                  Risto Laanoja and
                  Rainer Gerhards},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Efficient Record-Level Keyless Signatures for Audit Logs},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {149--164},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_9},
  doi          = {10.1007/978-3-319-11599-3\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BuldasTLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Giunti14,
  author       = {Marco Giunti},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Static Semantics of Secret Channel Abstractions},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {165--180},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_10},
  doi          = {10.1007/978-3-319-11599-3\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Giunti14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GligoroskiMSJJE14,
  author       = {Danilo Gligoroski and
                  Hristina Mihajloska and
                  Simona Samardjiska and
                  H{\aa}kon Jacobsen and
                  Rune Erlend Jensen and
                  Mohamed El{-}Hadedy},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {{\(\pi\)}-Cipher: Authenticated Encryption for Big Data},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {110--128},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_7},
  doi          = {10.1007/978-3-319-11599-3\_7},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GligoroskiMSJJE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GondiSV14,
  author       = {Kalpana Gondi and
                  A. Prasad Sistla and
                  V. N. Venkatakrishnan},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {{DEICS:} Data Erasure in Concurrent Software},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {42--58},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_3},
  doi          = {10.1007/978-3-319-11599-3\_3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GondiSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KalliolaAS14,
  author       = {Aapo Kalliola and
                  Tuomas Aura and
                  Sanja Scepanovic},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Denial-of-Service Mitigation for Internet Services},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {213--228},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_13},
  doi          = {10.1007/978-3-319-11599-3\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/KalliolaAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LeninWS14,
  author       = {Aleksandr Lenin and
                  Jan Willemson and
                  Dyan Permata Sari},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Attacker Profiling in Quantitative Security Assessment Based on Attack
                  Trees},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {199--212},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_12},
  doi          = {10.1007/978-3-319-11599-3\_12},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/LeninWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Pearson14,
  author       = {Siani Pearson},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Accountability in Cloud Service Provision Ecosystems},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_1},
  doi          = {10.1007/978-3-319-11599-3\_1},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Pearson14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PflugB14,
  author       = {Anika Pflug and
                  Christoph Busch},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Segmentation and Normalization of Human Ears Using Cascaded Pose Regression},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {261--272},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_16},
  doi          = {10.1007/978-3-319-11599-3\_16},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/PflugB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ReshetovaKNA14,
  author       = {Elena Reshetova and
                  Janne Karhunen and
                  Thomas Nyman and
                  N. Asokan},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Security of OS-Level Virtualization Technologies},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {77--93},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_5},
  doi          = {10.1007/978-3-319-11599-3\_5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/ReshetovaKNA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/TrombettaPB14,
  author       = {Alberto Trombetta and
                  Giuseppe Persiano and
                  Stefano Braghin},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Processing Private Queries over an Obfuscated Database Using Hidden
                  Vector Encryption},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {94--109},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_6},
  doi          = {10.1007/978-3-319-11599-3\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/TrombettaPB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/XuC14,
  author       = {Liangyu Xu and
                  Armin B. Cremers},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Patients' Privacy Protection against Insurance Companies in eHealth
                  Systems},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {247--260},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_15},
  doi          = {10.1007/978-3-319-11599-3\_15},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/XuC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2014,
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3},
  doi          = {10.1007/978-3-319-11599-3},
  isbn         = {978-3-319-11598-6},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AnsperBFW13,
  author       = {Arne Ansper and
                  Ahto Buldas and
                  Margus Freudenthal and
                  Jan Willemson},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {High-Performance Qualified Digital Signatures for X-Road},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {123--138},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_9},
  doi          = {10.1007/978-3-642-41488-6\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AnsperBFW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AntoniniBP13,
  author       = {Alessio Antonini and
                  Alessandro Barenghi and
                  Gerardo Pelosi},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Security Analysis of Building Automation Networks - Threat Model and
                  Viable Mitigation Techniques},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {199--214},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_14},
  doi          = {10.1007/978-3-642-41488-6\_14},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AntoniniBP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AyalewKC13,
  author       = {Tigist Ayalew and
                  Tigist Kidane and
