Search dblp for Publications

export results for "toc:db/conf/wistp/wistp2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/wistp/ArfaouiGLT15,
  author       = {Ghada Arfaoui and
                  Sa{\"{\i}}d Gharout and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Jacques Traor{\'{e}}},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Practical and Privacy-Preserving {TEE} Migration},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {153--168},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_10},
  doi          = {10.1007/978-3-319-24018-3\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ArfaouiGLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BulckNMP15,
  author       = {Jo Van Bulck and
                  Job Noorman and
                  Jan Tobias M{\"{u}}hlberg and
                  Frank Piessens},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Secure Resource Sharing for Embedded Protected Module Architectures},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {71--87},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_5},
  doi          = {10.1007/978-3-319-24018-3\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BulckNMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CallejaPT15,
  author       = {Alejandro Calleja and
                  Pedro Peris{-}Lopez and
                  Juan E. Tapiador},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Electrical Heart Signals can be Monitored from the Moon: Security
                  Implications for IPI-Based Protocols},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {36--51},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_3},
  doi          = {10.1007/978-3-319-24018-3\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/CallejaPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DimitriouK15,
  author       = {Tassos Dimitriou and
                  Ioannis Krontiris},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd
                  Sensing},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {20--35},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_2},
  doi          = {10.1007/978-3-319-24018-3\_2},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/DimitriouK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/FysarakisKRMP15,
  author       = {Konstantinos Fysarakis and
                  Charalampos Konstantourakis and
                  Konstantinos Rantos and
                  Charalampos Manifavas and
                  Ioannis Papaefstathiou},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {WSACd - {A} Usable Access Control Framework for Smart Home Devices},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {120--133},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_8},
  doi          = {10.1007/978-3-319-24018-3\_8},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/FysarakisKRMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HatzivasilisPMA15,
  author       = {George Hatzivasilis and
                  Ioannis Papaefstathiou and
                  Charalampos Manifavas and
                  Ioannis G. Askoxylakis},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Lightweight Password Hashing Scheme for Embedded Systems},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {260--270},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_17},
  doi          = {10.1007/978-3-319-24018-3\_17},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/HatzivasilisPMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HoepmanLR15,
  author       = {Jaap{-}Henk Hoepman and
                  Wouter Lueks and
                  Sietse Ringers},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {On Linkability and Malleability in Self-blindable Credentials},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {203--218},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_13},
  doi          = {10.1007/978-3-319-24018-3\_13},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/HoepmanLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HuDH15,
  author       = {Qiao Hu and
                  Lavinia Mihaela Dinca and
                  Gerhard P. Hancke},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Device Synchronisation: {A} Practical Limitation on Reader Assisted
                  Jamming Methods for {RFID} Confidentiality},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {219--234},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_14},
  doi          = {10.1007/978-3-319-24018-3\_14},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/HuDH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/IvanovaPHK15,
  author       = {Marieta Georgieva Ivanova and
                  Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen and
                  Florian Kamm{\"{u}}ller},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Attack Tree Generation by Policy Invalidation},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_16},
  doi          = {10.1007/978-3-319-24018-3\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/IvanovaPHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/JaegerA0M15,
  author       = {David Jaeger and
                  Amir Azodi and
                  Feng Cheng and
                  Christoph Meinel},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Normalizing Security Events with a Hierarchical Knowledge Base},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {237--248},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_15},
  doi          = {10.1007/978-3-319-24018-3\_15},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/JaegerA0M15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LeTT15,
  author       = {Duc{-}Phong Le and
                  Chik How Tan and
                  Michael Tunstall},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Randomizing the Montgomery Powering Ladder},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_11},
  doi          = {10.1007/978-3-319-24018-3\_11},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/LeTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Morales-Sandoval15,
  author       = {Miguel Morales{-}Sandoval and
                  Arturo Diaz{-}Perez},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {{DET-ABE:} {A} Java {API} for Data Confidentiality and Fine-Grained
                  Access Control from Attribute Based Encryption},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_7},
  doi          = {10.1007/978-3-319-24018-3\_7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Morales-Sandoval15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NaroueiT15,
  author       = {Masoud Narouei and
                  Hassan Takabi},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Automatic Top-Down Role Engineering Framework Using Natural Language
                  Processing Techniques},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {137--152},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_9},
  doi          = {10.1007/978-3-319-24018-3\_9},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/NaroueiT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/OstadalSM15,
  author       = {Radim Ost{\'{a}}dal and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {On Secrecy Amplification Protocols},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_1},
  doi          = {10.1007/978-3-319-24018-3\_1},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/OstadalSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RantosFSA15,
  author       = {Konstantinos Rantos and
                  Konstantinos Fysarakis and
                  Othonas Sultatos and
                  Ioannis G. Askoxylakis},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Secure and Authenticated Access to {LLN} Resources Through Policy
                  Constraints},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {271--280},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_18},
  doi          = {10.1007/978-3-319-24018-3\_18},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/RantosFSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RasthoferAHB15,
  author       = {Siegfried Rasthofer and
                  Irfan Asrar and
                  Stephan Huber and
                  Eric Bodden},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {How Current Android Malware Seeks to Evade Automated Code Analysis},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_12},
  doi          = {10.1007/978-3-319-24018-3\_12},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/RasthoferAHB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Sarier15,
  author       = {Neyire Deniz Sarier},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Private Minutia-Based Fingerprint Matching},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {52--67},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_4},
  doi          = {10.1007/978-3-319-24018-3\_4},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/Sarier15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ThiSG15,
  author       = {Hoi Le Thi and
                  Reihaneh Safavi{-}Naini and
                  Asadullah Al Galib},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Secure Obfuscation of Authoring Style},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_6},
  doi          = {10.1007/978-3-319-24018-3\_6},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/ThiSG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2015,
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3},
  doi          = {10.1007/978-3-319-24018-3},
  isbn         = {978-3-319-24017-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics