Автор: Sara Foresti and Javier Lopez Название: Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings Издательство: Springer Год: 2016 ISBN: 9783319459301 Серия: Lecture Notes in Computer Science (Book 9895) Язык: English Формат: pdf Размер: 11,4 mb Страниц: 271
The widespread and fast development of ICT is changing the information society in which we live as well as our interactions with the surrounding environment and among each other. This evolution of ICT is bringing unprecedented advantages, but its success will depend on how secure ICT systems are and on the security and privacy guarantees that these systems offer.
These proceedings contain the papers selected for presentation at the 10th WISTP International Conference on Information Security Theory and Practice (WISTP 2016), held in Heraklion, Crete, Greece, on September 26-27, 2016, in conjunction with the 21st European Symposium On Research In Computer Security (ESORICS 2016).
In response to the call for papers, 29 papers were submitted to the conference from 14 different countries. Each paper was reviewed by at least three members of the Program Committee, and evaluated on the basis of its significance, novelty, and technical quality. As in previous years, reviewing was “double-blind”, that is, the identities of the authors were not revealed to the reviewers of the papers and the identities of the reviewers were not revealed to the authors. The Program Committee’s work was carried out electronically, yielding intensive discussions. Of the submitted papers, the Program Committee accepted 13 full papers (resulting in an acceptance rate of 44.8 %) and 5 short papers for presentation at the conference.
Securing Transactions with the elDAS Protocols Frank Morguer, Paul Bastion, and Marc Fischlin
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY Kim Thuat Nguyen, Nouha Oualha, and Maryline Laurent
Codes v. People: A Comparative Usability Study of Two Password Recoveiy Mechanisms Vlasta Stavova, Vashek Matyas, and Mike Just
Secure Hardware Systems
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures Jan Tobias Muhlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Ban Preneel, and Frank Piessens
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments Vassilios Vassilakis, Emmanouil Panaousis, and Haralambos Mouratidis
An HMM-Based Anomaly Detection Approach for SCADA Systems Kyriakos Stefanidis and Artemios G. Voyiatzis
Attacks to Software and Network Systems
Attacking and Defending Dynamic Analysis System-Calls Based IDS Ishai Rosenberg and Ehud Glides
Towards Automatic Risk Analysis and Mitigation of Software Applications Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchie, and Antonio Uoy
Runtime Code Polymorphism as a Protection Against Side Channel Attacks Damien Courousse, Thiemo Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, and Jean-Louis Lanet
Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks Guillaume Barbu and Alberto Battistello
Access Control and Data Protection
LAMP - Label-Based Access-Control for More Privacy in Online Social Networks Leila Bahri, Barbara Carminati, Elena Ferrari, and William Lucia
Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data Ling Chen, Ting Yu, and Rada Chirkova
Fault-Channel Watermarks Peter Samarin, Alexander Skripnik, and Kerstin Lemke-Rust
Short Papers
The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs — An Empirical Experiment Ahmad Sabouri
Delegating Biometric Authentication with the Sumcheck Protocol Herve Chabanne, Julien Keuffer, and Roch Lescuyer
Password Generators: Old Ideas and New Fatma Al Maqbali and Chris J. Mitchell
Provable Network Activity for Protecting Users Against False Accusation Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, and Evangelos P. Markatos
Combining Third Party Components Securely in Automotive Systems Madeline Cheah, Siraj A. Shaikh, Jeremy Bryans, and Hoang Nga Nguyen
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.