index - Information Security Theory and Practice
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga(Eds.)
Front Matter

Keynotes


Recent Developments in Low-Level Software Security
Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem Groef, Frank Piessens
1-16
Towards a C2I Platform for Combating the Cyber-Threat
Paul Kearney
17-19
Veracity, Plausibility, and Reputation
Dieter Gollmann
20-28

Protocols


Another Fallen Hash-Based RFID Authentication Protocol
Julio Hernandez-Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
29-37

Protocols (Short Papers)


HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network
G. Kirubavathi Venkatesh, R. Anitha Nadarajan
38-48
How to Break EAP-MD5
Fanbao Liu, Tao Xie
49-57

Privacy


Privacy Preserving Social Network Publication on Bipartite Graphs
Jian Zhou, Jiwu Jing, Ji Xiang, Lei Wang
58-70
Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications
Andreas Reinhardt, Matthias Hollick, Michaela Kauer, Delphine Christin, Pablo Sánchez López
71-86

Privacy (Short Paper)


Privacy Preservation of User History Graph
Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake
87-96

Policy and Access Control


HiPoLDS: A Security Policy Language for Distributed Systems
Matteo Dell’amico, Gabriel Serme, Muhammad Idrees, Anderson Santana de Olivera, Yves Roudier
97-112
ROAC: A Role-Oriented Access Control Model
Nezar Nassr, Eric Steegmans
113-127

Multi-Party Computation


Optimal Parameters for Efficient Two-Party Computation Protocols
Chaya Ganesh, C. Pandu Rangan
128-143
Assisting Server for Secure Multi-Party Computation
Jens-Matthias Bohli, Wenting Li, Jan Seedorf
144-159

Cryptography (Short Papers)


An Efficient Lattice-Based Secret Sharing Construction
Rachid Bansarkhani, Mohammed Meziani
160-168
On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems
Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger
169-178
Impossible Differential Cryptanalysis of Reduced-Round LBlock
Ferhat Karakoç, Hüseyin Demirci, A. Harmancı
179-188

Mobile Security


Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
Johann Großschädl, Dan Page, Stefan Tillich
189-207
Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android
Daniel Schreckling, Joachim Posegga, Johannes Köstler, Matthias Schaff
208-223

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/