Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/nordsec:"
@proceedings{DBLP:conf/nordsec/2023, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-47748-5}, doi = {10.1007/978-3-031-47748-5}, isbn = {978-3-031-47747-8}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BergHA23, author = {Lars Berg and Kirsi Helkala and Andr{\'{e}} {\AA}rnes}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {Legal Considerations on Gray Zone Operations - From a Norwegian Perspective}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {162--181}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_10}, doi = {10.1007/978-3-031-47748-5\_10}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BergHA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BrorssonG23, author = {Joakim Brorsson and Martin Gunnarsson}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {{DIPSAUCE:} Efficient Private Stream Aggregation Without Trusted Parties}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {204--222}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_12}, doi = {10.1007/978-3-031-47748-5\_12}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BrorssonG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/CotanT23, author = {Paul Cotan and George Teseleanu}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {Small Private Key Attack Against a Family of RSA-Like Cryptosystems}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {57--72}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_4}, doi = {10.1007/978-3-031-47748-5\_4}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/CotanT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/DaiDJLMS23, author = {Tianxiang Dai and Li Duan and Yufan Jiang and Yong Li and Fei Mei and Yulian Sun}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on {GPU}}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {330--349}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_18}, doi = {10.1007/978-3-031-47748-5\_18}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/DaiDJLMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/EichhammerR23, author = {Philipp Eichhammer and Hans P. Reiser}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {A Self-forming Community Approach for Intrusion Detection in Heterogeneous Networks}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {263--280}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_15}, doi = {10.1007/978-3-031-47748-5\_15}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/EichhammerR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Guri23, author = {Mordechai Guri}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {{RAMBO:} Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer {RAM}}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {144--161}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_9}, doi = {10.1007/978-3-031-47748-5\_9}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/Guri23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HamidiG23, author = {Amirreza Hamidi and Hossein Ghodosi}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {73--86}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_5}, doi = {10.1007/978-3-031-47748-5\_5}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/HamidiG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/JenkePB23, author = {Thorsten Jenke and Elmar Padilla and Lilli Bruckschen}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {Towards Generic Malware Unpacking: {A} Comprehensive Study on the Unpacking Behavior of Malicious Run-Time Packers}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {245--262}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_14}, doi = {10.1007/978-3-031-47748-5\_14}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/JenkePB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KhanNM23, author = {Tanveer Khan and Khoa Nguyen and Antonis Michalas}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {307--329}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_17}, doi = {10.1007/978-3-031-47748-5\_17}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/KhanNM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KjonasW23, author = {Karianne Kj{\o}n{\aa}s and Gaute Wangen}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {Cybersecurity Challenges and Smart Technology Adoption in Norwegian Livestock Farming}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {107--125}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_7}, doi = {10.1007/978-3-031-47748-5\_7}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/KjonasW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KlierB23, author = {Samantha Klier and Harald Baier}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {281--303}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_16}, doi = {10.1007/978-3-031-47748-5\_16}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/KlierB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LinsMRB23, author = {Mario Lins and Ren{\'{e}} Mayrhofer and Michael Roland and Alastair R. Beresford}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {Mobile App Distribution Transparency {(MADT):} Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {185--203}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_11}, doi = {10.1007/978-3-031-47748-5\_11}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/LinsMRB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MangeardYMY23, author = {Philippe Mangeard and Xiufen Yu and Mohammad Mannan and Amr M. Youssef}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {18--36}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_2}, doi = {10.1007/978-3-031-47748-5\_2}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MangeardYMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PalmJ23, author = {Jonas Palm and Meiko Jensen}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {Analysis of a Consent Management Specification and Prototype Under the {GDPR}}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {3--17}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_1}, doi = {10.1007/978-3-031-47748-5\_1}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/PalmJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PatilFE23, author = {Rajendra Patil and Viktoria Fodor and Mathias Ekstedt}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {Mean Value Analysis of Critical Attack Paths with Multiple Parameters}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {126--143}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_8}, doi = {10.1007/978-3-031-47748-5\_8}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/PatilFE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/RossbergerK23, author = {Marc Ro{\ss}berger and Dogan Kesdogan}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {Smart Noise Detection for Statistical Disclosure Attacks}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {87--103}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_6}, doi = {10.1007/978-3-031-47748-5\_6}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/RossbergerK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SchmittCSM23, author = {Vera Schmitt and Daniel Sivizaca Conde and Premtim Sahitaj and Sebastian M{\"{o}}ller}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {What is Your Information Worth? {A} Systematic Analysis of the Endowment Effect of Different Data Types}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {223--242}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_13}, doi = {10.1007/978-3-031-47748-5\_13}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/SchmittCSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/VuorinenPRL23, author = {Esko Vuorinen and Panu Puhtila and Sampsa Rauti and Ville Lepp{\"{a}}nen}, editor = {Lothar Fritsch and Ismail Hassan and Ebenezer Paintsil}, title = {From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channels}, booktitle = {Secure {IT} Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14324}, pages = {37--53}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47748-5\_3}, doi = {10.1007/978-3-031-47748-5\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/VuorinenPRL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AlishahiGV22, author = {Mina Alishahi and Daan Gast and Sam Vermeiren}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Local Differential Privacy for Private Construction of Classification Algorithms}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {58--79}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_4}, doi = {10.1007/978-3-031-22295-5\_4}, timestamp = {Mon, 09 Jan 2023 17:58:32 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/AlishahiGV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ArnalCFH22, author = {Xavier Arnal and Abraham Cano and Tamara Finogina and Javier Herranz}, editor = {Hans P. Reiser and Marcel Kyas}, title = {How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge Proofs}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {253--269}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_14}, doi = {10.1007/978-3-031-22295-5\_14}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/ArnalCFH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BjerreWVHAHA22, author = {Alexander Bjerre and Andreas Philip Westh and Emil Villefrance and A S. M. Farhan Al Haque and Jonas Bukrinski Andersen and Lucas K. Helgogaard and Marios Anagnostopoulos}, editor = {Hans P. Reiser and Marcel Kyas}, title = {A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {176--193}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_10}, doi = {10.1007/978-3-031-22295-5\_10}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BjerreWVHAHA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BlumbergsDPNSR22, author = {Bernhards Blumbergs and Eriks Dobelis and Peteris Paikens and Krisjanis Nesenbergs and Kirils Solovjovs and Artis Rusins}, editor = {Hans P. Reiser and Marcel Kyas}, title = {WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {311--325}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_17}, doi = {10.1007/978-3-031-22295-5\_17}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BlumbergsDPNSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ColeP22, author = {Matthew Cole and Aravind Prakash}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {215--233}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_12}, doi = {10.1007/978-3-031-22295-5\_12}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/ColeP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/DamirN22, author = {Mohamed Taoufiq Damir and Valtteri Niemi}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Location Privacy, 5G AKA, and Enhancements}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {40--57}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_3}, doi = {10.1007/978-3-031-22295-5\_3}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/DamirN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/FraunholzBBBKR22, author = {Daniel Fraunholz and Dominik Brunke and Simon Beidenhauser and Sebastian Berger and Hartmut Koenig and Daniel Reti}, editor = {Hans P. Reiser and Marcel Kyas}, title = {{IMSI} Probing: Possibilities and Limitations}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {80--97}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_5}, doi = {10.1007/978-3-031-22295-5\_5}, timestamp = {Thu, 12 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/FraunholzBBBKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GaballahATZM22, author = {Sarah Abdelwahab Gaballah and Lamya Abdullah and Minh Tung Tran and Ephraim Zimmer and Max M{\"{u}}hlh{\"{a}}user}, editor = {Hans P. Reiser and Marcel Kyas}, title = {On the Effectiveness of Intersection Attacks in Anonymous Microblogging}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {3--19}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_1}, doi = {10.1007/978-3-031-22295-5\_1}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/GaballahATZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Guri22, author = {Mordechai Guri}, editor = {Hans P. Reiser and Marcel Kyas}, title = {{GPU-FAN:} Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from {GPU} Fans}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {194--211}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_11}, doi = {10.1007/978-3-031-22295-5\_11}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/Guri22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HesselmannRGM22, author = {Carsten Hesselmann and Delphine Reinhardt and Jan Gertheiss and J{\"{o}}rg P. M{\"{u}}ller}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User Awareness}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {20--39}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_2}, doi = {10.1007/978-3-031-22295-5\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/HesselmannRGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LantzBA22, author = {David Lantz and Felipe Boeira and Mikael Asplund}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {120--138}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_7}, doi = {10.1007/978-3-031-22295-5\_7}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/LantzBA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LatzoHKHCFA22, author = {Tobias Latzo and Andreas Hellmich and Annika Knepper and Lukas Hardi and Tim Phillip Castello{-}Waldow and Felix C. Freiling and Andreas Attenberger}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of {DJI} Drone Log Data}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {329--345}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_18}, doi = {10.1007/978-3-031-22295-5\_18}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/LatzoHKHCFA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LeiteHSC22, author = {Cristoffer Leite and Jerry den Hartog and Daniel Ricardo dos Santos and Elisa Costante}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Actionable Cyber Threat Intelligence for Automated Incident Response}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {368--385}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_20}, doi = {10.1007/978-3-031-22295-5\_20}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/LeiteHSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MsaadSAAOV22, author = {Mohamed Msaad and Shreyas Srinivasa and Mikkel M{\o}ller Andersen and David Holm Audran and Charity U. Orji and Emmanouil Vasilomanolakis}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {101--119}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_6}, doi = {10.1007/978-3-031-22295-5\_6}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MsaadSAAOV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/OuytselL22, author = {Charles{-}Henry Bertrand Van Ouytsel and Axel Legay}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Malware Analysis with Symbolic Execution and Graph Kernel}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {292--310}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_16}, doi = {10.1007/978-3-031-22295-5\_16}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/OuytselL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PillaiLR22, author = {Arun Sankar Muttathu Sivasankara Pillai and Phillip L. De Leon and Utz Roedig}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Detection of Voice Conversion Spoofing Attacks Using Voiced Speech}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {159--175}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_9}, doi = {10.1007/978-3-031-22295-5\_9}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/PillaiLR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PlnyHC22, author = {Richard Pln{\'{y}} and Karel Hynek and Tom{\'{a}}s Cejka}, editor = {Hans P. Reiser and Marcel Kyas}, title = {DeCrypto: Finding Cryptocurrency Miners on {ISP} Networks}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {139--158}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_8}, doi = {10.1007/978-3-031-22295-5\_8}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/PlnyHC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SchrittwieserKP22, author = {Sebastian Schrittwieser and Patrick Kochberger and Michael Pucher and Caroline Lawitschka and Philip K{\"{o}}nig and Edgar R. Weippl}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {273--291}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_15}, doi = {10.1007/978-3-031-22295-5\_15}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/SchrittwieserKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SivelleDPLF22, author = {Camille Sivelle and Lorys Debbah and Maxime Puys and Pascal Lafourcade and Thibault Franco{-}Rondisson}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {234--252}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_13}, doi = {10.1007/978-3-031-22295-5\_13}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/SivelleDPLF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/TabibanZJPW22, author = {Azadeh Tabiban and Heyang Zhao and Yosr Jarraya and Makan Pourzandi and Lingyu Wang}, editor = {Hans P. Reiser and Marcel Kyas}, title = {VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {346--367}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_19}, doi = {10.1007/978-3-031-22295-5\_19}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/TabibanZJPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2022, editor = {Hans P. Reiser and Marcel Kyas}, title = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5}, doi = {10.1007/978-3-031-22295-5}, isbn = {978-3-031-22294-8}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AbdelliCP21, author = {Khouloud Abdelli and Joo Yeon Cho and Stephan Pachnicke}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Secure Collaborative Learning for Predictive Maintenance in Optical Networks}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {114--130}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_7}, doi = {10.1007/978-3-030-91625-1\_7}, timestamp = {Fri, 19 Nov 2021 16:08:34 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/AbdelliCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AtiiqG21, author = {Syafiq Al Atiiq and Christian Gehrmann}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {X-Pro: Distributed {XDP} Proxies Against Botnets of Things}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {51--71}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_4}, doi = {10.1007/978-3-030-91625-1\_4}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/AtiiqG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BrierleyABH21, author = {Calvin Brierley and Budi Arief and David J. Barnes and Julio C. Hernandez{-}Castro}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Industrialising Blackmail: Privacy Invasion Based IoT Ransomware}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {72--92}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_5}, doi = {10.1007/978-3-030-91625-1\_5}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BrierleyABH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ChenR21, author = {Hsin Yi Chen and Siddharth Prakash Rao}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Adversarial Trends in Mobile Communication Systems: From Attack Patterns to Potential Defenses Strategies}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {153--171}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_9}, doi = {10.1007/978-3-030-91625-1\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/ChenR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/FrimpongRM21, author = {Eugene Frimpong and Reyhaneh Rabbaninejad and Antonis Michalas}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Arrows in a Quiver: {A} Secure Certificateless Group Key Distribution Protocol for Drones}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {31--48}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_3}, doi = {10.1007/978-3-030-91625-1\_3}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/FrimpongRM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GarciaS21, author = {Cesar Pereida Garc{\'{\i}}a and Sampo Sovio}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Size, Speed, and Security: An Ed25519 Case Study}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {16--30}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_2}, doi = {10.1007/978-3-030-91625-1\_2}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/GarciaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HagemanHP21, author = {Kaspar Hageman and Ren{\'{e}} Rydhof Hansen and Jens Myrup Pedersen}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Gollector: Measuring Domain Name Dark Matter from Different Vantage Points}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {133--152}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_8}, doi = {10.1007/978-3-030-91625-1\_8}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/HagemanHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MollerSJPBCPLHJ21, author = {Bjarke Hilmer M{\o}ller and Jacob Gosch S{\o}ndergaard and Kristoffer Skagb{\ae}k Jensen and Magnus Winkel Pedersen and Tobias Worm B{\o}gedal and Anton Christensen and Danny B{\o}gsted Poulsen and Kim Guldstrand Larsen and Ren{\'{e}} Rydhof Hansen and Thomas Rosted Jensen and Heino Juvoll Madsen and Henrik Uhrenfeldt}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot Code}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {192--211}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_11}, doi = {10.1007/978-3-030-91625-1\_11}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MollerSJPBCPLHJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/NiemiPE21, author = {Arto Niemi and Vasile Adrian Bogdan Pop and Jan{-}Erik Ekberg}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Trusted Sockets Layer: {A} {TLS} 1.3 Based Trusted Channel Protocol}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {175--191}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_10}, doi = {10.1007/978-3-030-91625-1\_10}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/NiemiPE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Teseleanu21, author = {George Teseleanu}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Communicating Through Subliminal-Free Signatures}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {3--15}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_1}, doi = {10.1007/978-3-030-91625-1\_1}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/Teseleanu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/VermeSETZ21, author = {Manuel Del Verme and {\AA}vald {\AA}slaugson Sommervoll and L{\'{a}}szl{\'{o}} Erd{\"{o}}di and Simone Totaro and Fabio Massimo Zennaro}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {{SQL} Injections and Reinforcement Learning: An Empirical Evaluation of the Role of Action Structure}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {95--113}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_6}, doi = {10.1007/978-3-030-91625-1\_6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/VermeSETZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2020, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-70852-8}, doi = {10.1007/978-3-030-70852-8}, isbn = {978-3-030-70851-1}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2021, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1}, doi = {10.1007/978-3-030-91625-1}, isbn = {978-3-030-91624-4}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AfzalBL20, author = {Zeeshan Afzal and Anna Brunstr{\"{o}}m and Stefan Lindskog}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Using Features of Encrypted Network Traffic to Detect Malware}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {37--53}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_3}, doi = {10.1007/978-3-030-70852-8\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AfzalBL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BakasMU20, author = {Alexandros Bakas and Antonis Michalas and Amjad Ullah}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {(F)unctional Sifting: {A} Privacy-Preserving Reputation System Through Multi-Input Functional Encryption}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {111--126}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_7}, doi = {10.1007/978-3-030-70852-8\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BakasMU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BellizziVCH20, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {20--36}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_2}, doi = {10.1007/978-3-030-70852-8\_2}, timestamp = {Sun, 23 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BellizziVCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BourBBM20, author = {Guillaume Bour and Karin Bernsmed and Ravishankar Borgaonkar and Per H{\aa}kon Meland}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {On the Certificate Revocation Problem in the Maritime Sector}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {142--157}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_9}, doi = {10.1007/978-3-030-70852-8\_9}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BourBBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BrierleyPABH20, author = {Calvin Brierley and Jamie Pont and Budi Arief and David J. Barnes and Julio C. Hernandez{-}Castro}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Persistence in Linux-Based IoT Malware}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {3--19}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_1}, doi = {10.1007/978-3-030-70852-8\_1}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BrierleyPABH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ChoS20, author = {Joo Yeon Cho and Andrew Sergeev}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {TLV-to-MUC Express: Post-quantum MACsec in {VXLAN}}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {127--141}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_8}, doi = {10.1007/978-3-030-70852-8\_8}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/ChoS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/DanglTR20, author = {Thomas Dangl and Benjamin Taubmann and Hans P. Reiser}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Agent-Based File Extraction Using Virtual Machine Introspection}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {174--191}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_11}, doi = {10.1007/978-3-030-70852-8\_11}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/DanglTR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GjosteenHS20, author = {Kristian Gj{\o}steen and Thomas Haines and Morten Rotvold Solberg}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the {PPATC} Scheme}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {92--107}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_6}, doi = {10.1007/978-3-030-70852-8\_6}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/GjosteenHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GustafssonA20, author = {Tommy Gustafsson and Jonas Almroth}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Cyber Range Automation Overview with a Case Study of {CRATE}}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {192--209}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_12}, doi = {10.1007/978-3-030-70852-8\_12}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GustafssonA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HainesGS20, author = {Thomas Haines and Rajeev Gor{\'{e}} and Jack Stodart}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Machine-Checking the Universal Verifiability of ElectionGuard}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {57--73}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_4}, doi = {10.1007/978-3-030-70852-8\_4}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/HainesGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KaramiOS20, author = {Farzane Karami and Olaf Owe and Gerardo Schneider}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Information-Flow Control by Means of Security Wrappers for Active Object Languages with Futures}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {74--91}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_5}, doi = {10.1007/978-3-030-70852-8\_5}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/KaramiOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/RaileanR20, author = {Alexandr Railean and Delphine Reinhardt}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {OnLITE: On-line Label for IoT Transparency Enhancement}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {229--245}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_14}, doi = {10.1007/978-3-030-70852-8\_14}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/RaileanR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ShiS20, author = {Canyang Shi and Huiping Sun}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {HoneyHash: Honeyword Generation Based on Transformed Hashes}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {161--173}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_10}, doi = {10.1007/978-3-030-70852-8\_10}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/ShiS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/WairimuM20, author = {Samuel Wairimu and Nurul Momen}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Privacy Analysis of {COVID-19} Contact Tracing Apps in the {EU}}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {213--228}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_13}, doi = {10.1007/978-3-030-70852-8\_13}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/WairimuM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/WatsonJB20, author = {Katie Watson and Mike Just and Tessa Berg}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {An Investigation of Comic-Based Permission Requests}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {246--261}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_15}, doi = {10.1007/978-3-030-70852-8\_15}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/WatsonJB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AfzalGLB19, author = {Zeeshan Afzal and Johan Garcia and Stefan Lindskog and Anna Brunstr{\"{o}}m}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Using Partial Signatures in Intrusion Detection for Multipath {TCP}}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {71--86}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_5}, doi = {10.1007/978-3-030-35055-0\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AfzalGLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BisztrayG19, author = {Tam{\'{a}}s Bisztray and Nils Gruschka}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {3--19}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_1}, doi = {10.1007/978-3-030-35055-0\_1}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BisztrayG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BuiAA19, author = {Thanh Bui and Markku Antikainen and Tuomas Aura}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Analysis