                  Bengt Carlsson},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Identification and Evaluation of Security Activities in Agile Projects},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {139--153},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_10},
  doi          = {10.1007/978-3-642-41488-6\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AyalewKC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Balliu13,
  author       = {Musard Balliu},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {A Logic for Information Flow Analysis of Distributed Programs},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {84--99},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_6},
  doi          = {10.1007/978-3-642-41488-6\_6},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Balliu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BraunPP13,
  author       = {Bastian Braun and
                  Christian v. Pollak and
                  Joachim Posegga},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {A Survey on Control-Flow Integrity Means in Web Application Frameworks},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {231--246},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_16},
  doi          = {10.1007/978-3-642-41488-6\_16},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BraunPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BroekS13,
  author       = {Fabian van den Broek and
                  Ronny Wichers Schreur},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Femtocell Security in Theory and Practice},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_13},
  doi          = {10.1007/978-3-642-41488-6\_13},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BroekS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BuirasR13,
  author       = {Pablo Buiras and
                  Alejandro Russo},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Lazy Programs Leak Secrets},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {116--122},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_8},
  doi          = {10.1007/978-3-642-41488-6\_8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BuirasR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BuldasKL13,
  author       = {Ahto Buldas and
                  Andres Kroonmaa and
                  Risto Laanoja},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Keyless Signatures' Infrastructure: How to Build Global Distributed
                  Hash-Trees},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {313--320},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_21},
  doi          = {10.1007/978-3-642-41488-6\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BuldasKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BurgersVE13,
  author       = {Willem Burgers and
                  Roel Verdult and
                  Marko C. J. D. van Eekelen},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Prevent Session Hijacking by Binding the Session to the Cryptographic
                  Network Credentials},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {33--50},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_3},
  doi          = {10.1007/978-3-642-41488-6\_3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BurgersVE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HachemGD13,
  author       = {Nabil Hachem and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {An Adaptive Mitigation Framework for Handling Suspicious Network Flows
                  via {MPLS} Policies},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {297--312},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_20},
  doi          = {10.1007/978-3-642-41488-6\_20},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/HachemGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HasuBH13,
  author       = {Tero Hasu and
                  Anya Helene Bagge and
                  Magne Haveraaen},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Inferring Required Permissions for Statically Composed Programs},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {51--66},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_4},
  doi          = {10.1007/978-3-642-41488-6\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/HasuBH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KrotofilC13,
  author       = {Marina Krotofil and
                  Alvaro A. C{\'{a}}rdenas},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Resilience of Process Control Systems to Cyber-Physical Attacks},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {166--182},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_12},
  doi          = {10.1007/978-3-642-41488-6\_12},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/KrotofilC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LouwPKV13,
  author       = {Mike Ter Louw and
                  Phu H. Phung and
                  Rohini Krishnamurti and
                  Venkat N. Venkatakrishnan},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {SafeScript: JavaScript Transformation for Policy Enforcement},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {67--83},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_5},
  doi          = {10.1007/978-3-642-41488-6\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/LouwPKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MauroFMD13,
  author       = {Alessio Di Mauro and
                  Xenofon Fafoutis and
                  Sebastian M{\"{o}}dersheim and
                  Nicola Dragoni},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated
                  {MAC} Protocols for Energy Efficient WSNs},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_1},
  doi          = {10.1007/978-3-642-41488-6\_1},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MauroFMD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MilushevC13,
  author       = {Dimiter Milushev and
                  Dave Clarke},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Incremental Hyperproperty Model Checking via Games},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {247--262},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_17},
  doi          = {10.1007/978-3-642-41488-6\_17},
  timestamp    = {Wed, 22 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MilushevC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/NagyAO13,
  author       = {Marcin Nagy and
                  N. Asokan and
                  J{\"{o}}rg Ott},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {PeerShare: {A} System Secure Distribution of Sensitive Data among
                  Social Contacts},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {154--165},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_11},
  doi          = {10.1007/978-3-642-41488-6\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/NagyAO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PaladiGM13,
