index - Information Security Theory and Practice: Securing the Internet of Things
   


Full Text Documents

Chargement de la page

Search


Table of Contents
Information Security Theory and Practice: Securing the Internet of Things
David Naccache, Damien Sauveron (Eds.)
Front Matter

Invited Paper


Sweet Dreams and Nightmares: Security in the Internet of Things
Timo Kasper, David Oswald, Christof Paar
1-9

Cryptography and Cryptanalysis


A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations
Ju-Sung Kang, Nayoung Kim, Wangho Ju, Ok-Yeon Yi
10-23
Towards More Practical Time-Driven Cache Attacks
Raphael Spreitzer, Benoît Gérard
24-39
Orthogonal Direct Sum Masking
Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi
40-56

Smart Cards and Embedded Devices


New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards
Guillaume Barbu, Christophe Giraud
57-75
A Pre-processing Composition for Secret Key Recovery on Android Smartphone
Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Shinsaku Kiyomoto, Yutaka Miyake
76-91

Privacy


Usable Privacy for Mobile Sensing Applications
Delphine Christin, Franziska Engelmann, Matthias Hollick
92-107
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection
Dan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka, Shin’ichiro Matsuo, Jan Willemson
108-123
End-to-End Secure and Privacy Preserving Mobile Chat Application
Raja Akram, Ryan Ko
124-139

Short Papers


S-box, SET, Match: A Toolbox for S-box Analysis
Stjepan Picek, Lejla Batina, Domagoj Jakobović, Barış Ege, Marin Golub
140-149
Policy-Based Access Control for Body Sensor Networks
Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, Konstantinos Kagiambakis, Ioannis Papaefstathiou
150-159
Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider
André Zúquete, Hélder Gomes, Cláudio Teixeira
160-169
CAN Bus Risk Analysis Revisit
Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes
170-179
AU2EU: Privacy-Preserving Matching of DNA Sequences
Tanya Ignatenko, Milan Petković
180-189
Early DDoS Detection Based on Data Mining Techniques
Konstantinos Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj
190-199

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/