Search dblp for Publications

export results for "toc:db/conf/sec/sec2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sec/AbadiTD15,
  author       = {Aydin Abadi and
                  Sotirios Terzis and
                  Changyu Dong},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {{O-PSI:} Delegated Private Set Intersection on Outsourced Datasets},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_1},
  doi          = {10.1007/978-3-319-18467-8\_1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/AbadiTD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/AlmeshekahAS15,
  author       = {Mohammed H. Almeshekah and
                  Mikhail J. Atallah and
                  Eugene H. Spafford},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Enhancing Passwords Security Using Deceptive Covert Communication},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {159--173},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_11},
  doi          = {10.1007/978-3-319-18467-8\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/AlmeshekahAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BansalPM15,
  author       = {Chetan Bansal and
                  S{\"{o}}ren Preibusch and
                  Natasa Milic{-}Frayling},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Cache Timing Attacks Revisited: Efficient and Repeatable Browser History,
                  {OS} and Network Sniffing},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_7},
  doi          = {10.1007/978-3-319-18467-8\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BansalPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BellaGLR15,
  author       = {Giampaolo Bella and
                  Rosario Giustolisi and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {A Secure Exam Protocol Without Trusted Parties},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {495--509},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_33},
  doi          = {10.1007/978-3-319-18467-8\_33},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BellaGLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CarbinoTL15,
  author       = {Timothy J. Carbino and
                  Michael A. Temple and
                  Juan Lopez Jr.},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network
                  Access Control},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {204--217},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_14},
  doi          = {10.1007/978-3-319-18467-8\_14},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/CarbinoTL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ConnollyLT15,
  author       = {Lena Yuryna Connolly and
                  Michael Lang and
                  J. Doug Tygar},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Investigation of Employee Security Behaviour: {A} Grounded Theory
                  Approach},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {283--296},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_19},
  doi          = {10.1007/978-3-319-18467-8\_19},
  timestamp    = {Fri, 15 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/ConnollyLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DengZL15,
  author       = {Liang Deng and
                  Qingkai Zeng and
                  Yao Liu},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {ISboxing: An Instruction Substitution Based Data Sandboxing for x86
                  Untrusted Libraries},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {386--400},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_26},
  doi          = {10.1007/978-3-319-18467-8\_26},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/DengZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DoBH15,
  author       = {Quoc Huy Do and
                  Richard Bubel and
                  Reiner H{\"{a}}hnle},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Exploit Generation for Information Flow Leaks in Object-Oriented Programs},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {401--415},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_27},
  doi          = {10.1007/978-3-319-18467-8\_27},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DoBH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Domingo-FerrerW15,
  author       = {Josep Domingo{-}Ferrer and
                  Qianhong Wu and
                  Alberto Blanco{-}Justicia},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Flexible and Robust Privacy-Preserving Implicit Authentication},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {18--34},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_2},
  doi          = {10.1007/978-3-319-18467-8\_2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/Domingo-FerrerW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DubovitskayaUVA15,
  author       = {Alevtina Dubovitskaya and
                  Visara Urovi and
                  Matteo Vasirani and
                  Karl Aberer and
                  Michael Ignaz Schumacher},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {585--598},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_39},
  doi          = {10.1007/978-3-319-18467-8\_39},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DubovitskayaUVA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ErdinKGG15,
  author       = {Esra Erdin and
                  Eric Klukovich and
                  Gurhan Gunduz and
                  Mehmet Hadi Gunes},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {{POSN:} {A} Personal Online Social Network},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {51--66},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_4},
  doi          = {10.1007/978-3-319-18467-8\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ErdinKGG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/HuMR15,
  author       = {Jinwei Hu and
                  Heiko Mantel and
                  Sebastian Ruhleder},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Enforcing Usage Constraints on Credentials for Web Applications},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {112--125},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_8},
  doi          = {10.1007/978-3-319-18467-8\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/HuMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/JamrogaT15,
  author       = {Wojciech Jamroga and
                  Masoud Tabatabaei},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Strategic Noninterference},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {67--81},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_5},
  doi          = {10.1007/978-3-319-18467-8\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/JamrogaT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/JhawarKMRT15,
  author       = {Ravi Jhawar and
                  Barbara Kordy and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Rolando Trujillo{-}Rasua},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Attack Trees with Sequential Conjunction},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_23},
  doi          = {10.1007/978-3-319-18467-8\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/JhawarKMRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KarimpourIN15,
  author       = {Jaber Karimpour and
                  Ayaz Isazadeh and
                  Ali A. Noroozi},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Verifying Observational Determinism},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {82--93},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_6},
