Search dblp for Publications

export results for "toc:db/conf/sec/sec2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sec/AbdullahNTM14,
  author       = {Nor Athiyah Abdullah and
                  Dai Nishioka and
                  Yuko Tanaka and
                  Yuko Murayama},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {A Preliminary Study on User's Decision Making towards Retweet Messages},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {359--365},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_30},
  doi          = {10.1007/978-3-642-55415-5\_30},
  timestamp    = {Wed, 25 Sep 2019 18:08:09 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/AbdullahNTM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/AtighehchiBM14,
  author       = {Kevin Atighehchi and
                  Alexis Bonnecaze and
                  Traian Muntean},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Authenticated Dictionary Based on Frequency},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {293--306},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_24},
  doi          = {10.1007/978-3-642-55415-5\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/AtighehchiBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BahtiyarGA14,
  author       = {Serif Bahtiyar and
                  G{\"{u}}rkan G{\"{u}}r and
                  Levent Altay},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Security Assessment of Payment Systems under {PCI} {DSS} Incompatibilities},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {395--402},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_33},
  doi          = {10.1007/978-3-642-55415-5\_33},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/BahtiyarGA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BalRH14,
  author       = {G{\"{o}}khan Bal and
                  Kai Rannenberg and
                  Jason I. Hong},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Styx: Design and Evaluation of a New Privacy Risk Communication Method
                  for Smartphones},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {113--126},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_10},
  doi          = {10.1007/978-3-642-55415-5\_10},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BalRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BauereissH14,
  author       = {Thomas Bauereiss and
                  Dieter Hutter},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Compatibility of Safety Properties and Possibilistic Information Flow
                  Security in {MAKS}},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {250--263},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_21},
  doi          = {10.1007/978-3-642-55415-5\_21},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BauereissH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BierP14,
  author       = {Christoph Bier and
                  Jonas Prior},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Detection and Labeling of Personal Identifiable Information in E-mails},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {351--358},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_29},
  doi          = {10.1007/978-3-642-55415-5\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BierP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Blanco-JusticiaDF014,
  author       = {Alberto Blanco{-}Justicia and
                  Josep Domingo{-}Ferrer and
                  Oriol Farr{\`{a}}s and
                  David S{\'{a}}nchez},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Distance Computation between Two Private Preference Functions},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {460--470},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_39},
  doi          = {10.1007/978-3-642-55415-5\_39},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/Blanco-JusticiaDF014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BourgeatBCCCFHMNV14,
  author       = {Thomas Bourgeat and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Robin Champenois and
                  J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and
                  Houda Ferradi and
                  Marc Heinrich and
                  Paul Melotti and
                  David Naccache and
                  Antoine Voizard},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {New Algorithmic Approaches to Point Constellation Recognition},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {80--90},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_7},
  doi          = {10.1007/978-3-642-55415-5\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BourgeatBCCCFHMNV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BraunGPP14,
  author       = {Bastian Braun and
                  Caspar Gries and
                  Benedikt Petschkuhn and
                  Joachim Posegga},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {264--277},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_22},
  doi          = {10.1007/978-3-642-55415-5\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BraunGPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BraunKPJ14,
  author       = {Bastian Braun and
                  Johannes K{\"{o}}stler and
                  Joachim Posegga and
                  Martin Johns},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {A Trusted {UI} for the Mobile Web},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {127--141},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_11},
  doi          = {10.1007/978-3-642-55415-5\_11},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BraunKPJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CarminatiCMEZ14,
  author       = {Michele Carminati and
                  Roberto Caron and
                  Federico Maggi and
                  Ilenia Epifani and
                  Stefano Zanero},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {BankSealer: An Online Banking Fraud Analysis and Decision Support
                  System},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {380--394},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_32},
  doi          = {10.1007/978-3-642-55415-5\_32},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/CarminatiCMEZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CervantesF14,
  author       = {Gabriela Varona Cervantes and
                  Stefan Fenz},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {How to Assess Confidentiality Requirements of Corporate Assets?},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {234--241},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_19},
  doi          = {10.1007/978-3-642-55415-5\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/CervantesF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ConnollyLT14,
  author       = {Lena Yuryna Connolly and
                  Michael Lang and
                  J. Doug Tygar},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Managing Employee Security Behaviour in Organisations: The Role of
                  Cultural Factors and Individual Values},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {417--430},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_35},
  doi          = {10.1007/978-3-642-55415-5\_35},
  timestamp    = {Fri, 15 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/ConnollyLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DhillonCP14,
  author       = {Gurpreet Dhillon and
                  Romilla Chowdhuri and
