ICISSP C

67 papers

YearTitle / Authors
20163-Out-of-n Cheating Prevention Visual Cryptographic Schemes.
Ching-Nung Yang, Stelvio Cimato, Jihi-Han Wu, Song-Ruei Cai
2016A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security.
Edwin T. L. Rampine, Cynthia H. Ngejane
2016A Collaborative Analysis System for Cross-organization Cyber Incident Handling.
Giuseppe Settanni, Florian Skopik, Yegor Shovgenya, Roman Fiedler
2016A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate.
Masahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa
2016A Continuous LoA Compliant Trust Evaluation Method.
Julien Hatin, Estelle Cherrier, Jean-Jacques Schwartzmann, Vincent Frey, Christophe Rosenberger
2016A Cyberthreat Search Process and Service.
Yogesh Bhanu, Sebastian Dännart, Henning von Kielpinski, Alexander Laux, Ulrike Lechner, Tobias Lehmann, Andreas Rieb, Martin Riedl, Florian Wolf
2016A New Approach for Electronic Signature.
Gianluca Lax, Francesco Buccafurri, Serena Nicolazzo, Antonino Nocera, Lidia Fotia
2016A Practical-time Attack on Reduced-round MISTY1.
Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi
2016A Pragmatic System-failure Assessment and Response Model.
Jassim Happa, Graham Fairclough, Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese
2016A Privacy Threat for Internet Users in Internet-censoring Countries.
Feno Heriniaina R.
2016A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes.
Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar
2016A Statistical Approach to the Detection of HTML Attribute Permutation Steganography.
Iman Sedeeq, Frans Coenen, Alexei Lisitsa
2016A Threat Analysis Model for Identity and Access Management.
Nadia Jemil Abdu, Ulrike Lechner
2016An Anonymous Geocast Scheme for ITS Applications.
Carsten Büttner, Sorin A. Huss
2016An Approach to Personalized Privacy Policy Recommendations on Online Social Networks.
Ammar Abuelgasim, Anne V. D. M. Kayem
2016An Expert System for Facilitating an Institutional Risk Profile Definition for Cyber Situational Awareness.
Roman Graf, Sergiu Gordea, Heather M. Ryan, Tibaut Houzanme
2016An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications.
Germain Jolly, Sylvain Vernois, Christophe Rosenberger
2016Analysis of ISO 27001: 2013 Controls Effectiveness for Cloud Computing.
Muhammad Imran Tariq, Vito Santarcangelo
2016Anomaly-based Mobile Malware Detection: System Calls as Source for Features.
Dominik Teubert, Fred Grossmann, Ulrike Meyer
2016Characterization of Encrypted and VPN Traffic using Time-related Features.
Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, Ali A. Ghorbani
2016Characterizing SEAndroid Policies in the Wild.
Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan
2016Collaborative Information Service - Privacy Algebra for User Defined Security.
Asim K. Pal, Subrata Bose, Arpita Maitra
2016Collateral Damage of Online Social Network Applications.
Iraklis Symeonidis, Pagona Tsormpatzoudi, Bart Preneel
2016Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare.
Ana Ferreira, Gabriele Lenzini
2016Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing.
Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer
2016DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service.
Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang, Zhonghai Wu
2016Declassification of Information with Complex Filter Functions.
Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif
2016Detecting Botnets using a Collaborative Situational-aware IDPS.
M. Lisa Mathews, Anupam Joshi, Tim Finin
2016Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques.
Kexin Qiao, Lei Hu, Siwei Sun
2016Efficient Authorization Authority Certificate Distribution in VANETs.
Sebastian Bittl, Karsten Roscher
2016Ethics in Security Research.
Edgar R. Weippl
2016Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study.
Gencer Erdogan, Ketil Stølen, Jan Øyvind Aagedal
2016Experimental Evaluation of Password Recovery in Encrypted Documents.
Radek Hranicky, Petr Matousek, Ondrej Rysavý, Vladimír Veselý
2016Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids.
Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen
2016Handwritten Signature Verification for Mobile Phones.
Nilakantha Paudel, Marco Querini, Giuseppe F. Italiano
2016High-Performance FPGA Implementation of Elliptic Curve Cryptography Processor over Binary Field GF(2^163).
Md. Selim Hossain, Ehsan Saeedi, Yinan Kong
2016IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation.
Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer
2016Identification of Android Malware Families with Model Checking.
Pasquale Battista, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
2016Improving Database Security in Web-based Environments.
Francesco Di Tria, Ezio Lefons, Filippo Tangorra
2016Injecting CSP for Fun and Security.
Christoph Kerschbaumer, Sid Stamm, Stefan Brunthaler
2016Interaction-based Reputation Model in Online Social Networks.
Izzat Alsmadi, Dianxiang Xu, Jin-Hee Cho
2016Internet Streaming and Network Neutrality: Comparing the Performance of Video Hosting Services.
Alessio Botta, Aniello Avallone, Mauro Garofalo, Giorgio Ventre
2016Lightweight Trust Model with High Longevity for Wireless Sensor Networks.
Hela Maddar, Wafa Kammoun, Omar Cheikhrouhou, Habib Youssef
2016Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN.
Danping Shi, Lei Hu, Siwei Sun, Ling Song
2016Mitigating Local Attacks Against a City Traffic Controller.
Nils Ulltveit-Moe, Steffen Pfrang, László Erdödi, Héctor Nebot
2016Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction.
Peter Maynard, Kieran McLaughlin, Sakir Sezer
2016Multi-factor Authentication Updating System Evaluation Dynamically for Service Continuity.
Hiroya Susuki, Rie Shigetomi Yamaguchi, Shizuo Sakamoto
2016On TLS 1.3 - Early Performance Analysis in the IoT Field.
Simone Bossi, Tea Anselmo, Guido Bertoni
2016Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors.
Cristina-Loredana Duta, Laura Gheorghe, Nicolae Tapus
2016Personalised Privacy by Default Preferences - Experiment and Analysis.
Toru Nakamura, Shinsaku Kiyomoto, Welderufael B. Tesfay, Jetzabel M. Serna
2016Predicting Attack Prone Software Components using Repository Mined Change Metrics.
Daniel D. Hein, Hossein Saiedian
2016Privacy, Ethics and Big Data.
Jason I. Hong
2016Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016.
Olivier Camp, Steven Furnell, Paolo Mori
2016Quantitative Evaluation of Security on Cryptographic ICs against Fault Injection Attacks.
C. Shao, H. Li, G. Xu
2016Retrospective Study of Third-party Web Tracking.
Tim Wambach, Katharina Bräunlich
2016Review Analysis of Properties for an Ideal Secure Biometric Template Scheme.
Phiwa Mzila
2016Risk Management for Dynamic Metadata Exchange via a Trusted Third Party.
Daniela Pöhn
2016Security and Privacy Practices in Healthcare Information Systems: A Cluster Analysis of European Hospitals.
Sylvestre Uwizeyemungu, Placide Poba-Nzaou
2016Sift - An Efficient Method for Co-residency Detection on Amazon EC2.
Kang Chen, Qingni Shen, Cong Li, Yang Luo, Yahui Yang, Zhonghai Wu
2016Streamlining Extraction and Analysis of Android RAM Images.
Simon Broenner, Hans Höfken, Marko Schuba
2016Tax Fraud and Investigation Procedures - Everybody, Every Where, Every Time.
Hans-Joachim Lenz
2016The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies.
Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi
2016Tracking Explicit and Control Flows in Java and Native Android Apps Code.
Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet
2016Truncated, Impossible, and Improbable Differential Analysis of ASCON.
Cihangir Tezcan
2016Trust-based Dynamic RBAC.
Tamir Lavi, Ehud Gudes
2016Understanding the Impact of Cyber Security Risks on Safety.
Christine Izuakor
2016Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine.
Cong Li, Qingni Shen, Kang Chen, Yahui Yang, Zhonghai Wu