  doi          = {10.1007/978-3-319-18467-8\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/KarimpourIN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KarlssonGH15,
  author       = {Fredrik Karlsson and
                  G{\"{o}}ran Goldkuhl and
                  Karin Hedstr{\"{o}}m},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Practice-Based Discourse Analysis of InfoSec Policies},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {297--310},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_20},
  doi          = {10.1007/978-3-319-18467-8\_20},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/KarlssonGH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KaurTW015,
  author       = {Jaspreet Kaur and
                  Jernej Tonejc and
                  Steffen Wendzel and
                  Michael Meier},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Securing BACnet's Pitfalls},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {616--629},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_41},
  doi          = {10.1007/978-3-319-18467-8\_41},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KaurTW015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KheirBDGY15,
  author       = {Nizar Kheir and
                  Gregory Blanc and
                  Herv{\'{e}} Debar and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Dingqi Yang},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Automated Classification of C{\&}C Connections Through Malware
                  {URL} Clustering},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {252--266},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_17},
  doi          = {10.1007/978-3-319-18467-8\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KheirBDGY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KnorrAW15,
  author       = {Konstantin Knorr and
                  David Aspinall and
                  Maria Wolters},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {On the Privacy, Security and Safety of Blood Pressure and Diabetes
                  Apps},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {571--584},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_38},
  doi          = {10.1007/978-3-319-18467-8\_38},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KnorrAW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KumarL15,
  author       = {Amrit Kumar and
                  C{\'{e}}dric Lauradoux},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {A Survey of Alerting Websites: Risks and Solutions},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_9},
  doi          = {10.1007/978-3-319-18467-8\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KumarL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KuntzeR15,
  author       = {Nicolai Kuntze and
                  Andreas Fuchs and
                  Carsten Rudolph},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {630--644},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_42},
  doi          = {10.1007/978-3-319-18467-8\_42},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KuntzeR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LiBBKT15,
  author       = {Li Li and
                  Alexandre Bartel and
                  Tegawend{\'{e}} F. Bissyand{\'{e}} and
                  Jacques Klein and
                  Yves Le Traon},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {ApkCombiner: Combining Multiple Android Apps to Support Inter-App
                  Analysis},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {513--527},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_34},
  doi          = {10.1007/978-3-319-18467-8\_34},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LiBBKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LineM15,
  author       = {Maria B. Line and
                  Nils Brede Moe},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Understanding Collaborative Challenges in {IT} Security Preparedness
                  Exercises},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {311--324},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_21},
  doi          = {10.1007/978-3-319-18467-8\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LineM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LiuZDLZ15,
  author       = {Xiangyu Liu and
                  Zhe Zhou and
                  Wenrui Diao and
                  Zhou Li and
                  Kehuan Zhang},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {An Empirical Study on Android for Saving Non-shared Data on Public
                  Storage},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {542--556},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_36},
  doi          = {10.1007/978-3-319-18467-8\_36},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LiuZDLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LorenziUVSA15,
  author       = {David Lorenzi and
                  Emre Uzun and
                  Jaideep Vaidya and
                  Shamik Sural and
                  Vijayalakshmi Atluri},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Enhancing the Security of Image CAPTCHAs Through Noise Addition},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {354--368},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_24},
  doi          = {10.1007/978-3-319-18467-8\_24},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LorenziUVSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LovatFMP15,
  author       = {Enrico Lovat and
                  Alexander Fromm and
                  Martin Mohr and
                  Alexander Pretschner},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {{SHRIFT} System-Wide HybRid Information Flow Tracking},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {371--385},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_25},
  doi          = {10.1007/978-3-319-18467-8\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LovatFMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LueksAHV15,
  author       = {Wouter Lueks and
                  Gergely Alp{\'{a}}r and
                  Jaap{-}Henk Hoepman and
                  Pim Vullers},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Fast Revocation of Attribute-Based Credentials for Both Users and
                  Verifiers},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {463--478},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_31},
  doi          = {10.1007/978-3-319-18467-8\_31},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LueksAHV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MaraslisSOTH15,
  author       = {Konstantinos Maraslis and
                  Theodoros Spyridopoulos and
                  George C. Oikonomou and
                  Theo Tryfonas and
                  Mo Haghighi},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness
                  Problems},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {601--615},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_40},
  doi          = {10.1007/978-3-319-18467-8\_40},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/MaraslisSOTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MingXW15,
  author       = {Jiang Ming and
                  Dongpeng Xu and
                  Dinghao Wu},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Memoized Semantics-Based Binary Diffing with Application to Malware
                  Lineage Inference},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {416--430},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_28},
  doi          = {10.1007/978-3-319-18467-8\_28},
  timestamp    = {Tue, 07 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/MingXW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PerezGCCC15,
  author       = {Salvador Mart{\'{\i}}nez Perez and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Jordi Cabot},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Model-Driven Integration and Analysis of Access-control Policies in
                  Multi-layer Information Systems},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {218--233},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_15},
  doi          = {10.1007/978-3-319-18467-8\_15},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PerezGCCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PhamK15,
  author       = {Dang Vinh Pham and
                  Dogan Kesdogan},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Towards Relations Between the Hitting-Set Attack and the Statistical
                  Disclosure Attack},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_3},
  doi          = {10.1007/978-3-319-18467-8\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PhamK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PohlZMH15,
  author       = {Christoph Pohl and
                  Alf Zugenmaier and
                  Michael Meier and
                  Hans{-}Joachim Hof},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {B.Hive: {A} Zero Configuration Forms Honeypot for Productive Web Applications},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {267--280},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_18},
  doi          = {10.1007/978-3-319-18467-8\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PohlZMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ReisZFV15,
  author       = {Sim{\~{a}}o Reis and
                  Andr{\'{e}} Z{\'{u}}quete and
                  Carlos Faneca and
                  Jos{\'{e}} M. N. Vieira},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Authenticated File Broadcast Protocol},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_16},
  doi          = {10.1007/978-3-319-18467-8\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ReisZFV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/RezvaniAVIJ15,
  author       = {Mohsen Rezvani and
                  Mohammad Allahbakhsh and
                  Lorenzo Vigentini and
                  Aleksandar Ignjatovic and
                  Sanjay K. Jha},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {An Iterative Algorithm for Reputation Aggregation in Multi-dimensional
                  and Multinomial Rating Systems},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {189--203},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_13},
  doi          = {10.1007/978-3-319-18467-8\_13},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/RezvaniAVIJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SabtAB15,
  author       = {Mohamed Sabt and
                  Mohammed Achemlal and
                  Abdelmadjid Bouabdallah},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {The Dual-Execution-Environment Approach: Analysis and Comparative
                  Evaluation},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {557--570},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_37},
  doi          = {10.1007/978-3-319-18467-8\_37},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SabtAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Sommestad15,
  author       = {Teodor Sommestad},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Social Groupings and Information Security Obedience Within Organizations},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {325--338},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_22},
  doi          = {10.1007/978-3-319-18467-8\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Sommestad15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/TruongTDE15,
  author       = {Toan{-}Thinh Truong and
                  Minh{-}Triet Tran and
                  Anh Duc Duong and
                  Isao Echizen},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme
                  in Client-Server Environment},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {479--494},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_32},
  doi          = {10.1007/978-3-319-18467-8\_32},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/TruongTDE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VapenCMS15,
  author       = {Anna Vapen and
                  Niklas Carlsson and
                  Anirban Mahanti and
                  Nahid Shahmehri},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Information Sharing and User Privacy in the Third-Party Identity Management
                  Landscape},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {174--188},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_12},
  doi          = {10.1007/978-3-319-18467-8\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/VapenCMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VigarioNFFI15,
  author       = {Francisco Vig{\'{a}}rio and
                  Miguel Neto and
                  Diogo Fonseca and
                  M{\'{a}}rio M. Freire and
                  Pedro R. M. In{\'{a}}cio},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Assessment of the Susceptibility to Data Manipulation of Android Games
                  with In-app Purchases},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {528--541},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_35},
  doi          = {10.1007/978-3-319-18467-8\_35},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/VigarioNFFI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VimercatiFJPS15,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Integrity for Approximate Joins on Untrusted Computational Servers},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {446--459},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_30},
  doi          = {10.1007/978-3-319-18467-8\_30},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/VimercatiFJPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Yamada15,
  author       = {Asahiko Yamada},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {A Generalization of {ISO/IEC} 24761 to Enhance Remote Authentication
                  with Trusted Product at Claimant},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {145--158},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_10},
  doi          = {10.1007/978-3-319-18467-8\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Yamada15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ZhangLCLS15,
  author       = {Zhijiao Zhang and
                  Ya{-}Shuai L{\"{u}} and
                  Yu Chen and
                  Yongqiang Lu and
                  Yuanchun Shi},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Mitigating Code-Reuse Attacks on {CISC} Architectures in a Hardware
                  Approach},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {431--445},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_29},
  doi          = {10.1007/978-3-319-18467-8\_29},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/ZhangLCLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2015,
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8},
  doi          = {10.1007/978-3-319-18467-8},
  isbn         = {978-3-319-18466-1},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics