index - Information Security Theory and Practice Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Information Security Theory and Practice
Raja Naeem Akram, Sushil Jajodia (Eds.)
Front Matter

Security and Privacy Services


On Secrecy Amplification Protocols
Radim Ošťádal, Petr Švenda, Vashek Matyáš
3-19
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
Tassos Dimitriou, Ioannis Krontiris
20-35
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols
Alejandro Calleja, Pedro Peris-Lopez, Juan Tapiador
36-51
Private Minutia-Based Fingerprint Matching
Neyire Sarier
52-67

Secure Resource Sharing and Access Control


Secure Resource Sharing for Embedded Protected Module Architectures
Jo Bulck, Job Noorman, Jan Mühlberg, Frank Piessens
71-87
Secure Obfuscation of Authoring Style
Hoi Le, Reihaneh Safavi-Naini, Asadullah Galib
88-103
DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption
Miguel Morales-Sandoval, Arturo Diaz-Perez
104-119
WSACd - A Usable Access Control Framework for Smart Home Devices
Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas, Ioannis Papaefstathiou
120-133

Secure Devices and Execution Environment


Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques
Masoud Narouei, Hassan Takabi
137-152
Practical and Privacy-Preserving TEE Migration
Ghada Arfaoui, Jean-François Lalande, Saïd Gharout, Jacques Traoré
153-168
Randomizing the Montgomery Powering Ladder
Duc-Phong Le, Chik Tan, Michael Tunstall
169-184

Challenges of Security and Reliability


How Current Android Malware Seeks to Evade Automated Code Analysis
Siegfried Rasthofer, Irfan Asrar, Stephan Huber, Eric Bodden
187-202
On Linkability and Malleability in Self-blindable Credentials
Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers
203-218
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality
Qiao Hu, Lavinia Dinca, Gerhard Hancke
219-234

Short Papers


Normalizing Security Events with a Hierarchical Knowledge Base
David Jaeger, Amir Azodi, Feng Cheng, Christoph Meinel
237-248
Attack Tree Generation by Policy Invalidation
Marieta Ivanova, Christian Probst, René Hansen, Florian Kammüller
249-259
Lightweight Password Hashing Scheme for Embedded Systems
George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas, Ioannis Askoxylakis
260-270
Secure and Authenticated Access to LLN Resources Through Policy Constraints
Konstantinos Rantos, Konstantinos Fysarakis, Othonas Soultatos, Ioannis Askoxylakis
271-280

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/