Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Gurpreet Dhillon, Tiago Oliveira 0001, Santa R. Susarapu, Mário M. Caldeira |
When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 352-363, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Dodge, Kathryn Coronges, Ericka Rovira |
Empirical Benefits of Training to Phishing Susceptibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 457-464, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis |
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 249-260, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shuzhe Yang, Gökhan Bal |
Balancing Security and Usability of Local Security Mechanisms for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 327-338, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shaoying Cai, Yingjiu Li, Yunlei Zhao |
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 501-512, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nineta Polemi, Theodoros Ntouskas |
Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 567-572, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis |
Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 475-488, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christian Banse, Dominik Herrmann, Hannes Federrath |
Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 235-248, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre B. Augusto, Manuel Eduardo Correia |
OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 61-74, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Support for Write Privileges on Outsourced Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 199-210, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sofia-Anna Menesidou, Vasilios Katos |
Authenticated Key Exchange (AKE) in Delay Tolerant Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 49-60, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
A Response Strategy Model for Intrusion Response Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 573-578, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ella Kolkowska, Bart De Decker |
Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 339-351, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Joan Boyar, René Peralta 0001 |
A Small Depth-16 Circuit for the AES S-Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 287-298, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Milica Milutinovic, Vincent Naessens, Bart De Decker |
Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 555-560, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vrizlynn L. L. Thing, Hwei-Ming Ying |
Enhanced Dictionary Based Rainbow Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 513-524, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xin Kang 0001, Yongdong Wu |
Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 537-542, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Massimo Ficco, Massimiliano Rak |
Intrusion Tolerance of Stealth DoS Attacks to Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 579-584, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yolanta Beres, Jonathan Griffin |
Optimizing Network Patching Policy Decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 424-442, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sarah Nait Bahloul, Emmanuel Coquery, Mohand-Said Hacid |
Authorization Policies for Materialized Views. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 525-530, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Baozeng Ding, Fufeng Yao, Yanjun Wu, Yeping He |
Improving Flask Implementation Using Hardware Assisted In-VM Isolation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 115-125, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ruben Rios, Jose Antonio Onieva, Javier López 0001 |
HIDE_DHCP: Covert Communications through Network Configuration Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 162-173, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yulong Zhang, Min Li, Kun Bai, Meng Yu 0001, Wanyu Zang |
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 388-399, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christos Grompanopoulos, Ioannis Mavridis |
Towards Use-Based Usage Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 585-590, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe D'Acquisto, Marta Flamini, Maurizio Naldi |
A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 412-423, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Tarik Moataz, Xavier Rimasson |
Handling Stateful Firewall Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 174-186, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis |
Towards a Universal Data Provenance Framework Using Dynamic Instrumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 103-114, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marianthi Theoharidou, Alexios Mylonas, Dimitris Gritzalis |
A Risk Assessment Method for Smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 443-456, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Weihan Li, Brajendra Panda, Qussai Yaseen |
Malicious Users' Transactions: Tackling Insider Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 211-222, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Olga Gadyatskaya, Fabio Massacci, Anton Philippov |
Security-by-Contract for the OSGi Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 364-375, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yannis Soupionis, Miltiadis Kandias |
Web Services Security Assessment: An Authentication-Focused Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 561-566, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang 0002, Xiang Cui, Yipeng Wang 0001 |
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 261-272, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Barbu, Christophe Giraud 0001, Vincent Guerin |
Embedded Eavesdropping on Java Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 37-48, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Giampaolo Bella, Lizzie Coles-Kemp |
Layered Analysis of Security Ceremonies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 273-286, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hyundo Park, Sung-Oh David Jung, Heejo Lee, Hoh Peter In |
Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 376-387, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ioannis Psaroudakis, Vasilios Katos, Pavlos S. Efraimidis |
A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 543-548, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Feifei Wang, Ping Chen 0003, Bing Mao, Li Xie 0001 |
RandHyp: Preventing Attacks via Xen Hypercall Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 138-149, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.) |
Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![Springer, 978-3-642-30435-4 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bernhard J. Berger, Karsten Sohr |
An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 25-36, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo |
A Framework for Threat Assessment in Access Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 187-198, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yongge Wang |
Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 489-500, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | George Drosatos, Aimilia Tasidou, Pavlos S. Efraimidis |
Privacy-Preserving Television Audience Measurement Using Smart TVs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 223-234, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Roland 0001, Josef Langer, Josef Scharinger |
Relay Attacks on Secure Element-Enabled Mobile Devices - Virtual Pickpocketing Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 1-12, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame |
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 13-24, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen |
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 126-137, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Leicher, Andreas U. Schmidt, Yogendra Shah |
Smart OpenID: A Smart Card Based OpenID Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 75-86, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Simone Fischer-Hübner, Yuko Murayama, Armand Portmann, Carlos Rieder (eds.) |
Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![Springer, 978-3-642-21423-3 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Daniel Le Métayer, Guillaume Piolle |
Delegation of Obligations and Responsibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 197-209, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ann Cavoukian |
Patience, Persistence, and Faith: Evolving the Gold Standard in Privacy and Data Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 1-16, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ge Zhang 0001 |
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 247-258, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sebastien Mondet, Ion Alberdi, Thomas Plagemann |
Generating Optimised and Formally Checked Packet Parsing Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 173-184, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuéllar, Giancarlo Pellegrino, Alessandro Sorniotti |
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 68-79, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan-Christofer Demay, Frédéric Majorczyk, Eric Totel, Frédéric Tronel |
Detecting Illegal System Calls Using a Data-Oriented Detection Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 305-316, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mirko Montanari, Ellick Chan, Kevin Larson, Wucherl Yoo, Roy H. Campbell |
Distributed Security Policy Conformance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 210-222, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin, Jeffrey B. Lotspiech |
Piracy Protection for Streaming Content in Home Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 128-141, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Raz Abramov, Amir Herzberg |
TCP Ack Storm DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 29-40, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Kellermann |
Privacy-Enhanced Web-Based Event Scheduling with Majority Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 235-246, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sven Patzina, Lars Patzina, Andy Schürr |
Extending LSCs for Behavioral Signature Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 293-304, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ella Kolkowska, Gurpreet Dhillon |
Organizational Power and Information Security Rule Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 185-196, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Felix C. Freiling, Sebastian Schinzel |
Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 41-55, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amir Alsbih, Felix C. Freiling, Christian Schindelhauer |
A Case Study in Practical Security of Cable Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 92-103, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pádraig O'Sullivan, Kapil Anand, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis |
Retrofitting Security in COTS Software with Binary Rewriting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 154-172, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton |
Ceremony Analysis: Strengths and Weaknesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 104-115, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh |
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 259-270, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep N. Bhatt, William G. Horne, Prasad Rao |
On Computing Enterprise IT Risk Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 271-280, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo |
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 223-234, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Paul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde |
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 56-67, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous |
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 317-325, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nwokedi C. Idika, Bharat K. Bhargava |
A Kolmogorov Complexity Approach for Measuring Attack Path Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 281-292, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohd Zalisham Jali, Steven Furnell, Paul Dowland 0001 |
Quantifying the Effect of Graphical Password Guidelines for Better Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 80-91, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis |
iSAM: An iPhone Stealth Airborne Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 17-28, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ping Chen 0003, Yi Fang, Bing Mao, Li Xie 0001 |
JITDefender: A Defense against JIT Spraying Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 142-153, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Reto E. Koenig, Rolf Haenni, Stephan Fischli |
Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings, pp. 116-127, 2011, Springer, 978-3-642-21423-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Johan Van Niekerk, Rossouw von Solms |
Research Methodologies in Information Security Research: The Road Ahead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 215-216, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Martin Mink, Rainer Greifeneder |
Evaluation of the Offensive Approach in Information Security Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 203-214, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Karin Hedström, Gurpreet Dhillon, Fredrik Karlsson 0001 |
Using Actor Network Theory to Understand Information Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 43-54, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Omar Hasan, Lionel Brunie, Elisa Bertino |
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 253-264, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Magazinius, Alejandro Russo, Andrei Sabelfeld |
On-the-fly Inlining of Dynamic Security Monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 173-186, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes |
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 161-172, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | William J. Caelli, Lam-for Kwok, Dennis Longley |
A Business Continuity Management Simulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 9-18, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar |
Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 148-160, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ejaz Ahmed, George M. Mohay, Alan Tickle, Sajal Bhatia |
Use of IP Addresses for High Rate Flooding Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 124-135, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Scott E. Coull, Andrew M. White 0002, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter |
Understanding Domain Registration Abuses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 68-79, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sascha Hauke, Martin Pyka, Markus Borschbach, Dominik Heider |
Augmenting Reputation-Based Trust Metrics with Rumor-Like Dissemination of Reputation Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 136-147, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christian Kahl, Katja Böttcher, Markus Tschersich, Stephan Heim, Kai Rannenberg |
How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 277-288, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
Mining Business-Relevant RBAC States through Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 19-30, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel |
Fraud Detection in ERP Systems Using Scenario Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 112-123, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Gideon Myles, Hongxia Jin |
A Metric-Based Scheme for Evaluating Tamper Resistant Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 187-202, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hua Wang 0002, Lili Sun, Vijay Varadharajan |
Purpose-Based Access Control Policies and Conflicting Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 217-228, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | C. C. Terence Tan, Anthonie B. Ruighaver, Atif Ahmad |
Information Security Governance: When Compliance Becomes More Important than Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 55-67, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller |
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 241-252, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rostyslav Barabanov, Stewart Kowalski |
Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 31-42, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dongdong Sun, Colin Boyd, Juan Manuel González Nieto |
Delegation in Predicate Encryption Supporting Disjunctive Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 229-240, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mark Stegelmann |
Towards Fair Indictment for Data Collection with Self-Enforcing Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 265-276, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens |
Performance Analysis of Accumulator-Based Revocation Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 289-301, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous |
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 302-310, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Clemens Orthacker, Martin Centner, Christian Kittl |
Qualified Mobile Server Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 103-111, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | S. H. (Basie) von Solms |
The 5 Waves of Information Security - From Kristian Beckman to the Present. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 1-8, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Markus Huber 0001, Martin Mulazzani, Edgar R. Weippl |
Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 80-89, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Julian Schütte, Nicolai Kuntze, Andreas Fuchs 0002, Atta Badii |
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings, pp. 90-102, 2010, Springer, 978-3-642-15256-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|