  author       = {Nicolae Paladi and
                  Christian Gehrmann and
                  Fredric Morenius},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Domain-Based Storage Protection {(DBSP)} in Public Infrastructure
                  Clouds},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {279--296},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_19},
  doi          = {10.1007/978-3-642-41488-6\_19},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/PaladiGM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/PettaiL13,
  author       = {Martin Pettai and
                  Peeter Laud},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Dynamics and Secure Information Flow for a Higher-Order Pi-Calculus},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {100--115},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_7},
  doi          = {10.1007/978-3-642-41488-6\_7},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/PettaiL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SansCH13,
  author       = {Thierry Sans and
                  Iliano Cervesato and
                  Soha Hussein},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Controlling Data Flow with a Policy-Based Programming Language for
                  the Web},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {215--230},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_15},
  doi          = {10.1007/978-3-642-41488-6\_15},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/SansCH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Stokes13,
  author       = {Klara Stokes},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Graph k-Anonymity through k-Means and as Modular Decomposition},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {263--278},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_18},
  doi          = {10.1007/978-3-642-41488-6\_18},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Stokes13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/VigoBY13,
  author       = {Roberto Vigo and
                  Alessandro Bruni and
                  Ender Y{\"{u}}ksel},
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Security Games for Cyber-Physical Systems},
  booktitle    = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6\_2},
  doi          = {10.1007/978-3-642-41488-6\_2},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/VigoBY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2013,
  editor       = {Hanne Riis Nielson and
                  Dieter Gollmann},
  title        = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat,
                  Greenland, October 18-21, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8208},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41488-6},
  doi          = {10.1007/978-3-642-41488-6},
  isbn         = {978-3-642-41487-9},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AdolphiL12,
  author       = {Benjamin Adolphi and
                  Hanno Langweg},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Security Add-Ons for Mobile Platforms},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {17--30},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_2},
  doi          = {10.1007/978-3-642-34210-3\_2},
  timestamp    = {Sat, 19 Oct 2019 20:02:02 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AdolphiL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BlomGPRV12,
  author       = {Arjan Blom and
                  Gerhard de Koning Gans and
                  Erik Poll and
                  Joeri de Ruiter and
                  Roel Verdult},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Designed to Fail: {A} USB-Connected Reader for Online Banking},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_1},
  doi          = {10.1007/978-3-642-34210-3\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BlomGPRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Clark12,
  author       = {Jason W. Clark},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Everything But the Kitchen Sink: Determining the Effect of Multiple
                  Attacks on Privacy Preserving Technology Users},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {199--214},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_14},
  doi          = {10.1007/978-3-642-34210-3\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Clark12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/DuanZ12,
  author       = {Huiying Duan and
                  C{\"{a}}cilia Zirn},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Can We Identify Manipulative Behavior and the Corresponding Suspects
                  on Review Websites Using Supervised Learning?},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {215--230},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_15},
  doi          = {10.1007/978-3-642-34210-3\_15},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/DuanZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GronerB12,
  author       = {Ramona Groner and
                  Philipp Brune},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Towards an Empirical Examination of {IT} Security Infrastructures
                  in {SME}},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {73--88},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_6},
  doi          = {10.1007/978-3-642-34210-3\_6},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GronerB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HelkalaSTW12,
  author       = {Kirsi Helkala and
                  Nils Kalstad Svendsen and
                  Per Thorsheim and
                  Anders Wiehe},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Cracking Associative Passwords},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {153--168},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_11},
  doi          = {10.1007/978-3-642-34210-3\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/HelkalaSTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/JensenPOH12,
  author       = {Torben Jensen and
                  Heine Pedersen and
                  Mads Chr. Olesen and
                  Ren{\'{e}} Rydhof Hansen},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {{THAPS:} Automated Vulnerability Scanning of {PHP} Applications},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_3},
  doi          = {10.1007/978-3-642-34210-3\_3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/JensenPOH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MassacciP12,
  author       = {Fabio Massacci and
                  Federica Paci},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {How to Select a Security Requirements Method? {A} Comparative Study
                  with Students and Practitioners},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {89--104},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_7},
