Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ahmed Khoumsi, Wadie Krombi, Mohammed Erradi |
A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fariba Haddadi, Nur Zincir-Heywood |
Data Confirmation for Botnet Traffic Analysis. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wen Wen, Binod Vaidya, Dimitrios Makrakis, Carlisle Adams |
Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Korak |
Location-Dependent EM Leakage of the ATxmega Microcontroller. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Raphaël Jamet, Pascal Lafourcade 0001 |
(In)Corruptibility of Routing Protocols. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ali Kassem 0001, Pascal Lafourcade 0001, Yassine Lakhnech |
Formal Verification of e-Reputation Protocols. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquín García-Alfaro, Nur Zincir-Heywood (eds.) |
Foundations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tim Waage, Lena Wiese |
Benchmarking Encrypted Data Storage in HBase and Cassandra with YCSB. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vinh-Thong Ta 0001, Thibaud Antignac |
Privacy by Design: On the Conformance Between Protocols and Architectures. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Joe Portner, Joel Kerr, Bill Chu |
Moving Target Defense Against Cross-Site Scripting Attacks (Position Paper). |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Hervé Chabanne, Maxime Puys |
Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Peeter Laud, Jan Willemson |
Composable Oblivious Extended Permutations. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Naelah Alkhojandi, Ali Miri |
Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Bonfante, Jean-Yves Marion, Thanh Dinh Ta |
Malware Message Classification by Dynamic Analysis. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli |
A Formal Approach to Automatic Testing of Security Policies Specified in XACML. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch |
A Maximum Variance Approach for Graph Anonymization. |
FPS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yi Lu 0002, Yvo Desmedt |
Improved Davies-Murphy's Attack on DES Revisited. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Erwan Le Malécot, Daisuke Inoue |
The Carna Botnet Through the Lens of a Network Telescope. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Brahim Hamid, Christian Percebois |
Model-Based Specification and Validation of Security and Dependability Patterns. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Charles Morisset |
Quantitative Evaluation of Enforcement Strategies - Position Paper. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Huihui Yang, Lei Jiao 0001, Vladimir A. Oleshchuk |
A General Framework for Group Authentication and Key Exchange Protocols. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Yang 0001 |
Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Wachs, Martin Schanzenbach, Christian Grothoff |
On the Feasibility of a Censorship Resistant Decentralized Name System. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jean Goubault-Larrecq, Julien Olivain |
On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christian Brandt, Michael Kasper |
Don't Push It: Breaking iButton Security. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria |
Fault Injection to Reverse Engineer DES-Like Cryptosystems. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra |
CheR: Cheating Resilience in the Cloud via Smart Resource Allocation. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Nikolaos L. Dellas, Joaquín García-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris, Nora Cuppens-Boulahia, Frédéric Cuppens |
Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Korak |
Investigation of Parameters Influencing the Success of Optical Fault Attacks. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hideki Sakurada |
Computational Soundness of Symbolic Blind Signatures under Active Attacker. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ali Kassem 0001, Pascal Lafourcade 0001, Yassine Lakhnech |
A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alireza Sadighian, José M. Fernandez 0001, Antoine Lemay, Saman Taghavi Zargar |
ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yang Li 0001, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta, Kazuo Sakiyama |
Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Raphaël Jamet, Pascal Lafourcade 0001 |
Discovering Flaws in IDS Through Analysis of Their Inputs. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Bedford, Josée Desharnais, Théophane G. Godonou, Nadia Tawbi |
Enforcing Information Flow by Combining Static and Dynamic Analysis. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Firas Al Khalil, Alban Gabillon, Patrick Capolsini |
Collusion Resistant Inference Control for Cadastral Databases. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ashkan Rahimian, Raha Ziarati, Stere Preda, Mourad Debbabi |
On the Reverse Engineering of the Citadel Botnet. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bao Liu, Lei Zhang 0009, Josep Domingo-Ferrer |
On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi (eds.) |
Foundations and Practice of Security - 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sylvain Guilley, Damien Marion 0001, Zakaria Najm, Youssef Souissi, Antoine Wurcker |
Software Camouflage. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lukas Malina, Vlastimil Clupek, Zdenek Martinasek, Jan Hajny, Kimio Oguchi, Vaclav Zeman |
Evaluation of Software-Oriented Block Ciphers on Smartphones. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zeeshan Bilal, Keith Martin |
A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Armando, Sander Oudkerk, Silvio Ranise, Konrad S. Wrona |
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations. |
FPS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tongbo Luo, Xing Jin, Ajai Ananthanarayanan, Wenliang Du |