                  Cristiane Pedron},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Organizational Transformation and Information Security Culture: {A}
                  Telecom Case Study},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {431--437},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_36},
  doi          = {10.1007/978-3-642-55415-5\_36},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DhillonCP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Diaz-TellezBDT14,
  author       = {Yair Diaz{-}Tellez and
                  Eliane L. Bodanese and
                  Theo Dimitrakos and
                  Michael Turner},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Context-Aware Multifactor Authentication Based on Dynamic Pin},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {330--338},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_27},
  doi          = {10.1007/978-3-642-55415-5\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Diaz-TellezBDT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/FielderPMHS14,
  author       = {Andrew Fielder and
                  Emmanouil A. Panaousis and
                  Pasquale Malacaria and
                  Chris Hankin and
                  Fabrizio Smeraldi},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Game Theory Meets Information Security Management},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_2},
  doi          = {10.1007/978-3-642-55415-5\_2},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/FielderPMHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/GhourabiAB14,
  author       = {Abdallah Ghourabi and
                  Tarek Abbes and
                  Adel Bouhoula},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Behavior Analysis of Web Service Attacks},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {366--379},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_31},
  doi          = {10.1007/978-3-642-55415-5\_31},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/GhourabiAB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/HerrmannMF14,
  author       = {Dominik Herrmann and
                  Max Maa{\ss} and
                  Hannes Federrath},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Evaluating the Security of a {DNS} Query Obfuscation Scheme for Private
                  Web Surfing},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {205--219},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_17},
  doi          = {10.1007/978-3-642-55415-5\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/HerrmannMF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Hoepman14,
  author       = {Jaap{-}Henk Hoepman},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Privacy Design Strategies - (Extended Abstract)},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {446--459},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_38},
  doi          = {10.1007/978-3-642-55415-5\_38},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Hoepman14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/IsmailSS14,
  author       = {Suhaila Ismail and
                  Elena Sitnikova and
                  Jill Slay},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Towards Developing {SCADA} Systems Security Measures for Critical
                  Infrastructures against Cyber-Terrorist Attacks},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {242--249},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_20},
  doi          = {10.1007/978-3-642-55415-5\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/IsmailSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KheirTCD14,
  author       = {Nizar Kheir and
                  Fr{\'{e}}d{\'{e}}ric Tran and
                  Pierre Caron and
                  Nicolas Deschamps},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Mentor: Positive {DNS} Reputation to Skim-Off Benign Domains in Botnet
                  C{\&}C Blacklists},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_1},
  doi          = {10.1007/978-3-642-55415-5\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KheirTCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KolbergerSBD14,
  author       = {Andrea Kolberger and
                  Ingrid Schaum{\"{u}}ller{-}Bichl and
                  Verena Brunner and
                  Martin Deutschmann},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Protection Profile for PUF-Based Devices},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {91--98},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_8},
  doi          = {10.1007/978-3-642-55415-5\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KolbergerSBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MubarokLLL14,
  author       = {Ibnu Mubarok and
                  Kiryong Lee and
                  Sihyung Lee and
                  Heejo Lee},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Lightweight Resource Management for DDoS Traffic Isolation in a Cloud
                  Environment},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {44--51},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_4},
  doi          = {10.1007/978-3-642-55415-5\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/MubarokLLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NasrK14,
  author       = {Khalid Nasr and
                  Anas Abou El Kalam},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {A Novel Metric for the Evaluation of IDSs Effectiveness},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {220--233},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_18},
  doi          = {10.1007/978-3-642-55415-5\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/NasrK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PohnMH14,
  author       = {Daniela P{\"{o}}hn and
                  Stefan Metzger and
                  Wolfgang Hommel},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {G{\'{e}}ant-TrustBroker: Dynamic, Scalable Management of SAML-Based
                  Inter-federation Authentication and Authorization Infrastructures},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {307--320},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_25},
  doi          = {10.1007/978-3-642-55415-5\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PohnMH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PutDMD14,
  author       = {Andreas Put and
                  Italo Dacosta and
                  Milica Milutinovic and
                  Bart De Decker},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {PriMan: Facilitating the Development of Secure and Privacy-Preserving
                  Applications},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {403--416},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_34},
  doi          = {10.1007/978-3-642-55415-5\_34},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PutDMD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/QinPB14,
  author       = {Guojun Qin and
                  Constantinos Patsakis and
                  M{\'{e}}lanie Bouroche},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Playing Hide and Seek with Mobile Dating Applications},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {185--196},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_15},
  doi          = {10.1007/978-3-642-55415-5\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/QinPB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/RajpootJ14,