  doi          = {10.1007/978-3-642-34210-3\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/MassacciP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MilushevC12,
  author       = {Dimiter Milushev and
                  Dave Clarke},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Coinductive Unwinding of Security-Relevant Hyperproperties},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_9},
  doi          = {10.1007/978-3-642-34210-3\_9},
  timestamp    = {Wed, 22 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MilushevC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/NoormanNP12,
  author       = {Job Noorman and
                  Nick Nikiforakis and
                  Frank Piessens},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {There Is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {105--120},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_8},
  doi          = {10.1007/978-3-642-34210-3\_8},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/NoormanNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Proctor12,
  author       = {Tony Proctor},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {The Development of Cyber Security Warning, Advice and Report Points},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {61--72},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_5},
  doi          = {10.1007/978-3-642-34210-3\_5},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Proctor12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Pulls12,
  author       = {Tobias Pulls},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Privacy-Friendly Cloud Storage for the Data Track - An Educational
                  Transparency Tool},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {231--246},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_16},
  doi          = {10.1007/978-3-642-34210-3\_16},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Pulls12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SangchoolieNOJ12,
  author       = {Behrooz Sangchoolie and
                  Mazdak Rajabi Nasab and
                  Tomas Olovsson and
                  Wolfgang John},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Assessing the Quality of Packet-Level Traces Collected on Internet
                  Backbone Links},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {184--198},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_13},
  doi          = {10.1007/978-3-642-34210-3\_13},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/SangchoolieNOJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SommestadH12,
  author       = {Teodor Sommestad and
                  Jonas Hallberg},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Cyber Security Exercises and Competitions as a Platform for Cyber
                  Security Experiments},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {47--60},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_4},
  doi          = {10.1007/978-3-642-34210-3\_4},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/SommestadH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/StahlM12,
  author       = {Bj{\"{o}}rn St{\aa}hl and
                  Per Mellstrand},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Retooling and Securing Systemic Debugging},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {137--152},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_10},
  doi          = {10.1007/978-3-642-34210-3\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/StahlM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ZibuschkaF12,
  author       = {Jan Zibuschka and
                  Lothar Fritsch},
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {A Hybrid Approach for Highly Available and Secure Storage of Pseudo-SSO
                  Credentials},
  booktitle    = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  pages        = {169--183},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3\_12},
  doi          = {10.1007/978-3-642-34210-3\_12},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/ZibuschkaF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2010,
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27937-9},
  doi          = {10.1007/978-3-642-27937-9},
  isbn         = {978-3-642-27936-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2011,
  editor       = {Peeter Laud},
  title        = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29615-4},
  doi          = {10.1007/978-3-642-29615-4},
  isbn         = {978-3-642-29614-7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2012,
  editor       = {Audun J{\o}sang and
                  Bengt Carlsson},
  title        = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona,
                  Sweden, October 31 - November 2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7617},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34210-3},
  doi          = {10.1007/978-3-642-34210-3},
  isbn         = {978-3-642-34209-7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Ansper11,
  author       = {Arne Ansper},
  editor       = {Peeter Laud},
  title        = {Designing a Governmental Backbone},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_1},
  doi          = {10.1007/978-3-642-29615-4\_1},
  timestamp    = {Mon, 03 Jan 2022 22:16:22 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/Ansper11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BeitollahiD11,
  author       = {Hakem Beitollahi and
                  Geert Deconinck},
  editor       = {Peeter Laud},
  title        = {A Ring Based Onion Circuit for Hidden Services},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {13--30},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_3},
  doi          = {10.1007/978-3-642-29615-4\_3},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BeitollahiD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BodaFGI11,
  author       = {K{\'{a}}roly Boda and
                  {\'{A}}d{\'{a}}m M{\'{a}}t{\'{e}} F{\"{o}}ldes and
                  G{\'{a}}bor Gy{\"{o}}rgy Guly{\'{a}}s and
                  S{\'{a}}ndor Imre},
  editor       = {Peeter Laud},
  title        = {User Tracking on the Web via Cross-Browser Fingerprinting},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_4},
  doi          = {10.1007/978-3-642-29615-4\_4},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BodaFGI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ClaesLB11,
  author       = {Mathias Claes and
                  Vincent van der Leest and
                  An Braeken},
  editor       = {Peeter Laud},
  title        = {Comparison of {SRAM} and {FF} {PUF} in 65nm Technology},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {47--64},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_5},
  doi          = {10.1007/978-3-642-29615-4\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/ClaesLB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/CucurullNR11,
  author       = {Jordi Cucurull and
