Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sec/sec2015.bht:"
@inproceedings{DBLP:conf/sec/AbadiTD15, author = {Aydin Abadi and Sotirios Terzis and Changyu Dong}, editor = {Hannes Federrath and Dieter Gollmann}, title = {{O-PSI:} Delegated Private Set Intersection on Outsourced Datasets}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {3--17}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_1}, doi = {10.1007/978-3-319-18467-8\_1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/AbadiTD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/AlmeshekahAS15, author = {Mohammed H. Almeshekah and Mikhail J. Atallah and Eugene H. Spafford}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Enhancing Passwords Security Using Deceptive Covert Communication}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {159--173}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_11}, doi = {10.1007/978-3-319-18467-8\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/AlmeshekahAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BansalPM15, author = {Chetan Bansal and S{\"{o}}ren Preibusch and Natasa Milic{-}Frayling}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, {OS} and Network Sniffing}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {97--111}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_7}, doi = {10.1007/978-3-319-18467-8\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BansalPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BellaGLR15, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Hannes Federrath and Dieter Gollmann}, title = {A Secure Exam Protocol Without Trusted Parties}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {495--509}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_33}, doi = {10.1007/978-3-319-18467-8\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BellaGLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/CarbinoTL15, author = {Timothy J. Carbino and Michael A. Temple and Juan Lopez Jr.}, editor = {Hannes Federrath and Dieter Gollmann}, title = {A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {204--217}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_14}, doi = {10.1007/978-3-319-18467-8\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/CarbinoTL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ConnollyLT15, author = {Lena Yuryna Connolly and Michael Lang and J. Doug Tygar}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Investigation of Employee Security Behaviour: {A} Grounded Theory Approach}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {283--296}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_19}, doi = {10.1007/978-3-319-18467-8\_19}, timestamp = {Fri, 15 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/ConnollyLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DengZL15, author = {Liang Deng and Qingkai Zeng and Yao Liu}, editor = {Hannes Federrath and Dieter Gollmann}, title = {ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {386--400}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_26}, doi = {10.1007/978-3-319-18467-8\_26}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/DengZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DoBH15, author = {Quoc Huy Do and Richard Bubel and Reiner H{\"{a}}hnle}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Exploit Generation for Information Flow Leaks in Object-Oriented Programs}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {401--415}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_27}, doi = {10.1007/978-3-319-18467-8\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DoBH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Domingo-FerrerW15, author = {Josep Domingo{-}Ferrer and Qianhong Wu and Alberto Blanco{-}Justicia}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Flexible and Robust Privacy-Preserving Implicit Authentication}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {18--34}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_2}, doi = {10.1007/978-3-319-18467-8\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/Domingo-FerrerW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DubovitskayaUVA15, author = {Alevtina Dubovitskaya and Visara Urovi and Matteo Vasirani and Karl Aberer and Michael Ignaz Schumacher}, editor = {Hannes Federrath and Dieter Gollmann}, title = {A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {585--598}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_39}, doi = {10.1007/978-3-319-18467-8\_39}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DubovitskayaUVA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ErdinKGG15, author = {Esra Erdin and Eric Klukovich and Gurhan Gunduz and Mehmet Hadi Gunes}, editor = {Hannes Federrath and Dieter Gollmann}, title = {{POSN:} {A} Personal Online Social Network}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {51--66}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_4}, doi = {10.1007/978-3-319-18467-8\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ErdinKGG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/HuMR15, author = {Jinwei Hu and Heiko Mantel and Sebastian Ruhleder}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Enforcing Usage Constraints on Credentials for Web Applications}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {112--125}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_8}, doi = {10.1007/978-3-319-18467-8\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/HuMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/JamrogaT15, author = {Wojciech Jamroga and Masoud Tabatabaei}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Strategic Noninterference}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {67--81}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_5}, doi = {10.1007/978-3-319-18467-8\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/JamrogaT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/JhawarKMRT15, author = {Ravi Jhawar and Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Rolando Trujillo{-}Rasua}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Attack Trees with Sequential Conjunction}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {339--353}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_23}, doi = {10.1007/978-3-319-18467-8\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/JhawarKMRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KarimpourIN15, author = {Jaber Karimpour and Ayaz Isazadeh and Ali A. Noroozi}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Verifying Observational Determinism}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {82--93}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_6}, doi = {10.1007/978-3-319-18467-8\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/KarimpourIN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KarlssonGH15, author = {Fredrik Karlsson and G{\"{o}}ran Goldkuhl and Karin Hedstr{\"{o}}m}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Practice-Based Discourse Analysis of InfoSec Policies}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {297--310}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_20}, doi = {10.1007/978-3-319-18467-8\_20}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/KarlssonGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KaurTW015, author = {Jaspreet Kaur and Jernej Tonejc and Steffen Wendzel and Michael Meier}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Securing BACnet's Pitfalls}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {616--629}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_41}, doi = {10.1007/978-3-319-18467-8\_41}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/KaurTW015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KheirBDGY15, author = {Nizar Kheir and Gregory Blanc and Herv{\'{e}} Debar and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Dingqi Yang}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Automated Classification of C{\&}C Connections Through Malware {URL} Clustering}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {252--266}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_17}, doi = {10.1007/978-3-319-18467-8\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/KheirBDGY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KnorrAW15, author = {Konstantin Knorr and David Aspinall and Maria Wolters}, editor = {Hannes Federrath and Dieter Gollmann}, title = {On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {571--584}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_38}, doi = {10.1007/978-3-319-18467-8\_38}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/KnorrAW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KumarL15, author = {Amrit Kumar and C{\'{e}}dric Lauradoux}, editor = {Hannes Federrath and Dieter Gollmann}, title = {A Survey of Alerting Websites: Risks and Solutions}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {126--141}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_9}, doi = {10.1007/978-3-319-18467-8\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/KumarL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KuntzeR15, author = {Nicolai Kuntze and Andreas Fuchs and Carsten Rudolph}, editor = {Hannes Federrath and Dieter Gollmann}, title = {On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {630--644}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_42}, doi = {10.1007/978-3-319-18467-8\_42}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/KuntzeR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LiBBKT15, author = {Li Li and Alexandre Bartel and Tegawend{\'{e}} F. Bissyand{\'{e}} and Jacques Klein and Yves Le Traon}, editor = {Hannes Federrath and Dieter Gollmann}, title = {ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {513--527}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_34}, doi = {10.1007/978-3-319-18467-8\_34}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LiBBKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LineM15, author = {Maria B. Line and Nils Brede Moe}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Understanding Collaborative Challenges in {IT} Security Preparedness Exercises}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {311--324}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_21}, doi = {10.1007/978-3-319-18467-8\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LineM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LiuZDLZ15, author = {Xiangyu Liu and Zhe Zhou and Wenrui Diao and Zhou Li and Kehuan Zhang}, editor = {Hannes Federrath and Dieter Gollmann}, title = {An Empirical Study on Android for Saving Non-shared Data on Public Storage}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {542--556}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_36}, doi = {10.1007/978-3-319-18467-8\_36}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LiuZDLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LorenziUVSA15, author = {David Lorenzi and Emre Uzun and Jaideep Vaidya and Shamik Sural and Vijayalakshmi Atluri}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Enhancing the Security of Image CAPTCHAs Through Noise Addition}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {354--368}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_24}, doi = {10.1007/978-3-319-18467-8\_24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LorenziUVSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LovatFMP15, author = {Enrico Lovat and Alexander Fromm and Martin Mohr and Alexander Pretschner}, editor = {Hannes Federrath and Dieter Gollmann}, title = {{SHRIFT} System-Wide HybRid Information Flow Tracking}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {371--385}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_25}, doi = {10.1007/978-3-319-18467-8\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LovatFMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LueksAHV15, author = {Wouter Lueks and Gergely Alp{\'{a}}r and Jaap{-}Henk Hoepman and Pim Vullers}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {463--478}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_31}, doi = {10.1007/978-3-319-18467-8\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LueksAHV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/MaraslisSOTH15, author = {Konstantinos Maraslis and Theodoros Spyridopoulos and George C. Oikonomou and Theo Tryfonas and Mo Haghighi}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {601--615}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_40}, doi = {10.1007/978-3-319-18467-8\_40}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/MaraslisSOTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/MingXW15, author = {Jiang Ming and Dongpeng Xu and Dinghao Wu}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {416--430}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_28}, doi = {10.1007/978-3-319-18467-8\_28}, timestamp = {Tue, 07 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/MingXW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PerezGCCC15, author = {Salvador Mart{\'{\i}}nez Perez and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jordi Cabot}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {218--233}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_15}, doi = {10.1007/978-3-319-18467-8\_15}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PerezGCCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PhamK15, author = {Dang Vinh Pham and Dogan Kesdogan}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {35--50}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_3}, doi = {10.1007/978-3-319-18467-8\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PhamK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PohlZMH15, author = {Christoph Pohl and Alf Zugenmaier and Michael Meier and Hans{-}Joachim Hof}, editor = {Hannes Federrath and Dieter Gollmann}, title = {B.Hive: {A} Zero Configuration Forms Honeypot for Productive Web Applications}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {267--280}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_18}, doi = {10.1007/978-3-319-18467-8\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PohlZMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ReisZFV15, author = {Sim{\~{a}}o Reis and Andr{\'{e}} Z{\'{u}}quete and Carlos Faneca and Jos{\'{e}} M. N. Vieira}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Authenticated File Broadcast Protocol}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {237--251}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_16}, doi = {10.1007/978-3-319-18467-8\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ReisZFV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/RezvaniAVIJ15, author = {Mohsen Rezvani and Mohammad Allahbakhsh and Lorenzo Vigentini and Aleksandar Ignjatovic and Sanjay K. Jha}, editor = {Hannes Federrath and Dieter Gollmann}, title = {An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {189--203}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_13}, doi = {10.1007/978-3-319-18467-8\_13}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/RezvaniAVIJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SabtAB15, author = {Mohamed Sabt and Mohammed Achemlal and Abdelmadjid Bouabdallah}, editor = {Hannes Federrath and Dieter Gollmann}, title = {The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {557--570}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_37}, doi = {10.1007/978-3-319-18467-8\_37}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SabtAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Sommestad15, author = {Teodor Sommestad}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Social Groupings and Information Security Obedience Within Organizations}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {325--338}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_22}, doi = {10.1007/978-3-319-18467-8\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/Sommestad15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/TruongTDE15, author = {Toan{-}Thinh Truong and Minh{-}Triet Tran and Anh Duc Duong and Isao Echizen}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {479--494}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_32}, doi = {10.1007/978-3-319-18467-8\_32}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/TruongTDE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/VapenCMS15, author = {Anna Vapen and Niklas Carlsson and Anirban Mahanti and Nahid Shahmehri}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Information Sharing and User Privacy in the Third-Party Identity Management Landscape}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {174--188}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_12}, doi = {10.1007/978-3-319-18467-8\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/VapenCMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/VigarioNFFI15, author = {Francisco Vig{\'{a}}rio and Miguel Neto and Diogo Fonseca and M{\'{a}}rio M. Freire and Pedro R. M. In{\'{a}}cio}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {528--541}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_35}, doi = {10.1007/978-3-319-18467-8\_35}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/VigarioNFFI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/VimercatiFJPS15, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Integrity for Approximate Joins on Untrusted Computational Servers}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {446--459}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_30}, doi = {10.1007/978-3-319-18467-8\_30}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/VimercatiFJPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Yamada15, author = {Asahiko Yamada}, editor = {Hannes Federrath and Dieter Gollmann}, title = {A Generalization of {ISO/IEC} 24761 to Enhance Remote Authentication with Trusted Product at Claimant}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {145--158}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_10}, doi = {10.1007/978-3-319-18467-8\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/Yamada15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ZhangLCLS15, author = {Zhijiao Zhang and Ya{-}Shuai L{\"{u}} and Yu Chen and Yongqiang Lu and Yuanchun Shi}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Mitigating Code-Reuse Attacks on {CISC} Architectures in a Hardware Approach}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {431--445}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_29}, doi = {10.1007/978-3-319-18467-8\_29}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/ZhangLCLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2015, editor = {Hannes Federrath and Dieter Gollmann}, title = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8}, doi = {10.1007/978-3-319-18467-8}, isbn = {978-3-319-18466-1}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.