Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/wistp/wistp2015.bht:"
@inproceedings{DBLP:conf/wistp/ArfaouiGLT15, author = {Ghada Arfaoui and Sa{\"{\i}}d Gharout and Jean{-}Fran{\c{c}}ois Lalande and Jacques Traor{\'{e}}}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Practical and Privacy-Preserving {TEE} Migration}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {153--168}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_10}, doi = {10.1007/978-3-319-24018-3\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ArfaouiGLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BulckNMP15, author = {Jo Van Bulck and Job Noorman and Jan Tobias M{\"{u}}hlberg and Frank Piessens}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Secure Resource Sharing for Embedded Protected Module Architectures}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {71--87}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_5}, doi = {10.1007/978-3-319-24018-3\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BulckNMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CallejaPT15, author = {Alejandro Calleja and Pedro Peris{-}Lopez and Juan E. Tapiador}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {36--51}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_3}, doi = {10.1007/978-3-319-24018-3\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/CallejaPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DimitriouK15, author = {Tassos Dimitriou and Ioannis Krontiris}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {20--35}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_2}, doi = {10.1007/978-3-319-24018-3\_2}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/DimitriouK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/FysarakisKRMP15, author = {Konstantinos Fysarakis and Charalampos Konstantourakis and Konstantinos Rantos and Charalampos Manifavas and Ioannis Papaefstathiou}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {WSACd - {A} Usable Access Control Framework for Smart Home Devices}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {120--133}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_8}, doi = {10.1007/978-3-319-24018-3\_8}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/FysarakisKRMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HatzivasilisPMA15, author = {George Hatzivasilis and Ioannis Papaefstathiou and Charalampos Manifavas and Ioannis G. Askoxylakis}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Lightweight Password Hashing Scheme for Embedded Systems}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {260--270}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_17}, doi = {10.1007/978-3-319-24018-3\_17}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/HatzivasilisPMA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HoepmanLR15, author = {Jaap{-}Henk Hoepman and Wouter Lueks and Sietse Ringers}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {On Linkability and Malleability in Self-blindable Credentials}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {203--218}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_13}, doi = {10.1007/978-3-319-24018-3\_13}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/HoepmanLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HuDH15, author = {Qiao Hu and Lavinia Mihaela Dinca and Gerhard P. Hancke}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Device Synchronisation: {A} Practical Limitation on Reader Assisted Jamming Methods for {RFID} Confidentiality}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {219--234}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_14}, doi = {10.1007/978-3-319-24018-3\_14}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/HuDH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/IvanovaPHK15, author = {Marieta Georgieva Ivanova and Christian W. Probst and Ren{\'{e}} Rydhof Hansen and Florian Kamm{\"{u}}ller}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Attack Tree Generation by Policy Invalidation}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {249--259}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_16}, doi = {10.1007/978-3-319-24018-3\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/IvanovaPHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/JaegerA0M15, author = {David Jaeger and Amir Azodi and Feng Cheng and Christoph Meinel}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Normalizing Security Events with a Hierarchical Knowledge Base}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {237--248}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_15}, doi = {10.1007/978-3-319-24018-3\_15}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/JaegerA0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LeTT15, author = {Duc{-}Phong Le and Chik How Tan and Michael Tunstall}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Randomizing the Montgomery Powering Ladder}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {169--184}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_11}, doi = {10.1007/978-3-319-24018-3\_11}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/LeTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Morales-Sandoval15, author = {Miguel Morales{-}Sandoval and Arturo Diaz{-}Perez}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {{DET-ABE:} {A} Java {API} for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {104--119}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_7}, doi = {10.1007/978-3-319-24018-3\_7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Morales-Sandoval15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NaroueiT15, author = {Masoud Narouei and Hassan Takabi}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {137--152}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_9}, doi = {10.1007/978-3-319-24018-3\_9}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/NaroueiT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/OstadalSM15, author = {Radim Ost{\'{a}}dal and Petr Svenda and Vashek Maty{\'{a}}s}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {On Secrecy Amplification Protocols}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {3--19}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_1}, doi = {10.1007/978-3-319-24018-3\_1}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/OstadalSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RantosFSA15, author = {Konstantinos Rantos and Konstantinos Fysarakis and Othonas Sultatos and Ioannis G. Askoxylakis}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Secure and Authenticated Access to {LLN} Resources Through Policy Constraints}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {271--280}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_18}, doi = {10.1007/978-3-319-24018-3\_18}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/RantosFSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RasthoferAHB15, author = {Siegfried Rasthofer and Irfan Asrar and Stephan Huber and Eric Bodden}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {How Current Android Malware Seeks to Evade Automated Code Analysis}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {187--202}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_12}, doi = {10.1007/978-3-319-24018-3\_12}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/RasthoferAHB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Sarier15, author = {Neyire Deniz Sarier}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Private Minutia-Based Fingerprint Matching}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {52--67}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_4}, doi = {10.1007/978-3-319-24018-3\_4}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/Sarier15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ThiSG15, author = {Hoi Le Thi and Reihaneh Safavi{-}Naini and Asadullah Al Galib}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Secure Obfuscation of Authoring Style}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {88--103}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_6}, doi = {10.1007/978-3-319-24018-3\_6}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/ThiSG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2015, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3}, doi = {10.1007/978-3-319-24018-3}, isbn = {978-3-319-24017-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.