                  Simin Nadjm{-}Tehrani and
                  Massimiliano Raciti},
  editor       = {Peeter Laud},
  title        = {Modular Anomaly Detection for Smartphone Ad Hoc Communication},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {65--81},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_6},
  doi          = {10.1007/978-3-642-29615-4\_6},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/CucurullNR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/DossogneL11,
  author       = {J{\'{e}}r{\^{o}}me Dossogne and
                  Fr{\'{e}}d{\'{e}}ric Lafitte},
  editor       = {Peeter Laud},
  title        = {Mental Voting Booths},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {82--97},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_7},
  doi          = {10.1007/978-3-642-29615-4\_7},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/DossogneL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HamamotoTO11,
  author       = {Kazutomo Hamamoto and
                  Yasuyuki Tahara and
                  Akihiko Ohsuga},
  editor       = {Peeter Laud},
  title        = {Methods for Privacy Protection Considering Status of Service Provider
                  and User Community},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {98--113},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_8},
  doi          = {10.1007/978-3-642-29615-4\_8},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/HamamotoTO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HelkalaS11,
  author       = {Kirsi Helkala and
                  Nils Kalstad Svendsen},
  editor       = {Peeter Laud},
  title        = {The Security and Memorability of Passwords Generated by Using an Association
                  Element and a Personal Factor},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {114--130},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_9},
  doi          = {10.1007/978-3-642-29615-4\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/HelkalaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Kani-ZabihiH11,
  author       = {Elahe Kani{-}Zabihi and
                  Martin Helmhout},
  editor       = {Peeter Laud},
  title        = {Increasing Service Users' Privacy Awareness by Introducing On-Line
                  Interactive Privacy Features},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {131--148},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_10},
  doi          = {10.1007/978-3-642-29615-4\_10},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Kani-ZabihiH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LemayKT11,
  author       = {Fr{\'{e}}d{\'{e}}rick Lemay and
                  Rapha{\"{e}}l Khoury and
                  Nadia Tawbi},
  editor       = {Peeter Laud},
  title        = {Optimized Inlining of Runtime Monitors},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {149--161},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_11},
  doi          = {10.1007/978-3-642-29615-4\_11},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/LemayKT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LupuBR11,
  author       = {Radu Lupu and
                  Eugen Borcoci and
                  Tinku Rasheed},
  editor       = {Peeter Laud},
  title        = {Identity-Based Key Derivation Method for Low Delay Inter-domain Handover
                  Re-authentication Service},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {162--175},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_12},
  doi          = {10.1007/978-3-642-29615-4\_12},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/LupuBR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MoonsamyTB11,
  author       = {Veelasha Moonsamy and
                  Ronghua Tian and
                  Lynn Margaret Batten},
  editor       = {Peeter Laud},
  title        = {Feature Reduction to Speed Up Malware Classification},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {176--188},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_13},
  doi          = {10.1007/978-3-642-29615-4\_13},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/MoonsamyTB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/NazarSB11,
  author       = {Assem Nazar and
                  Mark M. Seeger and
                  Harald Baier},
  editor       = {Peeter Laud},
  title        = {Rooting Android - Extending the {ADB} by an Auto-connecting WiFi-Accessible
                  Service},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {189--204},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_14},
  doi          = {10.1007/978-3-642-29615-4\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/NazarSB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SenM11,
  author       = {Jaydip Sen and
                  Subhamoy Maitra},
  editor       = {Peeter Laud},
  title        = {An Attack on Privacy Preserving Data Aggregation Protocol for Wireless
                  Sensor Networks},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {205--222},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_15},
  doi          = {10.1007/978-3-642-29615-4\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/SenM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/StefanRMM11,
  author       = {Deian Stefan and
                  Alejandro Russo and
                  David Mazi{\`{e}}res and
                  John C. Mitchell},
  editor       = {Peeter Laud},
  title        = {Disjunction Category Labels},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {223--239},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_16},
  doi          = {10.1007/978-3-642-29615-4\_16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/StefanRMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Tondel11,
  author       = {Inger Anne T{\o}ndel},
  editor       = {Peeter Laud},
  title        = {Visualization Control for Event-Based Public Display Systems Used
                  in a Hospital Setting},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {240--255},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_17},
  doi          = {10.1007/978-3-642-29615-4\_17},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Tondel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Vinkel11,
  author       = {Priit Vinkel},
  editor       = {Peeter Laud},
  title        = {Internet Voting in Estonia},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {4--12},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_2},
  doi          = {10.1007/978-3-642-29615-4\_2},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Vinkel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/WengerH11,
  author       = {Erich Wenger and
                  Michael Hutter},
  editor       = {Peeter Laud},
  title        = {Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware
                  Implementations},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {256--271},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_18},