of Topology Poisoning Attacks in Software-Defined Networking}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {87--102}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_6}, doi = {10.1007/978-3-030-35055-0\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BuiAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BuiRAA19, author = {Thanh Bui and Siddharth Prakash Rao and Markku Antikainen and Tuomas Aura}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Client-Side Vulnerabilities in Commercial VPNs}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {103--119}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_7}, doi = {10.1007/978-3-030-35055-0\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BuiRAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Cho19, author = {Joo Yeon Cho}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Securing Optical Networks by Modern Cryptographic Techniques}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {120--133}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_8}, doi = {10.1007/978-3-030-35055-0\_8}, timestamp = {Wed, 13 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/Cho19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/DehlingMI19, author = {Florian Dehling and Tobias Mengel and Luigi Lo Iacono}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Rotten Cellar: Security and Privacy of the Browser Cache Revisited}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {20--36}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_2}, doi = {10.1007/978-3-030-35055-0\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/DehlingMI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/DutertreRPR19, author = {Jean{-}Max Dutertre and Timoth{\'{e}}e Riom and Olivier Potin and Jean{-}Baptiste Rigaud}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Experimental Analysis of the Laser-Induced Instruction Skip Fault Model}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {221--237}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_14}, doi = {10.1007/978-3-030-35055-0\_14}, timestamp = {Wed, 13 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/DutertreRPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GoovaertsAGPV19, author = {Frederik Goovaerts and Gunes Acar and Rafael Galvez and Frank Piessens and Mathy Vanhoef}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Improving Privacy Through Fast Passive Wi-Fi Scanning}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {37--52}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_3}, doi = {10.1007/978-3-030-35055-0\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/GoovaertsAGPV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GrimsdalLVBA19, author = {Gunnar Grimsdal and Patrik Lundgren and Christian Vestlund and Felipe Boeira and Mikael Asplund}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Can Microkernels Mitigate Microarchitectural Attacks?}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {238--253}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_15}, doi = {10.1007/978-3-030-35055-0\_15}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GrimsdalLVBA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Haines19, author = {Thomas Haines}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Cronus: Everlasting Privacy with Audit and Cast}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {53--68}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_4}, doi = {10.1007/978-3-030-35055-0\_4}, timestamp = {Wed, 13 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/Haines19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MelandJS19, author = {Per H{\aa}kon Meland and Bent Heier Johansen and Guttorm Sindre}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {An Experimental Analysis of Cryptojacking Attacks}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {155--170}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_10}, doi = {10.1007/978-3-030-35055-0\_10}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MelandJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MichalasBDZ19, author = {Antonis Michalas and Alexandros Bakas and Hai{-}Van Dang and Alexandr Zalitko}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and {SGX}}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {254--270}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_16}, doi = {10.1007/978-3-030-35055-0\_16}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MichalasBDZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PontOBAH19, author = {Jamie Pont and Osama Abu Oun and Calvin Brierley and Budi Arief and Julio C. Hernandez{-}Castro}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {A Roadmap for Improving the Impact of Anti-ransomware Research}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {137--154}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_9}, doi = {10.1007/978-3-030-35055-0\_9}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/PontOBAH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/RothNHKKRK19, author = {Christian Roth and Mirja Nitschke and Christian Hutzler and Maximilian Koller and Rolf K{\"{u}}ffner and Marc Ro{\ss}berger and Dogan Kesdogan}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {My Smartwatch Is Mine - Machine Learning Based Theft Detection of Smartwatches}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {171--187}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_11}, doi = {10.1007/978-3-030-35055-0\_11}, timestamp = {Fri, 01 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/RothNHKKRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SentanoeTR19, author = {Stewart Sentanoe and Benjamin Taubmann and Hans P. Reiser}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine Introspection}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {271--282}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_17}, doi = {10.1007/978-3-030-35055-0\_17}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/SentanoeTR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/WieflingGI19, author = {Stephan Wiefling and Nils Gruschka and Luigi Lo Iacono}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {188--203}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_12}, doi = {10.1007/978-3-030-35055-0\_12}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/WieflingGI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/XiongGKL19, author = {Wenjun Xiong and Melek G{\"{u}}lsever and Koray Mustafa Kaya and Robert Lagerstr{\"{o}}m}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {A Study of Security Vulnerabilities and Software Weaknesses in Vehicles}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {204--218}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_13}, doi = {10.1007/978-3-030-35055-0\_13}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/XiongGKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2019, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0}, doi = {10.1007/978-3-030-35055-0}, isbn = {978-3-030-35054-3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/0001KLH18, author = {Zheng Yang and Mohsin Khan and Wanping Liu and Jun He}, editor = {Nils Gruschka}, title = {On Security Analysis of Generic Dynamic Authenticated Group Key Exchange}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {121--137}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_8}, doi = {10.1007/978-3-030-03638-6\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/0001KLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AktasS18, author = {Kursat Aktas and Sevil Sen}, editor = {Nils Gruschka}, title = {UpDroid: Updated Android Malware and Its Familial Classification}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {352--368}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_22}, doi = {10.1007/978-3-030-03638-6\_22}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/AktasS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AtashpendarPRR18, author = {Arash Atashpendar and Guru{-}Vamsi Policharla and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Nils Gruschka}, title = {Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {104--120}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_7}, doi = {10.1007/978-3-030-03638-6\_7}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AtashpendarPRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BackendalBSS18, author = {Matilda Backendal and Mihir Bellare and Jessica Sorrell and Jiahao Sun}, editor = {Nils Gruschka}, title = {The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {154--170}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_10}, doi = {10.1007/978-3-030-03638-6\_10}, timestamp = {Sat, 01 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BackendalBSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BajicB18, author = {Alexander Bajic and Georg T. Becker}, editor = {Nils Gruschka}, title = {Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {236--254}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_15}, doi = {10.1007/978-3-030-03638-6\_15}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BajicB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BastysPS18, author = {Iulia Bastys and Frank Piessens and Andrei Sabelfeld}, editor = {Nils Gruschka}, title = {Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {19--37}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_2}, doi = {10.1007/978-3-030-03638-6\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BastysPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BuldasLT18, author = {Ahto Buldas and Risto Laanoja and Ahto Truu}, editor = {Nils Gruschka}, title = {A Blockchain-Assisted Hash-Based Signature Scheme}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {138--153}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_9}, doi = {10.1007/978-3-030-03638-6\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BuldasLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/DahlbergP18, author = {Rasmus Dahlberg and Tobias Pulls}, editor = {Nils Gruschka}, title = {Verifiable Light-Weight Monitoring for Certificate Transparency Logs}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {171--183}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_11}, doi = {10.1007/978-3-030-03638-6\_11}, timestamp = {Sat, 01 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/DahlbergP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GencLR18, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Nils Gruschka}, title = {Next Generation Cryptographic Ransomware}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {385--401}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_24}, doi = {10.1007/978-3-030-03638-6\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GencLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Guanciale18, author = {Roberto Guanciale}, editor = {Nils Gruschka}, title = {Protecting Instruction Set Randomization from Code Reuse Attacks}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {421--436}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_26}, doi = {10.1007/978-3-030-03638-6\_26}, timestamp = {Sat, 01 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/Guanciale18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HamannHMM0T18, author = {Tobias Hamann and Mihai Herda and Heiko Mantel and Martin Mohr and David Schneider and Markus Tasch}, editor = {Nils Gruschka}, title = {A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {437--453}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_27}, doi = {10.1007/978-3-030-03638-6\_27}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/HamannHMM0T18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KimKLKK18, author = {Kuyju Kim and Taeyun Kim and Seungjin Lee and Soolin Kim and Hyoungshick Kim}, editor = {Nils Gruschka}, title = {When Harry Met Tinder: Security Analysis of Dating Apps on Android}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {454--467}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_28}, doi = {10.1007/978-3-030-03638-6\_28}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/KimKLKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KrumayBW18, author = {Barbara Krumay and Edward W. N. Bernroider and Roman Walser}, editor = {Nils Gruschka}, title = {Evaluation of Cybersecurity Management Controls and Metrics of Critical Infrastructures: {A} Literature Review Considering the {NIST} Cybersecurity Framework}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {369--384}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_23}, doi = {10.1007/978-3-030-03638-6\_23}, timestamp = {Sat, 01 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/KrumayBW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LashermesB018, author = {Ronan Lashermes and H{\'{e}}l{\`{e}}ne Le Bouder and Ga{\"{e}}l Thomas}, editor = {Nils Gruschka}, title = {Hardware-Assisted Program Execution Integrity: {HAPEI}}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {405--420}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_25}, doi = {10.1007/978-3-030-03638-6\_25}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/LashermesB018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LiangWYY18, author = {Hongliang Liang and Yudong Wang and Tianqi Yang and Yue Yu}, editor = {Nils Gruschka}, title = {AppLance: {A} Lightweight Approach to Detect Privacy Leak for Packed Applications}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {54--70}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_4}, doi = {10.1007/978-3-030-03638-6\_4}, timestamp = {Mon, 12 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/LiangWYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MaennelMM18, author = {Kaie Maennel and Sten M{\"{a}}ses and Olaf Maennel}, editor = {Nils Gruschka}, title = {Cyber Hygiene: The Big Picture}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {291--305}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_18}, doi = {10.1007/978-3-030-03638-6\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/MaennelMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MandalAZ18, author = {Avikarsha Mandal and Frederik Armknecht and Erik Zenner}, editor = {Nils Gruschka}, title = {Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {3--18}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_1}, doi = {10.1007/978-3-030-03638-6\_1}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MandalAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/NitschkeHHK18, author = {Mirja Nitschke and Philipp Holler and Lukas Hartmann and Dogan Kesdogan}, editor = {Nils Gruschka}, title = {MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix Zones}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {38--53}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_3}, doi = {10.1007/978-3-030-03638-6\_3}, timestamp = {Sat, 01 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/NitschkeHHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/NurmiN18, author = {Juha Nurmi and Mikko S. Niemel{\"{a}}}, editor = {Nils Gruschka}, title = {{PESTEL} Analysis of Hacktivism Campaign Motivations}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {323--335}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_20}, doi = {10.1007/978-3-030-03638-6\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/NurmiN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PullsD18, author = {Tobias Pulls and Rasmus Dahlberg}, editor = {Nils Gruschka}, title = {Steady - {A} Simple End-to-End Secure Logging