default search action
6. WISTP 2012: Egham, UK
- Ioannis G. Askoxylakis, Henrich Christopher Pöhls, Joachim Posegga:
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings. Lecture Notes in Computer Science 7322, Springer 2012, ISBN 978-3-642-30954-0
Keynotes
- Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, Frank Piessens:
Recent Developments in Low-Level Software Security. 1-16 - Paul Kearney:
Towards a C2I Platform for Combating the Cyber-Threat. 17-19 - Dieter Gollmann:
Veracity, Plausibility, and Reputation. 20-28
Protocols
- Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Another Fallen Hash-Based RFID Authentication Protocol. 29-37
Protocols (Short Papers)
- G. Kirubavathi Venkatesh, R. Anitha Nadarajan:
HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network. 38-48 - Fanbao Liu, Tao Xie:
How to Break EAP-MD5. 49-57
Privacy
- Jian Zhou, Jiwu Jing, Ji Xiang, Lei Wang:
Privacy Preserving Social Network Publication on Bipartite Graphs. 58-70 - Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, Michaela Kauer:
Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications. 71-86
Privacy (Short Paper)
- Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Privacy Preservation of User History Graph. 87-96
Policy and Access Control
- Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira, Yves Roudier:
HiPoLDS: A Security Policy Language for Distributed Systems. 97-112 - Nezar Nassr, Eric Steegmans:
ROAC: A Role-Oriented Access Control Model. 113-127
Multi-Party Computation
- Chaya Ganesh, C. Pandu Rangan:
Optimal Parameters for Efficient Two-Party Computation Protocols. 128-143 - Jens-Matthias Bohli, Wenting Li, Jan Seedorf:
Assisting Server for Secure Multi-Party Computation. 144-159
Cryptography (Short Papers)
- Rachid El Bansarkhani, Mohammed Meziani:
An Efficient Lattice-Based Secret Sharing Construction. 160-168 - Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger:
On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems. 169-178 - Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci:
Impossible Differential Cryptanalysis of Reduced-Round LBlock. 179-188
Mobile Security
- Johann Großschädl, Dan Page, Stefan Tillich:
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices. 189-207 - Daniel Schreckling, Joachim Posegga, Johannes Köstler, Matthias Schaff:
Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android. 208-223
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.