  doi          = {10.1007/978-3-642-29615-4\_18},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/WengerH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AlmgrenJ10,
  author       = {Magnus Almgren and
                  Wolfgang John},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Tracking Malicious Hosts on a 10Gbps Backbone Link},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {104--120},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_8},
  doi          = {10.1007/978-3-642-27937-9\_8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AlmgrenJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BorgaonkarRS10,
  author       = {Ravishankar Borgaonkar and
                  Kevin Redon and
                  Jean{-}Pierre Seifert},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Experimental Analysis of the Femtocell Location Verification Techniques},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {49--54},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_4},
  doi          = {10.1007/978-3-642-27937-9\_4},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BorgaonkarRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Brumley10,
  author       = {Billy Bob Brumley},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Secure and Fast Implementations of Two Involution Ciphers},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {269--282},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_19},
  doi          = {10.1007/978-3-642-27937-9\_19},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Brumley10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ChiaHA10,
  author       = {Pern Hui Chia and
                  Andreas P. Heiner and
                  N. Asokan},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Use of Ratings from Personalized Communities for Trustworthy Application
                  Installation},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {71--88},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_6},
  doi          = {10.1007/978-3-642-27937-9\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/ChiaHA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ContiR10,
  author       = {Juan Jos{\'{e}} Conti and
                  Alejandro Russo},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {A Taint Mode for Python via a Library},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {210--222},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_15},
  doi          = {10.1007/978-3-642-27937-9\_15},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/ContiR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/CramptonH10,
  author       = {Jason Crampton and
                  Michael Huth},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {A Framework for the Modular Specification and Orchestration of Authorization
                  Policies},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {155--170},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_11},
  doi          = {10.1007/978-3-642-27937-9\_11},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/CramptonH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GadyatskayaMPS10,
  author       = {Olga Gadyatskaya and
                  Fabio Massacci and
                  Federica Paci and
                  Sergey A. Stankevich},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Java Card Architecture for Autonomous Yet Secure Evolution of Smart
                  Cards Applications},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {187--192},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_13},
  doi          = {10.1007/978-3-642-27937-9\_13},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/GadyatskayaMPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HerrmannGBF10,
  author       = {Dominik Herrmann and
                  Christoph Gerber and
                  Christian Banse and
                  Hannes Federrath},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Analyzing Characteristic Host Access Patterns for Re-identification
                  of Web User Sessions},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {136--154},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_10},
  doi          = {10.1007/978-3-642-27937-9\_10},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/HerrmannGBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Kani-ZabihiC10,
  author       = {Elahe Kani{-}Zabihi and
                  Lizzie Coles{-}Kemp},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Service Users' Requirements for Tools to Support Effective On-line
                  Privacy and Consent Practices},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_9},
  doi          = {10.1007/978-3-642-27937-9\_9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Kani-ZabihiC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Koivunen10,
  author       = {Erka Koivunen},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {"Why Wasn't {I} Notified?": Information Security Incident Reporting
                  Demystified},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {55--70},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_5},
  doi          = {10.1007/978-3-642-27937-9\_5},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Koivunen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KomuTL10,
  author       = {Miika Komu and
                  Sasu Tarkoma and
                  Andrey Lukyanenko},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Mitigation of Unsolicited Traffic across Domains with Host Identities
                  and Puzzles},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_3},
  doi          = {10.1007/978-3-642-27937-9\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/KomuTL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KostiainenAE10,
  author       = {Kari Kostiainen and
                  N. Asokan and
                  Jan{-}Erik Ekberg},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Credential Disabling from Trusted Execution Environments},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {171--186},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_12},
  doi          = {10.1007/978-3-642-27937-9\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/KostiainenAE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KreitzDW10,
  author       = {Gunnar Kreitz and
                  Mads Dam and
                  Douglas Wikstr{\"{o}}m},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Practical Private Information Aggregation in Large Networks},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {89--103},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_7},
  doi          = {10.1007/978-3-642-27937-9\_7},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/KreitzDW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MagaziniusPS10,
  author       = {Jonas Magazinius and
