


default search action
SEC 2012: Crete, Greece
- Dimitris Gritzalis, Steven Furnell
, Marianthi Theoharidou:
Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. IFIP Advances in Information and Communication Technology 376, Springer 2012, ISBN 978-3-642-30435-4
Attacks and Malicious Code
- Michael Roland
, Josef Langer, Josef Scharinger:
Relay Attacks on Secure Element-Enabled Mobile Devices - Virtual Pickpocketing Revisited. 1-12 - Alessandro Armando
, Alessio Merlo, Mauro Migliardi
, Luca Verderame
:
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures). 13-24 - Bernhard J. Berger
, Karsten Sohr
:
An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling. 25-36 - Guillaume Barbu, Christophe Giraud
, Vincent Guerin:
Embedded Eavesdropping on Java Card. 37-48
Security Architectures
- Sofia-Anna Menesidou
, Vasilios Katos
:
Authenticated Key Exchange (AKE) in Delay Tolerant Networks. 49-60 - Alexandre B. Augusto, Manuel Eduardo Correia
:
OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management. 61-74 - Andreas Leicher, Andreas U. Schmidt, Yogendra Shah:
Smart OpenID: A Smart Card Based OpenID Protocol. 75-86 - David Zhao, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu
:
Peer to Peer Botnet Detection Based on Flow Intervals. 87-102
System Security
- Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis:
Towards a Universal Data Provenance Framework Using Dynamic Instrumentation. 103-114 - Baozeng Ding, Fufeng Yao, Yanjun Wu, Yeping He:
Improving Flask Implementation Using Hardware Assisted In-VM Isolation. 115-125 - Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg
, Wouter Joosen:
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. 126-137 - Feifei Wang, Ping Chen, Bing Mao, Li Xie:
RandHyp: Preventing Attacks via Xen Hypercall Interface. 138-149
Access Control
- John C. John, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
Role Mining under Role-Usage Cardinality Constraint. 150-161 - Ruben Rios, Jose Antonio Onieva
, Javier López
:
HIDE_DHCP: Covert Communications through Network Configuration Messages. 162-173 - Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro
, Tarik Moataz, Xavier Rimasson:
Handling Stateful Firewall Anomalies. 174-186 - Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo:
A Framework for Threat Assessment in Access Control Systems. 187-198
Database Security
- Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Stefano Paraboschi
, Pierangela Samarati
:
Support for Write Privileges on Outsourced Data. 199-210 - Weihan Li, Brajendra Panda, Qussai Yaseen
:
Malicious Users' Transactions: Tackling Insider Threat. 211-222
Privacy Attitudes and Properties
- George Drosatos
, Aimilia Tasidou, Pavlos S. Efraimidis:
Privacy-Preserving Television Audience Measurement Using Smart TVs. 223-234 - Christian Banse
, Dominik Herrmann, Hannes Federrath:
Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility. 235-248 - Alexios Mylonas
, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis:
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition. 249-260
Social Networks and Social Engineering
- Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang:
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. 261-272 - Giampaolo Bella
, Lizzie Coles-Kemp:
Layered Analysis of Security Ceremonies. 273-286
Applied Cryptography, Anonymity and Trust
- Joan Boyar
, René Peralta:
A Small Depth-16 Circuit for the AES S-Box. 287-298 - Maria Christofi, Aline Gouget:
Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol. 299-314
Usable Security
- Amir Herzberg
, Ronen Margulies:
My Authentication Album: Adaptive Images-Based Login Mechanism. 315-326 - Shuzhe Yang, Gökhan Bal:
Balancing Security and Usability of Local Security Mechanisms for Mobile Devices. 327-338 - Ella Kolkowska, Bart De Decker:
Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation. 339-351 - Gurpreet Dhillon
, Tiago Oliveira
, Santa R. Susarapu, Mário M. Caldeira
:
When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems. 352-363
Security and Trust Models
- Olga Gadyatskaya, Fabio Massacci
, Anton Philippov:
Security-by-Contract for the OSGi Platform. 364-375 - Hyundo Park, Sung-Oh David Jung, Heejo Lee, Hoh Peter In:
Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis. 376-387 - Yulong Zhang, Min Li, Kun Bai, Meng Yu, Wanyu Zang:
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds. 388-399 - Han Jiao, Jixue Liu
, Jiuyong Li
, Chengfei Liu
:
Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework. 400-411
Security Economics
- Giuseppe D'Acquisto, Marta Flamini
, Maurizio Naldi
:
A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation. 412-423 - Yolanta Beres, Jonathan Griffin:
Optimizing Network Patching Policy Decisions. 424-442 - Marianthi Theoharidou
, Alexios Mylonas
, Dimitris Gritzalis:
A Risk Assessment Method for Smartphones. 443-456 - Ronald Dodge, Kathryn Coronges, Ericka Rovira:
Empirical Benefits of Training to Phishing Susceptibility. 457-464
Authentication and Delegation
- Hataichanok Saevanee, Nathan L. Clarke
, Steven M. Furnell
:
Multi-modal Behavioural Biometric Authentication for Mobile Devices. 465-474 - Christoforos Ntantogian, Christos Xenakis
, Ioannis Stavrakakis
:
Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks. 475-488 - Yongge Wang
:
Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks. 489-500 - Shaoying Cai, Yingjiu Li, Yunlei Zhao:
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains. 501-512 - Vrizlynn L. L. Thing, Hwei-Ming Ying:
Enhanced Dictionary Based Rainbow Table. 513-524
Short Papers
- Sarah Nait Bahloul, Emmanuel Coquery, Mohand-Said Hacid:
Authorization Policies for Materialized Views. 525-530 - Yongdong Wu, Zhigang Zhao:
Enhancing the Security of On-line Transactions with CAPTCHA Keyboard. 531-536 - Xin Kang
, Yongdong Wu:
Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach. 537-542 - Ioannis Psaroudakis, Vasilios Katos
, Pavlos S. Efraimidis:
A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network. 543-548 - Marco Prandini
, Marco Ramilli:
A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages. 549-554 - Milica Milutinovic, Vincent Naessens, Bart De Decker:
Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System. 555-560 - Yannis Soupionis, Miltiadis Kandias:
Web Services Security Assessment: An Authentication-Focused Approach. 561-566 - Nineta Polemi, Theodoros Ntouskas:
Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case. 567-572 - Nor Badrul Anuar
, Maria Papadaki
, Steven Furnell
, Nathan L. Clarke
:
A Response Strategy Model for Intrusion Response Systems. 573-578 - Massimo Ficco, Massimiliano Rak
:
Intrusion Tolerance of Stealth DoS Attacks to Web Services. 579-584 - Christos Grompanopoulos, Ioannis Mavridis:
Towards Use-Based Usage Control. 585-590

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.