Touchjacking Attacks on Web in Android, iOS, and Windows Phone. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jie Li 0005, Jianliang Zheng |
MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Joaquín García-Alfaro, Pascal Lafourcade 0001 (eds.) |
Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin |
Towards Modelling Adaptive Attacker's Behaviour. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere |
GHUMVEE: Efficient, Effective, and Flexible Replication. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad AlSa'deh, Hosnieh Rafiee, Christoph Meinel |
IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Darakhshan J. Mir |
Information-Theoretic Foundations of Differential Privacy. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona |
Scalable Deniable Group Key Establishment. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Cristina Pérez-Solà, Jordi Herrera-Joancomartí |
Classifying Online Social Network Users through the Social Graph. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lukas Malina, Jordi Castellà-Roca, Arnau Vives-Guasch, Jan Hajny |
Short-Term Linkable Group Signatures with Categorized Batch Verification. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tim Muller, Patrick Schweitzer |
A Formal Derivation of Composite Trust. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tahsin Arafat Reza, Michel Barbeau |
QoS Aware Adaptive Security Scheme for Video Streaming in MANETs. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sherif Saad, Issa Traoré |
Extracting Attack Scenarios Using Intrusion Semantics. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Colin O'Flynn, Zhizhang Chen |
A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sumanta Sarkar, Reihaneh Safavi-Naini |
Proofs of Retrievability via Fountain Code. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Houari Mahfoud, Abdessamad Imine |
On Securely Manipulating XML Data. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hadi Ahmadi, Reihaneh Safavi-Naini |
Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nick Mailloux, Ali Miri, Monica Nevins |
COMPASS: Authenticated Group Key Agreement from Signcryption. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ashkan Rahimian, Philippe Charland, Stere Preda, Mourad Debbabi |
RESource: A Framework for Online Matching of Assembly with Open Source Code. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Khair Eddin Sabri, Ridha Khédri |
A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jianliang Zheng, Jie Li 0005 |
MARC: Modified ARC4. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone |
Policy Administration in Tag-Based Authorization. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Pawel Chwalinski, Roman V. Belavkin, Xiaochun Cheng |
Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens |
Enabling Dynamic Security Policy in the Java Security Manager. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Foket, Bjorn De Sutter, Bart Coppens 0001, Koen De Bosschere |
A Novel Obfuscation: Class Hierarchy Flattening. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Isaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi, Issa Traoré |
Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquín García-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris |
A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi |
Preserving Privacy in Online Social Networks. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jun Ho Huh, Hyoungshick Kim |
Phishing Detection with Popular Search Engines: Simple and Effective. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marina Pudovkina |
A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Dreier, Pascal Lafourcade 0001, Yassine Lakhnech |
Vote-Independence: A Powerful Privacy Notion for Voting Protocols. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martin Stanek |
Threshold Encryption into Multiple Ciphertexts. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gimer Cervera, Michel Barbeau, Joaquín García-Alfaro, Evangelos Kranakis |
Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Régine Laleau, Richard St-Denis |
A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michal Rjasko |
Black-Box Property of Cryptographic Hash Functions. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nicola Dragoni, Eduardo Lostal, Davide Papini, Javier Fabra |
SC 2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-application Smart Cards. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yu Chen 0003, Song Luo, Jian-bin Hu, Zhong Chen 0001 |
A Novel Commutative Blinding Identity Based Encryption Scheme. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martin Gagné, Pascal Lafourcade 0001, Yassine Lakhnech, Reihaneh Safavi-Naini |
Automated Verification of Block Cipher Modes of Operation, an Improved Method. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tony Bourdier, Horatiu Cirstea, Mathieu Jaume, Hélène Kirchner |
Formal Specification and Validation of Security Policies. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro |
Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Konopacki, Hakim Belhaouari, Marc Frappier, Régine Laleau |
Specification and Verification of Access Control Policies in EB3SEC: Work in Progress. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Barthe, Mathilde Duclos, Yassine Lakhnech |
A Computational Indistinguishability Logic for the Bounded Storage Model. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Behzad Malek, Ali Miri |
Private Identification of RFID Tags. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jordi Pujol Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca, Oriol Farràs |
TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hadi Ahmadi, Reihaneh Safavi-Naini |
Secret Key Establishment over Noisy Channels. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jérémy Milhau, Marc Frappier, Régine Laleau |
A Metamodel of the B Modeling of Access-Control Policies: Work in Progress. |
FPS |
2011 |
DBLP DOI BibTeX RDF |
|