                  Phu H. Phung and
                  David Sands},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Safe Wrappers and Sane Policies for Self Protecting JavaScript},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {239--255},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_17},
  doi          = {10.1007/978-3-642-27937-9\_17},
  timestamp    = {Wed, 10 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/MagaziniusPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/QuaresmaP10,
  author       = {Jose Quaresma and
                  Christian W. Probst},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Protocol Implementation Generator},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {256--268},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_18},
  doi          = {10.1007/978-3-642-27937-9\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/QuaresmaP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/RyckDDPJ10,
  author       = {Philippe De Ryck and
                  Maarten Decat and
                  Lieven Desmet and
                  Frank Piessens and
                  Wouter Joosen},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Security of Web Mashups: {A} Survey},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {223--238},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_16},
  doi          = {10.1007/978-3-642-27937-9\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/RyckDDPJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Saarinen10,
  author       = {Markku{-}Juhani O. Saarinen},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {The {PASSERINE} Public Key Encryption and Authentication Mechanism},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {283--288},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_20},
  doi          = {10.1007/978-3-642-27937-9\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Saarinen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SarelaRZNO10,
  author       = {Mikko S{\"{a}}rel{\"{a}} and
                  Christian Esteve Rothenberg and
                  Andr{\'{a}}s Zahemszky and
                  Pekka Nikander and
                  J{\"{o}}rg Ott},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {BloomCasting: Security in Bloom Filter Based Multicast},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_1},
  doi          = {10.1007/978-3-642-27937-9\_1},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/SarelaRZNO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SuorantaHS10,
  author       = {Sanna Suoranta and
                  Jani Heikkinen and
                  Pekka Silvekoski},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Authentication Session Migration},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_2},
  doi          = {10.1007/978-3-642-27937-9\_2},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/SuorantaHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/TedescoRS10,
  author       = {Filippo Del Tedesco and
                  Alejandro Russo and
                  David Sands},
  editor       = {Tuomas Aura and
                  Kimmo J{\"{a}}rvinen and
                  Kaisa Nyberg},
  title        = {Implementing Erasure Policies Using Taint Analysis},
  booktitle    = {Information Security Technology for Applications - 15th Nordic Conference
                  on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7127},
  pages        = {193--209},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27937-9\_14},
  doi          = {10.1007/978-3-642-27937-9\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/TedescoRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AhmedCM09,
  author       = {Ejaz Ahmed and
                  Andrew J. Clark and
                  George M. Mohay},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Characterising Anomalous Events Using Change - Point Correlation on
                  Unsolicited Network Traffic},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_8},
  doi          = {10.1007/978-3-642-04766-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AhmedCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AhmedJ09,
  author       = {Naveed Ahmed and
                  Christian Damsgaard Jensen},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {A Mechanism for Identity Delegation at Authentication Level},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_11},
  doi          = {10.1007/978-3-642-04766-4\_11},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/AhmedJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AnsperHLOL09,
  author       = {Arne Ansper and
                  Sven Heiberg and
                  Helger Lipmaa and
                  Tom Andr{\'{e}} {\O}verland and
                  Filip van Laenen},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Security and Trust for the Norwegian E-Voting Pilot Project \emph{E-valg
                  2011}},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_15},
  doi          = {10.1007/978-3-642-04766-4\_15},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AnsperHLOL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BielovaMM09,
  author       = {Nataliia Bielova and
                  Fabio Massacci and
                  Andrea Micheletti},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Towards Practical Enforcement Theories},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {239--254},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_17},
  doi          = {10.1007/978-3-642-04766-4\_17},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BielovaMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BoudaKMS09,
  author       = {Jan Bouda and
                  Jan Krhovjak and
                  Vashek Matyas and
                  Petr Svenda},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Towards True Random Number Generation in Mobile Environments},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {179--189},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_13},
  doi          = {10.1007/978-3-642-04766-4\_13},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BoudaKMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/CasadoT09,
  author       = {Lander Casado and
                  Philippas Tsigas},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {ContikiSec: {A} Secure Network Layer for Wireless Sensor Networks
                  under the Contiki Operating System},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_10},
  doi          = {10.1007/978-3-642-04766-4\_10},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/CasadoT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/ChabotKT09,
  author       = {Hugues Chabot and
                  Rapha{\"{e}}l Khoury and
                  Nadia Tawbi},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Generating In-Line Monitors for Rabin Automata},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {287--301},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_20},