System}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {88--103}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_6}, doi = {10.1007/978-3-030-03638-6\_6}, timestamp = {Sat, 01 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/PullsD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ReinthalFA18, author = {Alexander Reinthal and Eleftherios Lef Filippakis and Magnus Almgren}, editor = {Nils Gruschka}, title = {Data Modelling for Predicting Exploits}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {336--351}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_21}, doi = {10.1007/978-3-030-03638-6\_21}, timestamp = {Sat, 01 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/ReinthalFA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/RooneyF18, author = {Vivien M. Rooney and Simon N. Foley}, editor = {Nils Gruschka}, title = {What You Can Change and What You Can't: Human Experience in Computer Network Defenses}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {219--235}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_14}, doi = {10.1007/978-3-030-03638-6\_14}, timestamp = {Sat, 01 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/RooneyF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/RyggeJ18, author = {Hanne Rygge and Audun J{\o}sang}, editor = {Nils Gruschka}, title = {Threat Poker: Solving Security and Privacy Threats in Agile Software Development}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {468--483}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_29}, doi = {10.1007/978-3-030-03638-6\_29}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/RyggeJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SentanoeTR18, author = {Stewart Sentanoe and Benjamin Taubmann and Hans P. Reiser}, editor = {Nils Gruschka}, title = {Sarracenia: Enhancing the Performance and Stealthiness of {SSH} Honeypots Using Virtual Machine Introspection}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {255--271}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_16}, doi = {10.1007/978-3-030-03638-6\_16}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/SentanoeTR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/StylianopoulosJ18, author = {Charalampos Stylianopoulos and Linus Johansson and Oskar Olsson and Magnus Almgren}, editor = {Nils Gruschka}, title = {CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {187--202}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_12}, doi = {10.1007/978-3-030-03638-6\_12}, timestamp = {Sat, 01 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/StylianopoulosJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Teseleanu18, author = {George Teseleanu}, editor = {Nils Gruschka}, title = {Unifying Kleptographic Attacks}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {73--87}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_5}, doi = {10.1007/978-3-030-03638-6\_5}, timestamp = {Sat, 01 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/Teseleanu18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/YesufP18, author = {Ahmed Seid Yesuf and Christian W. Probst}, editor = {Nils Gruschka}, title = {Estimating the Risk of Fraud Against E-Services}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {306--322}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_19}, doi = {10.1007/978-3-030-03638-6\_19}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/YesufP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ZahoorIA018, author = {Ehtesham Zahoor and Asim Ikram and Sabina Akhtar and Olivier Perrin}, editor = {Nils Gruschka}, title = {Authorization Policies Specification and Consistency Management within Multi-cloud Environments}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {272--288}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_17}, doi = {10.1007/978-3-030-03638-6\_17}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/ZahoorIA018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ZillienW18, author = {Sebastian Zillien and Steffen Wendzel}, editor = {Nils Gruschka}, title = {Detection of Covert Channels in {TCP} Retransmissions}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {203--218}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_13}, doi = {10.1007/978-3-030-03638-6\_13}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/ZillienW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2018, editor = {Nils Gruschka}, title = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6}, doi = {10.1007/978-3-030-03638-6}, isbn = {978-3-030-03637-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AbedBL17, author = {Farzaneh Abed and Francesco Berti and Stefan Lucks}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Is {RCB} a Leakage Resilient Authenticated Encryption Scheme?}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {39--52}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_3}, doi = {10.1007/978-3-319-70290-2\_3}, timestamp = {Mon, 26 Jun 2023 20:48:37 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AbedBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BalthasarH17, author = {Thibault de Balthasar and Julio C. Hernandez{-}Castro}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {An Analysis of Bitcoin Laundry Services}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {297--312}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_18}, doi = {10.1007/978-3-319-70290-2\_18}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BalthasarH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BuiA17, author = {Thanh Bui and Tuomas Aura}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {{GPASS:} {A} Password Manager with Group-Based Access Control}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {229--244}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_14}, doi = {10.1007/978-3-319-70290-2\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BuiA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BuldasLT17, author = {Ahto Buldas and Risto Laanoja and Ahto Truu}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {A Server-Assisted Hash-Based Signature Scheme}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {3--17}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_1}, doi = {10.1007/978-3-319-70290-2\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BuldasLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ChockalingamPTG17, author = {Sabarathinam Chockalingam and Wolter Pieters and Andr{\'{e}} Teixeira and Pieter H. A. J. M. van Gelder}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Bayesian Network Models in Cyber Security: {A} Systematic Review}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {105--122}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_7}, doi = {10.1007/978-3-319-70290-2\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/ChockalingamPTG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/CostaMM17, author = {N{\'{u}}ria Costa and Ramiro Mart{\'{\i}}nez and Paz Morillo}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Proof of a Shuffle for Lattice-Based Cryptography}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {280--296}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_17}, doi = {10.1007/978-3-319-70290-2\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/CostaMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GayHMS17, author = {Richard Gay and Jinwei Hu and Heiko Mantel and Johannes Schickel}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Towards Accelerated Usage Control Based on Access Correlations}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {245--261}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_15}, doi = {10.1007/978-3-319-70290-2\_15}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/GayHMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GeniolaAA17, author = {Alberto Geniola and Markku Antikainen and Tuomas Aura}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {A Large-Scale Analysis of Download Portals and Freeware Installers}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {209--225}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_13}, doi = {10.1007/978-3-319-70290-2\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GeniolaAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GeraudKLNS17, author = {R{\'{e}}mi G{\'{e}}raud and Mirko Koscina and Paul Lenczner and David Naccache and David Saulpic}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {265--279}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_16}, doi = {10.1007/978-3-319-70290-2\_16}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/GeraudKLNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Giustolisi17, author = {Rosario Giustolisi}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {159--174}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_10}, doi = {10.1007/978-3-319-70290-2\_10}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/Giustolisi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KiennertKLRG17, author = {Christophe Kiennert and Nesrine Kaaniche and Maryline Laurent and Pierre{-}Olivier Rocher and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Anonymous Certification for an e-Assessment Framework}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {70--85}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_5}, doi = {10.1007/978-3-319-70290-2\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/KiennertKLRG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LaudP17, author = {Peeter Laud and Alisa Pankova}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {139--155}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_9}, doi = {10.1007/978-3-319-70290-2\_9}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/LaudP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MaennelOM17, author = {Kaie Maennel and Rain Ottis and Olaf Maennel}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Improving and Measuring Learning Effectiveness at Cyber Defense Exercises}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {123--138}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_8}, doi = {10.1007/978-3-319-70290-2\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/MaennelOM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MiyoshiYFM17, author = {Ryuji Miyoshi and Hiroaki Yamamoto and Hiroshi Fujiwara and Takashi Miyazaki}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Practical and Secure Searchable Symmetric Encryption with a Small Index}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {53--69}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_4}, doi = {10.1007/978-3-319-70290-2\_4}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MiyoshiYFM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MorganP17, author = {Danielle Morgan and Arnis Parsovs}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Using the Estonian Electronic Identity Card for Authentication to a Machine}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {175--191}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_11}, doi = {10.1007/978-3-319-70290-2\_11}, timestamp = {Fri, 24 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MorganP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/OhtakeSZ17, author = {Go Ohtake and Reihaneh Safavi{-}Naini and Liang Feng Zhang}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Outsourcing of Verifiable Attribute-Based Keyword Search}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {18--35}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_2}, doi = {10.1007/978-3-319-70290-2\_2}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/OhtakeSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PalisseDBGL17, author = {Aur{\'{e}}lien Palisse and Antoine Durand and H{\'{e}}l{\`{e}}ne Le Bouder and Colas Le Guernic and Jean{-}Louis Lanet}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {192--208}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_12}, doi = {10.1007/978-3-319-70290-2\_12}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/PalisseDBGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/RothHK17, author = {Christian Roth and Lukas Hartmann and Dogan Kesdogan}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {{PARTS} - Privacy-Aware Routing with Transportation Subgraphs}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {86--101}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_6}, doi = {10.1007/978-3-319-70290-2\_6}, timestamp = {Fri, 01 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/RothHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2017, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2}, doi = {10.1007/978-3-319-70290-2}, isbn = {978-3-319-70289-6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AhmadCG16, author = {Maqsood Ahmad and Bruno Crispo and Teklay Gebremichael}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Empirical Analysis on the Use of Dynamic Code Updates in Android and Its Security Implications}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {119--134}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_8}, doi = {10.1007/978-3-319-47560-8\_8}, timestamp = {Sun, 25 Oct 2020 22:36:50 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/AhmadCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BlumbergsPKMV16, author = {Bernhards Blumbergs and Mauno Pihelgas and Markus Kont and Olaf Maennel and Risto Vaarandi}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Creating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {85--100}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_6}, doi = {10.1007/978-3-319-47560-8\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BlumbergsPKMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/DahlbergPP16, author = {Rasmus Dahlberg and Tobias Pulls and Roel Peeters}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Efficient Sparse Merkle Trees - Caching Strategies and Secure (Non-)Membership Proofs}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {199--215}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_13}, doi = {10.1007/978-3-319-47560-8\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/DahlbergPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/FabreDVB16, author = {Pierre{-}Edouard Fabre and Herv{\'{e}} Debar and Jouni Viinikka and Gr{\'{e}}gory Blanc}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {{ML:} DDoS Damage Control with {MPLS}}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {101--116}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_7}, doi = {10.1007/978-3-319-47560-8\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/FabreDVB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GadyatskayaLZ16, author = {Olga Gadyatskaya and Andra{-}Lidia Lezza and Yury Zhauniarovich}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Evaluation of Resource-Based App Repackaging Detection in Android}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {135--151}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_9}, doi = {10.1007/978-3-319-47560-8\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GadyatskayaLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GranadilloAMMGD16, author = {Gustavo {Gonzalez Granadillo} and Ender Alvarez and Alexander Motzek and Matteo Merialdo and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Towards an Automated and Dynamic Risk Management Response System}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {37--53}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_3}, doi = {10.1007/978-3-319-47560-8\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/GranadilloAMMGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GuAP16, author = {Min Gu and Zaruhi Aslanyan and Christian W. Probst}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Understanding How Components of Organisations Contribute to Attacks}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {54--66}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_4}, doi = {10.1007/978-3-319-47560-8\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/GuAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GueronS16, author = {Shay Gueron and Fabian Schlieker}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Speeding up {R-LWE} Post-quantum Key Exchange}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {187--198}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_12}, doi = {10.1007/978-3-319-47560-8\_12}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GueronS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HalunenV16, author = {Kimmo Halunen and Visa Antero Vallivaara}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Secure, Usable and Privacy-Friendly User Authentication from Keystroke Dynamics}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {256--268}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_16}, doi = {10.1007/978-3-319-47560-8\_16}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/HalunenV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KonigSR16, author = {Sandra K{\"{o}}nig and Stefan Schauer and Stefan Rass}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {67--81}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_5}, doi = {10.1007/978-3-319-47560-8\_5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/KonigSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KouchamMHTM16, author = {Oualid Koucham and St{\'{e}}phane Mocanu and Guillaume Hiet and Jean{-}Marc Thiriet and Fr{\'{e}}d{\'{e}}ric Majorczyk}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Detecting Process-Aware Attacks in Sequential Control Systems}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {20--36}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_2}, doi = {10.1007/978-3-319-47560-8\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/KouchamMHTM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LaudP16, author = {Peeter Laud and Martin Pettai}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Secure Multiparty Sorting Protocols with Covert Privacy}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {216--231}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_14}, doi = {10.1007/978-3-319-47560-8\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/LaudP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PotthastFLL16, author = {Martin Potthast and Christian Forler and Eik List and Stefan Lucks}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Passphone: Outsourcing Phone-Based Web Authentication While Protecting User Privacy}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {235--255}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_15}, doi = {10.1007/978-3-319-47560-8\_15}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/PotthastFLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/RautiLUHRHL16, author = {Sampsa Rauti and Samuel Laur{\'{e}}n and Joni Uitto and Shohreh Hosseinzadeh and Jukka Ruohonen and Sami Hyrynsalmi and Ville Lepp{\"{a}}nen}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {152--168}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_10}, doi = {10.1007/978-3-319-47560-8\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/RautiLUHRHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Rubio-HernanCG16, author = {Jose Rubio{-}Hernan and Luca De Cicco and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {3--19}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_1}, doi = {10.1007/978-3-319-47560-8\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Rubio-HernanCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Ruiter16, author = {Joeri de Ruiter}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {A Tale of the OpenSSL State Machine: {A} Large-Scale Black-Box Analysis}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {169--184}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_11}, doi = {10.1007/978-3-319-47560-8\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Ruiter16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2016, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8}, doi = {10.1007/978-3-319-47560-8}, isbn = {978-3-319-47559-2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BahsiM15, author = {Hayretdin Bahsi and Olaf Manuel Maennel}, editor = {Sonja Buchegger and Mads Dam}, title = {A Conceptual Nationwide Cyber Situational Awareness Framework for Critical Infrastructures}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {3--10}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_1}, doi = {10.1007/978-3-319-26502-5\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BahsiM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BoskKB15, author = {Daniel Bosk and Martin Kjellqvist and Sonja Buchegger}, editor = {Sonja Buchegger and Mads Dam}, title = {Towards Perfectly Secure and Deniable Communication Using an NFC-Based Key-Exchange Scheme}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {72--87}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_6}, doi = {10.1007/978-3-319-26502-5\_6}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BoskKB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Brumley15, author = {Billy Bob Brumley}, editor = {Sonja Buchegger and Mads Dam}, title = {Faster Binary Curve Software: {A} Case Study}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {91--105}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_7}, doi = {10.1007/978-3-319-26502-5\_7}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Brumley15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/CatuognoGP15, author = {Luigi Catuogno and Clemente Galdi and Giuseppe Persiano}, editor = {Sonja Buchegger and Mads Dam}, title = {Guaranteeing Dependency Enforcement in Software Updates}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {205--212}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_15}, doi = {10.1007/978-3-319-26502-5\_15}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/CatuognoGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Gorton15, author = {Dan Gorton}, editor = {Sonja Buchegger and Mads Dam}, title = {IncidentResponseSim: An Agent-Based Simulation Tool for Risk Management of Online Fraud}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {172--187}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_12}, doi = {10.1007/978-3-319-26502-5\_12}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Gorton15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GreschbachREB15, author = {Benjamin Greschbach and Guillermo Rodr{\'{\i}}guez{-}Cano and Tomas Ericsson and Sonja Buchegger}, editor = {Sonja Buchegger and Mads Dam}, title = {Design of a Privacy-Preserving Document Submission and Grading System}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {64--71}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_5}, doi = {10.1007/978-3-319-26502-5\_5}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GreschbachREB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HolmKVW15, author = {Hannes Holm and Martin Karresand and Arne Vidstr{\"{o}}m and Erik Westring}, editor = {Sonja Buchegger and Mads Dam}, title = {A Survey of Industrial Control System Testbeds}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {11--26}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_2}, doi = {10.1007/978-3-319-26502-5\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/HolmKVW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/JagerRAH15, author = {Bernd J{\"{a}}ger and Christian R{\"{o}}pke and Iris Adam and Thorsten Holz}, editor = {Sonja Buchegger and Mads Dam}, title = {Multi-layer Access Control for SDN-Based Telco Clouds}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {197--204}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_14}, doi = {10.1007/978-3-319-26502-5\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/JagerRAH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/JinP15, author = {Hongyu Jin and Panos Papadimitratos}, editor = {Sonja Buchegger and Mads Dam}, title = {Resilient Collaborative Privacy for Location-Based Services}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {47--63}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_4}, doi = {10.1007/978-3-319-26502-5\_4}, timestamp = {Fri, 09 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/JinP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Lopez-RojasA15, author = {Edgar Alonso Lopez{-}Rojas and Stefan Axelsson}, editor = {Sonja Buchegger and Mads Dam}, title = {Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage of Retail Fraud}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {156--171}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_11}, doi = {10.1007/978-3-319-26502-5\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/Lopez-RojasA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LoutfiJ15, author = {Ijlal Loutfi and Audun J{\o}sang}, editor = {Sonja Buchegger and Mads Dam}, title = {{FIDO} Trust Requirements}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {139--155}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_10}, doi = {10.1007/978-3-319-26502-5\_10}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/LoutfiJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PedersenSLNH15, author = {Martin Leth Pedersen and Michael Hedegaard S{\o}rensen and Daniel Lux and Ulrik Nyman and Ren{\'{e}} Rydhof Hansen}, editor = {Sonja Buchegger and Mads Dam}, title = {The Timed Decentralised Label Model}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {27--43}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_3}, doi = {10.1007/978-3-319-26502-5\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/PedersenSLNH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SaarinenB15, author = {Markku{-}Juhani O. Saarinen and Billy Bob Brumley}, editor = {Sonja Buchegger and Mads Dam}, title = {WHIRLBOB, the Whirlpool Based Variant of {STRIBOB}}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {106--122}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_8}, doi = {10.1007/978-3-319-26502-5\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/SaarinenB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SuorantaHA15, author = {Sanna Suoranta and Lari Haataja and Tuomas Aura}, editor = {Sonja Buchegger and Mads Dam}, title = {Electronic Citizen Identities and Strong Authentication}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {213--230}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_16}, doi = {10.1007/978-3-319-26502-5\_16}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/SuorantaHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/VoronkovLM15, author = {Artem Voronkov and Stefan Lindskog and Leonardo A. Martucci}, editor = {Sonja Buchegger and Mads Dam}, title = {Challenges in Managing Firewalls}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {191--196}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_13}, doi = {10.1007/978-3-319-26502-5\_13}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/VoronkovLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/YangO15, author = {Huihui Yang and Vladimir A. Oleshchuk}, editor = {Sonja Buchegger and Mads Dam}, title = {An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees}, booktitle = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, pages = {123--135}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5\_9}, doi = {10.1007/978-3-319-26502-5\_9}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/YangO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2015, editor = {Sonja Buchegger and Mads Dam}, title = {Secure {IT} Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9417}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26502-5}, doi = {10.1007/978-3-319-26502-5}, isbn = {978-3-319-26501-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AnguloWH14, author = {Julio Angulo and Erik W{\"{a}}stlund and Johan H{\"{o}}gberg}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {What Would It Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {129--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_8}, doi = {10.1007/978-3-319-11599-3\_8}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AnguloWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AntikainenAS14, author = {Markku Antikainen and Tuomas Aura and Mikko S{\"{a}}rel{\"{a}}}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Spook in Your Network: Attacking an {SDN} with a Compromised OpenFlow Switch}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {229--244}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_14}, doi = {10.1007/978-3-319-11599-3\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AntikainenAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BergstromA14, author = {Erik Bergstr{\"{o}}m and Rose{-}Mharie {\AA}hlfeldt}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Information Classification Issues}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {27--41}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_2}, doi = {10.1007/978-3-319-11599-3\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BergstromA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BessonBJ14, author = {Fr{\'{e}}d{\'{e}}ric Besson and Nataliia Bielova and Thomas P. Jensen}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Browser Randomisation against Fingerprinting: {A} Quantitative Information Flow Approach}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {181--196}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_11}, doi = {10.1007/978-3-319-11599-3\_11}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BessonBJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BogdanovLT14, author = {Dan Bogdanov and Sven Laur and Riivo Talviste}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {59--74}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_4}, doi = {10.1007/978-3-319-11599-3\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BogdanovLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BuldasTLG14, author = {Ahto Buldas and Ahto Truu and Risto Laanoja and Rainer Gerhards}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Efficient Record-Level Keyless Signatures for Audit Logs}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {149--164}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_9}, doi = {10.1007/978-3-319-11599-3\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BuldasTLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Giunti14, author = {Marco Giunti}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Static Semantics of Secret Channel Abstractions}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {165--180}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_10}, doi = {10.1007/978-3-319-11599-3\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Giunti14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GligoroskiMSJJE14, author = {Danilo Gligoroski and Hristina Mihajloska and Simona Samardjiska and H{\aa}kon Jacobsen and Rune Erlend Jensen and Mohamed El{-}Hadedy}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {{\(\pi\)}-Cipher: Authenticated Encryption for Big Data}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {110--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_7}, doi = {10.1007/978-3-319-11599-3\_7}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GligoroskiMSJJE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GondiSV14, author = {Kalpana Gondi and A. Prasad Sistla and V. N. Venkatakrishnan}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {{DEICS:} Data Erasure in Concurrent Software}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {42--58}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_3}, doi = {10.1007/978-3-319-11599-3\_3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GondiSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KalliolaAS14, author = {Aapo Kalliola and Tuomas Aura and Sanja Scepanovic}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Denial-of-Service Mitigation for Internet Services}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {213--228}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_13}, doi = {10.1007/978-3-319-11599-3\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/KalliolaAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LeninWS14, author = {Aleksandr Lenin and Jan Willemson and Dyan Permata Sari}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Attacker Profiling in Quantitative Security Assessment Based on Attack Trees}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {199--212}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_12}, doi = {10.1007/978-3-319-11599-3\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/LeninWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Pearson14, author = {Siani Pearson}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Accountability in Cloud Service Provision Ecosystems}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {3--24}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_1}, doi = {10.1007/978-3-319-11599-3\_1}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Pearson14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PflugB14, author = {Anika Pflug and Christoph Busch}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Segmentation and Normalization of Human Ears Using Cascaded Pose Regression}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {261--272}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_16}, doi = {10.1007/978-3-319-11599-3\_16}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/PflugB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ReshetovaKNA14, author = {Elena Reshetova and Janne Karhunen and Thomas Nyman and N. Asokan}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Security of OS-Level Virtualization Technologies}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {77--93}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_5}, doi = {10.1007/978-3-319-11599-3\_5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/ReshetovaKNA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/TrombettaPB14, author = {Alberto Trombetta and Giuseppe Persiano and Stefano Braghin}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {94--109}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_6}, doi = {10.1007/978-3-319-11599-3\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/TrombettaPB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/XuC14, author = {Liangyu Xu and Armin B. Cremers}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Patients' Privacy Protection against Insurance Companies in eHealth Systems}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {247--260}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_15}, doi = {10.1007/978-3-319-11599-3\_15}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/XuC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2014, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3}, doi = {10.1007/978-3-319-11599-3}, isbn = {978-3-319-11598-6}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AnsperBFW13, author = {Arne Ansper and Ahto Buldas and Margus Freudenthal and Jan Willemson}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {High-Performance Qualified Digital Signatures for X-Road}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {123--138}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_9}, doi = {10.1007/978-3-642-41488-6\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AnsperBFW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AntoniniBP13, author = {Alessio Antonini and Alessandro Barenghi and Gerardo Pelosi}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {199--214}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_14}, doi = {10.1007/978-3-642-41488-6\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AntoniniBP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AyalewKC13, author = {Tigist Ayalew and Tigist Kidane and Bengt Carlsson}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Identification and Evaluation of Security Activities in Agile Projects}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {139--153}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_10}, doi = {10.1007/978-3-642-41488-6\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AyalewKC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Balliu13, author = {Musard Balliu}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {A Logic for Information Flow Analysis of Distributed Programs}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {84--99}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_6}, doi = {10.1007/978-3-642-41488-6\_6}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Balliu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BraunPP13, author = {Bastian Braun and Christian v. Pollak and Joachim Posegga}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {A Survey on Control-Flow Integrity Means in Web Application Frameworks}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {231--246}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_16}, doi = {10.1007/978-3-642-41488-6\_16}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BraunPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BroekS13, author = {Fabian van den Broek and Ronny Wichers Schreur}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Femtocell Security in Theory and Practice}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {183--198}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_13}, doi = {10.1007/978-3-642-41488-6\_13}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BroekS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BuirasR13, author = {Pablo Buiras and Alejandro Russo}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Lazy Programs Leak Secrets}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {116--122}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_8}, doi = {10.1007/978-3-642-41488-6\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BuirasR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BuldasKL13, author = {Ahto Buldas and Andres Kroonmaa and Risto Laanoja}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {313--320}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_21}, doi = {10.1007/978-3-642-41488-6\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BuldasKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BurgersVE13, author = {Willem Burgers and Roel Verdult and Marko C. J. D. van Eekelen}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {33--50}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_3}, doi = {10.1007/978-3-642-41488-6\_3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BurgersVE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HachemGD13, author = {Nabil Hachem and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {An Adaptive Mitigation Framework for Handling Suspicious Network Flows via {MPLS} Policies}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {297--312}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_20}, doi = {10.1007/978-3-642-41488-6\_20}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/HachemGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HasuBH13, author = {Tero Hasu and Anya Helene Bagge and Magne Haveraaen}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Inferring Required Permissions for Statically Composed Programs}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {51--66}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_4}, doi = {10.1007/978-3-642-41488-6\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/HasuBH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KrotofilC13, author = {Marina Krotofil and Alvaro A. C{\'{a}}rdenas}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Resilience of Process Control Systems to Cyber-Physical Attacks}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {166--182}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_12}, doi = {10.1007/978-3-642-41488-6\_12}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/KrotofilC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LouwPKV13, author = {Mike Ter Louw and Phu H. Phung and Rohini Krishnamurti and Venkat N. Venkatakrishnan}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {SafeScript: JavaScript Transformation for Policy Enforcement}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {67--83}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_5}, doi = {10.1007/978-3-642-41488-6\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/LouwPKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MauroFMD13, author = {Alessio Di Mauro and Xenofon Fafoutis and Sebastian M{\"{o}}dersheim and Nicola Dragoni}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated {MAC} Protocols for Energy Efficient WSNs}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {1--16}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_1}, doi = {10.1007/978-3-642-41488-6\_1}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MauroFMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MilushevC13, author = {Dimiter Milushev and Dave Clarke}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Incremental Hyperproperty Model Checking via Games}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {247--262}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_17}, doi = {10.1007/978-3-642-41488-6\_17}, timestamp = {Wed, 22 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MilushevC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/NagyAO13, author = {Marcin Nagy and N. Asokan and J{\"{o}}rg Ott}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {PeerShare: {A} System Secure Distribution of Sensitive Data among Social Contacts}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {154--165}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_11}, doi = {10.1007/978-3-642-41488-6\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/NagyAO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PaladiGM13, author = {Nicolae Paladi and Christian Gehrmann and Fredric Morenius}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Domain-Based Storage Protection {(DBSP)} in Public Infrastructure Clouds}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {279--296}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_19}, doi = {10.1007/978-3-642-41488-6\_19}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/PaladiGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PettaiL13, author = {Martin Pettai and Peeter Laud}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Dynamics and Secure Information Flow for a Higher-Order Pi-Calculus}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {100--115}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_7}, doi = {10.1007/978-3-642-41488-6\_7}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/PettaiL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SansCH13, author = {Thierry Sans and Iliano Cervesato and Soha Hussein}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Controlling Data Flow with a Policy-Based Programming Language for the Web}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {215--230}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_15}, doi = {10.1007/978-3-642-41488-6\_15}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/SansCH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Stokes13, author = {Klara Stokes}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Graph k-Anonymity through k-Means and as Modular Decomposition}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {263--278}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_18}, doi = {10.1007/978-3-642-41488-6\_18}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Stokes13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/VigoBY13, author = {Roberto Vigo and Alessandro Bruni and Ender Y{\"{u}}ksel}, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Security Games for Cyber-Physical Systems}, booktitle = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, pages = {17--32}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6\_2}, doi = {10.1007/978-3-642-41488-6\_2}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/VigoBY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2013, editor = {Hanne Riis Nielson and Dieter Gollmann}, title = {Secure {IT} Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8208}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41488-6}, doi = {10.1007/978-3-642-41488-6}, isbn = {978-3-642-41487-9}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AdolphiL12, author = {Benjamin Adolphi and Hanno Langweg}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Security Add-Ons for Mobile Platforms}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {17--30}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_2}, doi = {10.1007/978-3-642-34210-3\_2}, timestamp = {Sat, 19 Oct 2019 20:02:02 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AdolphiL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BlomGPRV12, author = {Arjan Blom and Gerhard de Koning Gans and Erik Poll and Joeri de Ruiter and Roel Verdult}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Designed to Fail: {A} USB-Connected Reader for Online Banking}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_1}, doi = {10.1007/978-3-642-34210-3\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BlomGPRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Clark12, author = {Jason W. Clark}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Everything But the Kitchen Sink: Determining the Effect of Multiple Attacks on Privacy Preserving Technology Users}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {199--214}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_14}, doi = {10.1007/978-3-642-34210-3\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Clark12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/DuanZ12, author = {Huiying Duan and C{\"{a}}cilia Zirn}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Can We Identify Manipulative Behavior and the Corresponding Suspects on Review Websites Using Supervised Learning?