Full Text Documents

Search


Table of Contents
Information Security Theory and Practice
Sara Foresti, Javier Lopez
Front Matter

Authentication and Key Management


Securing Transactions with the eIDAS Protocols
Frank Morgner, Paul Bastian, Marc Fischlin
3-18
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY
Kim Nguyen, Nouha Oualha, Maryline Laurent
19-34
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms
Vlasta Stavova, Vashek Matyas, Mike Just
35-50

Secure Hardware Systems


An Implementation of a High Assurance Smart Meter Using Protected Module Architectures
Jan Mühlberg, Sara Cleemput, Mustafa Mustafa, Jo Bulck, Bart Preneel, Frank Piessens
53-69
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments
Vassilios Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis
70-84
An HMM-Based Anomaly Detection Approach for SCADA Systems
Kyriakos Stefanidis, Artemios Voyiatzis
85-99

Attacks to Software and Network Systems


Attacking and Defending Dynamic Analysis System-Calls Based IDS
Ishai Rosenberg, Ehud Gudes
103-119
Towards Automatic Risk Analysis and Mitigation of Software Applications
Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy
120-135
Runtime Code Polymorphism as a Protection Against Side Channel Attacks
Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet
136-152
Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks
Guillaume Barbu, Alberto Battistello
153-168

Access Control and Data Protection


LAMP - Label-Based Access-Control for More Privacy in Online Social Networks
Leila Bahri, Barbara Carminati, Elena Ferrari, William Lucia
171-186
Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data
Ling Chen, Ting Yu, Rada Chirkova
187-203
Fault-Channel Watermarks
Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust
204-219

Short Papers


The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs — An Empirical Experiment
Ahmad Sabouri
223-235
Delegating Biometric Authentication with the Sumcheck Protocol
Hervé Chabanne, Julien Keuffer, Roch Lescuyer
236-244
Password Generators: Old Ideas and New
Fatma Al Maqbali, Chris Mitchell
245-253
Provable Network Activity for Protecting Users Against False Accusation
Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos Keromytis, Evangelos Markatos
254-261
Combining Third Party Components Securely in Automotive Systems
Madeline Cheah, Siraj Shaikh, Jeremy Bryans, Hoang Nguyen
262-269

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/