  doi          = {10.1007/978-3-642-04766-4\_20},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/ChabotKT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Crampton09,
  author       = {Jason Crampton},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Trade-Offs in Cryptographic Implementations of Temporal Access Control},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {72--87},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_6},
  doi          = {10.1007/978-3-642-04766-4\_6},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Crampton09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/FerdousJSB09,
  author       = {Md. Sadek Ferdous and
                  Audun J{\o}sang and
                  Kuldeep Singh and
                  Ravishankar Borgaonkar},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Security Usability of Petname Systems},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {44--59},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_4},
  doi          = {10.1007/978-3-642-04766-4\_4},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/FerdousJSB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/FocardiLS09,
  author       = {Riccardo Focardi and
                  Flaminia L. Luccio and
                  Graham Steel},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Blunting Differential Attacks on {PIN} Processing APIs},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_7},
  doi          = {10.1007/978-3-642-04766-4\_7},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/FocardiLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HalvorsenHEM09,
  author       = {Finn Michael Halvorsen and
                  Olav Haugen and
                  Martin Eian and
                  Stig Fr. Mj{\o}lsnes},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {An Improved Attack on {TKIP}},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {120--132},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_9},
  doi          = {10.1007/978-3-642-04766-4\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/HalvorsenHEM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/HolthTJT09,
  author       = {Karsten Peder Holth and
                  Do van Thuan and
                  Ivar J{\o}rstad and
                  Do Van Thanh},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {An Analysis of Widget Security},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {60--71},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_5},
  doi          = {10.1007/978-3-642-04766-4\_5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/HolthTJT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KiviharjuVK09,
  author       = {Mikko Kiviharju and
                  Teijo Ven{\"{a}}l{\"{a}}inen and
                  Suna Kinnunen},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Towards Modelling Information Security with Key-Challenge Petri Nets},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {190--206},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_14},
  doi          = {10.1007/978-3-642-04766-4\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/KiviharjuVK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LaudR09,
  author       = {Peeter Laud and
                  Meelis Roos},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Formal Analysis of the Estonian Mobile-ID Protocol},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {271--286},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_19},
  doi          = {10.1007/978-3-642-04766-4\_19},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/LaudR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Margasinski09,
  author       = {Igor Margasinski},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {A Parallelism-Based Approach to Network Anonymization},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {28--43},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_3},
  doi          = {10.1007/978-3-642-04766-4\_3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Margasinski09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MuntermannR09,
  author       = {Jan Muntermann and
                  Heiko Ro{\ss}nagel},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {On the Effectiveness of Privacy Breach Disclosure Legislation in Europe:
                  Empirical Evidence from the {US} Stock Market},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_1},
  doi          = {10.1007/978-3-642-04766-4\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/MuntermannR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/RossnagelM09,
  author       = {Heiko Ro{\ss}nagel and
                  Jan Muntermann},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Introducing Sim-Based Security Tokens as Enabling Technology for Mobile
                  Real-Time Services},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {163--178},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_12},
  doi          = {10.1007/978-3-642-04766-4\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/RossnagelM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/RossnagelZPD09,
  author       = {Heiko Ro{\ss}nagel and
                  Jan Zibuschka and
                  Lexi Pimenidis and
                  Thomas Deselaers},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Facilitating the Adoption of Tor by Focusing on a Promising Target
                  Group},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {15--27},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_2},
  doi          = {10.1007/978-3-642-04766-4\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/RossnagelZPD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/VilarinhoHN09,
  author       = {Thomas Vilarinho and
                  Kjetil Haslum and
                  Josef Noll},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Advanced {SIM} Capabilities Supporting Trust-Based Applications},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {223--238},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_16},
  doi          = {10.1007/978-3-642-04766-4\_16},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/VilarinhoHN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Westermann09,
  author       = {Benedikt Westermann},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Security Analysis of AN.ON's Payment Scheme},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {255--270},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_18},
  doi          = {10.1007/978-3-642-04766-4\_18},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/Westermann09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2009,
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4},
  doi          = {10.1007/978-3-642-04766-4},
  isbn         = {978-3-642-04765-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics