WISTP C

19 papers

YearTitle / Authors
2016An HMM-Based Anomaly Detection Approach for SCADA Systems.
Kyriakos Stefanidis, Artemios G. Voyiatzis
2016An Implementation of a High Assurance Smart Meter Using Protected Module Architectures.
Jan Tobias Mühlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, Frank Piessens
2016Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks.
Guillaume Barbu, Alberto Battistello
2016Attacking and Defending Dynamic Analysis System-Calls Based IDS.
Ishai Rosenberg, Ehud Gudes
2016Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms.
Vlasta Stavova, Vashek Matyas, Mike Just
2016Combining Third Party Components Securely in Automotive Systems.
Madeline Cheah, Siraj A. Shaikh, Jeremy W. Bryans, Hoang Nga Nguyen
2016Delegating Biometric Authentication with the Sumcheck Protocol.
Hervé Chabanne, Julien Keuffer, Roch Lescuyer
2016Fault-Channel Watermarks.
Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust
2016Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
Sara Foresti, Javier López
2016LAMP - Label-Based Access-Control for More Privacy in Online Social Networks.
Leila Bahri, Barbara Carminati, Elena Ferrari, William Lucia
2016Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY.
Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent
2016Password Generators: Old Ideas and New.
Fatma Al Maqbali, Chris J. Mitchell
2016Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data.
Ling Chen, Ting Yu, Rada Chirkova
2016Provable Network Activity for Protecting Users Against False Accusation.
Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos
2016Runtime Code Polymorphism as a Protection Against Side Channel Attacks.
Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet
2016Securing Transactions with the eIDAS Protocols.
Frank Morgner, Paul Bastian, Marc Fischlin
2016Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments.
Vassilios G. Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis
2016The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs - An Empirical Experiment.
Ahmad Sabouri
2016Towards Automatic Risk Analysis and Mitigation of Software Applications.
Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy