WISTP C

19 papers

YearTitle / Authors
2015Attack Tree Generation by Policy Invalidation.
Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller
2015Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques.
Masoud Narouei, Hassan Takabi
2015DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption.
Miguel Morales-Sandoval, Arturo Díaz-Pérez
2015Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality.
Qiao Hu, Lavinia Mihaela Dinca, Gerhard P. Hancke
2015Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols.
Alejandro Calleja, Pedro Peris-Lopez, Juan E. Tapiador
2015How Current Android Malware Seeks to Evade Automated Code Analysis.
Siegfried Rasthofer, Irfan Asrar, Stephan Huber, Eric Bodden
2015Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings
Raja Naeem Akram, Sushil Jajodia
2015Lightweight Password Hashing Scheme for Embedded Systems.
George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas, Ioannis G. Askoxylakis
2015Normalizing Security Events with a Hierarchical Knowledge Base.
David Jaeger, Amir Azodi, Feng Cheng, Christoph Meinel
2015On Linkability and Malleability in Self-blindable Credentials.
Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers
2015On Secrecy Amplification Protocols.
Radim Ostádal, Petr Svenda, Vashek Matyás
2015Practical and Privacy-Preserving TEE Migration.
Ghada Arfaoui, Saïd Gharout, Jean-François Lalande, Jacques Traoré
2015Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing.
Tassos Dimitriou, Ioannis Krontiris
2015Private Minutia-Based Fingerprint Matching.
Neyire Deniz Sarier
2015Randomizing the Montgomery Powering Ladder.
Duc-Phong Le, Chik How Tan, Michael Tunstall
2015Secure Obfuscation of Authoring Style.
Hoi Le Thi, Reihaneh Safavi-Naini, Asadullah Al Galib
2015Secure Resource Sharing for Embedded Protected Module Architectures.
Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg, Frank Piessens
2015Secure and Authenticated Access to LLN Resources Through Policy Constraints.
Konstantinos Rantos, Konstantinos Fysarakis, Othonas Sultatos, Ioannis G. Askoxylakis
2015WSACd - A Usable Access Control Framework for Smart Home Devices.
Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas, Ioannis Papaefstathiou