}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {215--230}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_15}, doi = {10.1007/978-3-642-34210-3\_15}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/DuanZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GronerB12, author = {Ramona Groner and Philipp Brune}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Towards an Empirical Examination of {IT} Security Infrastructures in {SME}}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {73--88}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_6}, doi = {10.1007/978-3-642-34210-3\_6}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GronerB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HelkalaSTW12, author = {Kirsi Helkala and Nils Kalstad Svendsen and Per Thorsheim and Anders Wiehe}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Cracking Associative Passwords}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {153--168}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_11}, doi = {10.1007/978-3-642-34210-3\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/HelkalaSTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/JensenPOH12, author = {Torben Jensen and Heine Pedersen and Mads Chr. Olesen and Ren{\'{e}} Rydhof Hansen}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {{THAPS:} Automated Vulnerability Scanning of {PHP} Applications}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {31--46}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_3}, doi = {10.1007/978-3-642-34210-3\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/JensenPOH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MassacciP12, author = {Fabio Massacci and Federica Paci}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {How to Select a Security Requirements Method? {A} Comparative Study with Students and Practitioners}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {89--104}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_7}, doi = {10.1007/978-3-642-34210-3\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/MassacciP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MilushevC12, author = {Dimiter Milushev and Dave Clarke}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Coinductive Unwinding of Security-Relevant Hyperproperties}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {121--136}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_9}, doi = {10.1007/978-3-642-34210-3\_9}, timestamp = {Wed, 22 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/MilushevC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/NoormanNP12, author = {Job Noorman and Nick Nikiforakis and Frank Piessens}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {There Is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {105--120}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_8}, doi = {10.1007/978-3-642-34210-3\_8}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/NoormanNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Proctor12, author = {Tony Proctor}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {The Development of Cyber Security Warning, Advice and Report Points}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {61--72}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_5}, doi = {10.1007/978-3-642-34210-3\_5}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Proctor12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Pulls12, author = {Tobias Pulls}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Privacy-Friendly Cloud Storage for the Data Track - An Educational Transparency Tool}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {231--246}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_16}, doi = {10.1007/978-3-642-34210-3\_16}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Pulls12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SangchoolieNOJ12, author = {Behrooz Sangchoolie and Mazdak Rajabi Nasab and Tomas Olovsson and Wolfgang John}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {184--198}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_13}, doi = {10.1007/978-3-642-34210-3\_13}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/SangchoolieNOJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SommestadH12, author = {Teodor Sommestad and Jonas Hallberg}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {47--60}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_4}, doi = {10.1007/978-3-642-34210-3\_4}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/SommestadH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/StahlM12, author = {Bj{\"{o}}rn St{\aa}hl and Per Mellstrand}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Retooling and Securing Systemic Debugging}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {137--152}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_10}, doi = {10.1007/978-3-642-34210-3\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/StahlM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ZibuschkaF12, author = {Jan Zibuschka and Lothar Fritsch}, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {A Hybrid Approach for Highly Available and Secure Storage of Pseudo-SSO Credentials}, booktitle = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, pages = {169--183}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3\_12}, doi = {10.1007/978-3-642-34210-3\_12}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/ZibuschkaF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2010, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27937-9}, doi = {10.1007/978-3-642-27937-9}, isbn = {978-3-642-27936-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2011, editor = {Peeter Laud}, title = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29615-4}, doi = {10.1007/978-3-642-29615-4}, isbn = {978-3-642-29614-7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2012, editor = {Audun J{\o}sang and Bengt Carlsson}, title = {Secure {IT} Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7617}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34210-3}, doi = {10.1007/978-3-642-34210-3}, isbn = {978-3-642-34209-7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Ansper11, author = {Arne Ansper}, editor = {Peeter Laud}, title = {Designing a Governmental Backbone}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {1--3}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_1}, doi = {10.1007/978-3-642-29615-4\_1}, timestamp = {Mon, 03 Jan 2022 22:16:22 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/Ansper11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BeitollahiD11, author = {Hakem Beitollahi and Geert Deconinck}, editor = {Peeter Laud}, title = {A Ring Based Onion Circuit for Hidden Services}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {13--30}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_3}, doi = {10.1007/978-3-642-29615-4\_3}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BeitollahiD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BodaFGI11, author = {K{\'{a}}roly Boda and {\'{A}}d{\'{a}}m M{\'{a}}t{\'{e}} F{\"{o}}ldes and G{\'{a}}bor Gy{\"{o}}rgy Guly{\'{a}}s and S{\'{a}}ndor Imre}, editor = {Peeter Laud}, title = {User Tracking on the Web via Cross-Browser Fingerprinting}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {31--46}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_4}, doi = {10.1007/978-3-642-29615-4\_4}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BodaFGI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ClaesLB11, author = {Mathias Claes and Vincent van der Leest and An Braeken}, editor = {Peeter Laud}, title = {Comparison of {SRAM} and {FF} {PUF} in 65nm Technology}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {47--64}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_5}, doi = {10.1007/978-3-642-29615-4\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/ClaesLB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/CucurullNR11, author = {Jordi Cucurull and Simin Nadjm{-}Tehrani and Massimiliano Raciti}, editor = {Peeter Laud}, title = {Modular Anomaly Detection for Smartphone Ad Hoc Communication}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {65--81}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_6}, doi = {10.1007/978-3-642-29615-4\_6}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/CucurullNR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/DossogneL11, author = {J{\'{e}}r{\^{o}}me Dossogne and Fr{\'{e}}d{\'{e}}ric Lafitte}, editor = {Peeter Laud}, title = {Mental Voting Booths}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {82--97}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_7}, doi = {10.1007/978-3-642-29615-4\_7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/DossogneL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HamamotoTO11, author = {Kazutomo Hamamoto and Yasuyuki Tahara and Akihiko Ohsuga}, editor = {Peeter Laud}, title = {Methods for Privacy Protection Considering Status of Service Provider and User Community}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {98--113}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_8}, doi = {10.1007/978-3-642-29615-4\_8}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/HamamotoTO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HelkalaS11, author = {Kirsi Helkala and Nils Kalstad Svendsen}, editor = {Peeter Laud}, title = {The Security and Memorability of Passwords Generated by Using an Association Element and a Personal Factor}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {114--130}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_9}, doi = {10.1007/978-3-642-29615-4\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/HelkalaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Kani-ZabihiH11, author = {Elahe Kani{-}Zabihi and Martin Helmhout}, editor = {Peeter Laud}, title = {Increasing Service Users' Privacy Awareness by Introducing On-Line Interactive Privacy Features}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {131--148}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_10}, doi = {10.1007/978-3-642-29615-4\_10}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Kani-ZabihiH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LemayKT11, author = {Fr{\'{e}}d{\'{e}}rick Lemay and Rapha{\"{e}}l Khoury and Nadia Tawbi}, editor = {Peeter Laud}, title = {Optimized Inlining of Runtime Monitors}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {149--161}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_11}, doi = {10.1007/978-3-642-29615-4\_11}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/LemayKT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LupuBR11, author = {Radu Lupu and Eugen Borcoci and Tinku Rasheed}, editor = {Peeter Laud}, title = {Identity-Based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Service}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {162--175}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_12}, doi = {10.1007/978-3-642-29615-4\_12}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/LupuBR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MoonsamyTB11, author = {Veelasha Moonsamy and Ronghua Tian and Lynn Margaret Batten}, editor = {Peeter Laud}, title = {Feature Reduction to Speed Up Malware Classification}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {176--188}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_13}, doi = {10.1007/978-3-642-29615-4\_13}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/MoonsamyTB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/NazarSB11, author = {Assem Nazar and Mark M. Seeger and Harald Baier}, editor = {Peeter Laud}, title = {Rooting Android - Extending the {ADB} by an Auto-connecting WiFi-Accessible Service}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {189--204}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_14}, doi = {10.1007/978-3-642-29615-4\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/NazarSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SenM11, author = {Jaydip Sen and Subhamoy Maitra}, editor = {Peeter Laud}, title = {An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {205--222}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_15}, doi = {10.1007/978-3-642-29615-4\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/SenM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/StefanRMM11, author = {Deian Stefan and Alejandro Russo and David Mazi{\`{e}}res and John C. Mitchell}, editor = {Peeter Laud}, title = {Disjunction Category Labels}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {223--239}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_16}, doi = {10.1007/978-3-642-29615-4\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/StefanRMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Tondel11, author = {Inger Anne T{\o}ndel}, editor = {Peeter Laud}, title = {Visualization Control for Event-Based Public Display Systems Used in a Hospital Setting}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {240--255}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_17}, doi = {10.1007/978-3-642-29615-4\_17}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Tondel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Vinkel11, author = {Priit Vinkel}, editor = {Peeter Laud}, title = {Internet Voting in Estonia}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {4--12}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_2}, doi = {10.1007/978-3-642-29615-4\_2}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Vinkel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/WengerH11, author = {Erich Wenger and Michael Hutter}, editor = {Peeter Laud}, title = {Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {256--271}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_18}, doi = {10.1007/978-3-642-29615-4\_18}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/WengerH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AlmgrenJ10, author = {Magnus Almgren and Wolfgang John}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Tracking Malicious Hosts on a 10Gbps Backbone Link}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {104--120}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_8}, doi = {10.1007/978-3-642-27937-9\_8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AlmgrenJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BorgaonkarRS10, author = {Ravishankar Borgaonkar and Kevin Redon and Jean{-}Pierre Seifert}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Experimental Analysis of the Femtocell Location Verification Techniques}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {49--54}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_4}, doi = {10.1007/978-3-642-27937-9\_4}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BorgaonkarRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Brumley10, author = {Billy Bob Brumley}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Secure and Fast Implementations of Two Involution Ciphers}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {269--282}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_19}, doi = {10.1007/978-3-642-27937-9\_19}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Brumley10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ChiaHA10, author = {Pern Hui Chia and Andreas P. Heiner and N. Asokan}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Use of Ratings from Personalized Communities for Trustworthy Application Installation}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {71--88}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_6}, doi = {10.1007/978-3-642-27937-9\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/ChiaHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ContiR10, author = {Juan Jos{\'{e}} Conti and Alejandro Russo}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {A Taint Mode for Python via a Library}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {210--222}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_15}, doi = {10.1007/978-3-642-27937-9\_15}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/ContiR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/CramptonH10, author = {Jason Crampton and Michael Huth}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {A Framework for the Modular Specification and Orchestration of Authorization Policies}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {155--170}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_11}, doi = {10.1007/978-3-642-27937-9\_11}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/CramptonH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GadyatskayaMPS10, author = {Olga Gadyatskaya and Fabio Massacci and Federica Paci and Sergey A. Stankevich}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {187--192}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_13}, doi = {10.1007/978-3-642-27937-9\_13}, timestamp = {Thu, 08 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/GadyatskayaMPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HerrmannGBF10, author = {Dominik Herrmann and Christoph Gerber and Christian Banse and Hannes Federrath}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {136--154}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_10}, doi = {10.1007/978-3-642-27937-9\_10}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/HerrmannGBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Kani-ZabihiC10, author = {Elahe Kani{-}Zabihi and Lizzie Coles{-}Kemp}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {121--135}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_9}, doi = {10.1007/978-3-642-27937-9\_9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Kani-ZabihiC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Koivunen10, author = {Erka Koivunen}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {"Why Wasn't {I} Notified?": Information Security Incident Reporting Demystified}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {55--70}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_5}, doi = {10.1007/978-3-642-27937-9\_5}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Koivunen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KomuTL10, author = {Miika Komu and Sasu Tarkoma and Andrey Lukyanenko}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {33--48}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_3}, doi = {10.1007/978-3-642-27937-9\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/KomuTL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KostiainenAE10, author = {Kari Kostiainen and N. Asokan and Jan{-}Erik Ekberg}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Credential Disabling from Trusted Execution Environments}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {171--186}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_12}, doi = {10.1007/978-3-642-27937-9\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/KostiainenAE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KreitzDW10, author = {Gunnar Kreitz and Mads Dam and Douglas Wikstr{\"{o}}m}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Practical Private Information Aggregation in Large Networks}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {89--103}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_7}, doi = {10.1007/978-3-642-27937-9\_7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/KreitzDW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MagaziniusPS10, author = {Jonas Magazinius and Phu H. Phung and David Sands}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Safe Wrappers and Sane Policies for Self Protecting JavaScript}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {239--255}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_17}, doi = {10.1007/978-3-642-27937-9\_17}, timestamp = {Wed, 10 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/MagaziniusPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/QuaresmaP10, author = {Jose Quaresma and Christian W. Probst}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Protocol Implementation Generator}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {256--268}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_18}, doi = {10.1007/978-3-642-27937-9\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/QuaresmaP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/RyckDDPJ10, author = {Philippe De Ryck and Maarten Decat and Lieven Desmet and Frank Piessens and Wouter Joosen}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Security of Web Mashups: {A} Survey}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {223--238}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_16}, doi = {10.1007/978-3-642-27937-9\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/RyckDDPJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Saarinen10, author = {Markku{-}Juhani O. Saarinen}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {The {PASSERINE} Public Key Encryption and Authentication Mechanism}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {283--288}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_20}, doi = {10.1007/978-3-642-27937-9\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Saarinen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SarelaRZNO10, author = {Mikko S{\"{a}}rel{\"{a}} and Christian Esteve Rothenberg and Andr{\'{a}}s Zahemszky and Pekka Nikander and J{\"{o}}rg Ott}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {BloomCasting: Security in Bloom Filter Based Multicast}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {1--16}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_1}, doi = {10.1007/978-3-642-27937-9\_1}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/SarelaRZNO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SuorantaHS10, author = {Sanna Suoranta and Jani Heikkinen and Pekka Silvekoski}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Authentication Session Migration}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {17--32}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_2}, doi = {10.1007/978-3-642-27937-9\_2}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/SuorantaHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/TedescoRS10, author = {Filippo Del Tedesco and Alejandro Russo and David Sands}, editor = {Tuomas Aura and Kimmo J{\"{a}}rvinen and Kaisa Nyberg}, title = {Implementing Erasure Policies Using Taint Analysis}, booktitle = {Information Security Technology for Applications - 15th Nordic Conference on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7127}, pages = {193--209}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27937-9\_14}, doi = {10.1007/978-3-642-27937-9\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/TedescoRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AhmedCM09, author = {Ejaz Ahmed and Andrew J. Clark and George M. Mohay}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {104--119}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_8}, doi = {10.1007/978-3-642-04766-4\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AhmedCM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AhmedJ09, author = {Naveed Ahmed and Christian Damsgaard Jensen}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {A Mechanism for Identity Delegation at Authentication Level}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {148--162}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_11}, doi = {10.1007/978-3-642-04766-4\_11}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/AhmedJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AnsperHLOL09, author = {Arne Ansper and Sven Heiberg and Helger Lipmaa and Tom Andr{\'{e}} {\O}verland and Filip van Laenen}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Security and Trust for the Norwegian E-Voting Pilot Project \emph{E-valg 2011}}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {207--222}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_15}, doi = {10.1007/978-3-642-04766-4\_15}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AnsperHLOL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BielovaMM09, author = {Nataliia Bielova and Fabio Massacci and Andrea Micheletti}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Towards Practical Enforcement Theories}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {239--254}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_17}, doi = {10.1007/978-3-642-04766-4\_17}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BielovaMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BoudaKMS09, author = {Jan Bouda and Jan Krhovjak and Vashek Matyas and Petr Svenda}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Towards True Random Number Generation in Mobile Environments}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {179--189}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_13}, doi = {10.1007/978-3-642-04766-4\_13}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BoudaKMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/CasadoT09, author = {Lander Casado and Philippas Tsigas}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {ContikiSec: {A} Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {133--147}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_10}, doi = {10.1007/978-3-642-04766-4\_10}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/CasadoT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/ChabotKT09, author = {Hugues Chabot and Rapha{\"{e}}l Khoury and Nadia Tawbi}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Generating In-Line Monitors for Rabin Automata}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {287--301}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_20}, doi = {10.1007/978-3-642-04766-4\_20}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/ChabotKT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Crampton09, author = {Jason Crampton}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Trade-Offs in Cryptographic Implementations of Temporal Access Control}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {72--87}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_6}, doi = {10.1007/978-3-642-04766-4\_6}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Crampton09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/FerdousJSB09, author = {Md. Sadek Ferdous and Audun J{\o}sang and Kuldeep Singh and Ravishankar Borgaonkar}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Security Usability of Petname Systems}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {44--59}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_4}, doi = {10.1007/978-3-642-04766-4\_4}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/FerdousJSB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/FocardiLS09, author = {Riccardo Focardi and Flaminia L. Luccio and Graham Steel}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Blunting Differential Attacks on {PIN} Processing APIs}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {88--103}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_7}, doi = {10.1007/978-3-642-04766-4\_7}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/FocardiLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HalvorsenHEM09, author = {Finn Michael Halvorsen and Olav Haugen and Martin Eian and Stig Fr. Mj{\o}lsnes}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {An Improved Attack on {TKIP}}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {120--132}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_9}, doi = {10.1007/978-3-642-04766-4\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/HalvorsenHEM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/HolthTJT09, author = {Karsten Peder Holth and Do van Thuan and Ivar J{\o}rstad and Do Van Thanh}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {An Analysis of Widget Security}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {60--71}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_5}, doi = {10.1007/978-3-642-04766-4\_5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/HolthTJT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KiviharjuVK09, author = {Mikko Kiviharju and Teijo Ven{\"{a}}l{\"{a}}inen and Suna Kinnunen}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Towards Modelling Information Security with Key-Challenge Petri Nets}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {190--206}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_14}, doi = {10.1007/978-3-642-04766-4\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/KiviharjuVK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LaudR09, author = {Peeter Laud and Meelis Roos}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Formal Analysis of the Estonian Mobile-ID Protocol}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {271--286}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_19}, doi = {10.1007/978-3-642-04766-4\_19}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/LaudR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Margasinski09, author = {Igor Margasinski}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {A Parallelism-Based Approach to Network Anonymization}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {28--43}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_3}, doi = {10.1007/978-3-642-04766-4\_3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Margasinski09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MuntermannR09, author = {Jan Muntermann and Heiko Ro{\ss}nagel}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the {US} Stock Market}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {1--14}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_1}, doi = {10.1007/978-3-642-04766-4\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/MuntermannR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/RossnagelM09, author = {Heiko Ro{\ss}nagel and Jan Muntermann}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {163--178}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_12}, doi = {10.1007/978-3-642-04766-4\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/RossnagelM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/RossnagelZPD09, author = {Heiko Ro{\ss}nagel and Jan Zibuschka and Lexi Pimenidis and Thomas Deselaers}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Facilitating the Adoption of Tor by Focusing on a Promising Target Group}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {15--27}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_2}, doi = {10.1007/978-3-642-04766-4\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/RossnagelZPD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/VilarinhoHN09, author = {Thomas Vilarinho and Kjetil Haslum and Josef Noll}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Advanced {SIM} Capabilities Supporting Trust-Based Applications}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {223--238}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_16}, doi = {10.1007/978-3-642-04766-4\_16}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/VilarinhoHN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/Westermann09, author = {Benedikt Westermann}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Security Analysis of AN.ON's Payment Scheme}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {255--270}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_18}, doi = {10.1007/978-3-642-04766-4\_18}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Westermann09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2009, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4}, doi = {10.1007/978-3-642-04766-4}, isbn = {978-3-642-04765-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.