ICISSP C

44 papers

YearTitle / Authors
2015A New Science of Security Decision Making.
Patrick D. McDaniel
2015A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks.
Carsten Büttner, Sorin A. Huss
2015A Novel Model of Security Policies and Requirements.
Preetam Mukherjee, Chandan Mazumdar
2015A Policy-based Communications Architecture for Vehicles.
Vassilis Prevelakis, Mohammad Hamad
2015A Posteriori Process Security Control.
Rafael Accorsi
2015A Scratch-based Graphical Policy Editor for XACML.
Henrik Nergaard, Nils Ulltveit-Moe, Terje Gjøsæter
2015A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files.
Davide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto
2015Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss.
Aderonke Busayo Sakpere, Anne V. D. M. Kayem
2015Analyzing Quality Criteria in Role-based Identity and Access Management.
Michael Kunz, Ludwig Fuchs, Michael Netter, Günther Pernul
2015Assessing Information Security Risks of AMI - What Makes it so Difficult?.
Inger Anne Tøndel, Maria B. Line, Gorm Johansen
2015Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment.
Mélanie Favre, Sylvaine Picard, Julien Bringer, Hervé Chabanne
2015Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation.
Andrea Huszti, Zita Kovács
2015Clustering Spam Emails into Campaigns.
Mina Sheikh Alishahi, Mohamed Mejri, Nadia Tawbi
2015Defeating DDoS using Productive Puzzles.
Mehmud Abliz, Taieb F. Znati
2015EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices.
Benoît Vibert, Zhigang Yao, Sylvain Vernois, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger
2015Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security.
Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor
2015Expansions of CHAP - Modificationless on Its Structures of Packet and Data Exchange.
Masaki Inamura
2015Filtering Unfair Users - A Hidden Markov Model Approach.
Bushra Anjum, Manish Rajangam, Harry G. Perros, Wenjuan Fan
2015Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features.
Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger
2015From Passwords to Biometrics - In Pursuit of a Panacea.
Steven Furnell
2015HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption.
Jayagopal Narayanaswamy, Raghav V. Sampangi, Srinivas Sampalli
2015Hiding in a Panopticon - Grand Challenges in Internet Anonymity.
Bryan Ford
2015ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015.
Olivier Camp, Edgar R. Weippl, Christophe Bidan, Esma Aïmeur
2015ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC.
Gregor Bonney, Hans Höfken, Benedikt Paffen, Marko Schuba
2015Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security.
Sriram Krishnamachari, Mehrdad Nojoumian, Kemal Akkaya
2015Malfinder: Accelerated Malware Classification System through Filtering on Manycore System.
Taegyu Kim, Woomin Hwang, Chulmin Kim, Dong-Jae Shin, Ki-Woong Park, Kyu Ho Park
2015Malware Classification Method Based on Sequence of Traffic Flow.
Hyoyoung Lim, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura
2015Model Repositories at the Enterprises and Systems Scale - The Modelio Constellation Solution.
Philippe Desfray
2015Model-driven Privacy Assessment in the Smart Grid.
Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frîncu, Viktor K. Prasanna
2015Modelling of Enterprise Insider Threats.
Puloma Roy, Chandan Mazumdar
2015Multi-sensor Authentication to Improve Smartphone Security.
Wei-Han Lee, Ruby B. Lee
2015On Detection of Bitcoin Mining Redirection Attacks.
Nicolas T. Courtois, Pinar Emirdag, Zhouyixing Wang
2015On the Power Consumption of Cryptographic Processors in Civil Microdrones.
Abdulhadi Shoufan, Hassan Alnoon, Joonsang Baek
2015Optimizing Cryptographically based Security in Wireless Networks.
Stuart Jacobs
2015Performance-optimized Indexes for Inequality Searches on Encrypted Data in Practice.
Jan Lehnhardt, Tobias Rho, Adrian Spalka, Armin B. Cremers
2015Privacy and Security Concern of Online Social Networks from User Perspective.
Al Amin Hossain, Weining Zhang
2015Privacy in Social Networks - Existing Challenges and Proposals for Solution.
Günther Pernul
2015Private Web Search with Constant Round Efficiency.
Bolam Kang, Sung Cheol Goh, Myungsun Kim
2015Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation.
Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger
2015Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate Research.
Ansgar R. Koene, Elvira Perez, Christopher James Carter, Ramona Statache, Svenja Adolphs, Claire O'Malley, Tom Rodden, Derek McAuley
2015The Palm Vein Graph - Feature Extraction and Matching.
Arathi Arakala, Hao Hao, Stephen A. Davis, Kathy J. Horadam
2015The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition.
Josselyn Le Moing, Ingo Stengel
2015Understanding Information Technology Security Standards Diffusion - An Institutional Perspective.
Sylvestre Uwizeyemungu, Placide Poba-Nzaou
2015Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine.
Matrazali Noorafiza, Hiroshi Maeda, Ryuya Uda, Toshiyuki Kinoshita, M. Shiratori