  author       = {Qasim Mahmood Rajpoot and
                  Christian Damsgaard Jensen},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Security and Privacy in Video Surveillance: Requirements and Challenges},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_14},
  doi          = {10.1007/978-3-642-55415-5\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/RajpootJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/RocchettoOD14,
  author       = {Marco Rocchetto and
                  Mart{\'{\i}}n Ochoa and
                  Mohammad Torabi Dashti},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Model-Based Detection of {CSRF}},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {30--43},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_3},
  doi          = {10.1007/978-3-642-55415-5\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/RocchettoOD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SaevaneeCFB14,
  author       = {Hataichanok Saevanee and
                  Nathan L. Clarke and
                  Steven Furnell and
                  Valerio Biscione},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Text-Based Active Authentication for Mobile Devices},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {99--112},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_9},
  doi          = {10.1007/978-3-642-55415-5\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SaevaneeCFB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SafaSS14,
  author       = {Nashad Ahmed Safa and
                  Reihaneh Safavi{-}Naini and
                  Siamak Fayyaz Shahandashti},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Privacy-Preserving Implicit Authentication},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {471--484},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_40},
  doi          = {10.1007/978-3-642-55415-5\_40},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SafaSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SantosR14,
  author       = {Jos{\'{e}} Fragoso Santos and
                  Tamara Rezk},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {An Information Flow Monitor-Inlining Compiler for Securing a Core
                  of JavaScript},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {278--292},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_23},
  doi          = {10.1007/978-3-642-55415-5\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SantosR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SpyridopoulosTTK14,
  author       = {Theodoros Spyridopoulos and
                  Ioanna{-}Aikaterini Topa and
                  Theo Tryfonas and
                  Maria Karyda},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {A Holistic Approach for Cyber Assurance of Critical Infrastructure
                  with the Viable System Model},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {438--445},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_37},
  doi          = {10.1007/978-3-642-55415-5\_37},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/SpyridopoulosTTK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/StrizhovR14,
  author       = {Mikhail Strizhov and
                  Indrajit Ray},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Multi-keyword Similarity Search over Encrypted Cloud Data},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {52--65},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_5},
  doi          = {10.1007/978-3-642-55415-5\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/StrizhovR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SunZXMX14,
  author       = {Xin Sun and
                  Yibing Zhongyang and
                  Zhi Xin and
                  Bing Mao and
                  Li Xie},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Detecting Code Reuse in Android Applications Using Component-Based
                  Control Flow Graph},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {142--155},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_12},
  doi          = {10.1007/978-3-642-55415-5\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SunZXMX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/TianH14,
  author       = {Miaomiao Tian and
                  Liusheng Huang},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Efficient Identity-Based Signature from Lattices},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {321--329},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_26},
  doi          = {10.1007/978-3-642-55415-5\_26},
  timestamp    = {Fri, 14 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/TianH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/TzermiasPI14,
  author       = {Zacharias Tzermias and
                  Vassilis Prevelakis and
                  Sotiris Ioannidis},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Privacy Risks from Public Data Sources},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {156--168},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_13},
  doi          = {10.1007/978-3-642-55415-5\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/TzermiasPI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VeseliVKRS14,
  author       = {Fatbardh Veseli and
                  Tsvetoslava Vateva{-}Gurova and
                  Ioannis Krontiris and
                  Kai Rannenberg and
                  Neeraj Suri},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Towards a Framework for Benchmarking Privacy-ABC Technologies},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {197--204},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_16},
  doi          = {10.1007/978-3-642-55415-5\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/VeseliVKRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VossaertLDN14,
  author       = {Jan Vossaert and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Trusted Computing to Increase Security and Privacy in eID Authentication},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {485--492},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_41},
  doi          = {10.1007/978-3-642-55415-5\_41},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/VossaertLDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/YangAL14,
  author       = {Mee{-}Loong Yang and
                  Adnan Al{-}Anbuky and
                  William Liu},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Security of the Multiple-Key Blom's Key Agreement Scheme for Sensor
                  Networks},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {66--79},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_6},
  doi          = {10.1007/978-3-642-55415-5\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/YangAL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/YangC14,
  author       = {Min Yang and
                  Kam{-}Pui Chow},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Authorship Attribution for Forensic Investigation with Thousands of
                  Authors},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {339--350},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_28},
  doi          = {10.1007/978-3-642-55415-5\_28},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/YangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2014,
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5},
  doi          = {10.1007/978-3-642-55415-5},
  isbn         = {978-3-642-55414-8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics