default search action
SEC 2014: Marrakech, Morocco
- Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans:
ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. IFIP Advances in Information and Communication Technology 428, Springer 2014, ISBN 978-3-642-55414-8
Intrusion Detection
- Nizar Kheir, Frédéric Tran, Pierre Caron, Nicolas Deschamps:
Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists. 1-14 - Andrew Fielder, Emmanouil A. Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi:
Game Theory Meets Information Security Management. 15-29 - Marco Rocchetto, Martín Ochoa, Mohammad Torabi Dashti:
Model-Based Detection of CSRF. 30-43 - Ibnu Mubarok, Kiryong Lee, Sihyung Lee, Heejo Lee:
Lightweight Resource Management for DDoS Traffic Isolation in a Cloud Environment. 44-51
Data Security
- Mikhail Strizhov, Indrajit Ray:
Multi-keyword Similarity Search over Encrypted Cloud Data. 52-65 - Mee-Loong Yang, Adnan Al-Anbuky, William Liu:
Security of the Multiple-Key Blom's Key Agreement Scheme for Sensor Networks. 66-79 - Thomas Bourgeat, Julien Bringer, Hervé Chabanne, Robin Champenois, Jérémie Clément, Houda Ferradi, Marc Heinrich, Paul Melotti, David Naccache, Antoine Voizard:
New Algorithmic Approaches to Point Constellation Recognition. 80-90 - Andrea Kolberger, Ingrid Schaumüller-Bichl, Verena Brunner, Martin Deutschmann:
Protection Profile for PUF-Based Devices. 91-98
Mobile Security
- Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell, Valerio Biscione:
Text-Based Active Authentication for Mobile Devices. 99-112 - Gökhan Bal, Kai Rannenberg, Jason I. Hong:
Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones. 113-126 - Bastian Braun, Johannes Köstler, Joachim Posegga, Martin Johns:
A Trusted UI for the Mobile Web. 127-141 - Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie:
Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph. 142-155
Privacy I
- Zacharias Tzermias, Vassilis Prevelakis, Sotiris Ioannidis:
Privacy Risks from Public Data Sources. 156-168 - Qasim Mahmood Rajpoot, Christian Damsgaard Jensen:
Security and Privacy in Video Surveillance: Requirements and Challenges. 169-184 - Guojun Qin, Constantinos Patsakis, Mélanie Bouroche:
Playing Hide and Seek with Mobile Dating Applications. 185-196 - Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri:
Towards a Framework for Benchmarking Privacy-ABC Technologies. 197-204
Metrics and Risk Assessment
- Dominik Herrmann, Max Maaß, Hannes Federrath:
Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing. 205-219 - Khalid Nasr, Anas Abou El Kalam:
A Novel Metric for the Evaluation of IDSs Effectiveness. 220-233 - Gabriela Varona Cervantes, Stefan Fenz:
How to Assess Confidentiality Requirements of Corporate Assets? 234-241 - Suhaila Ismail, Elena Sitnikova, Jill Slay:
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks. 242-249
Information Flow Control
- Thomas Bauereiss, Dieter Hutter:
Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS. 250-263 - Bastian Braun, Caspar Gries, Benedikt Petschkuhn, Joachim Posegga:
Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications. 264-277 - José Fragoso Santos, Tamara Rezk:
An Information Flow Monitor-Inlining Compiler for Securing a Core of JavaScript. 278-292
Identity Management
- Kevin Atighehchi, Alexis Bonnecaze, Traian Muntean:
Authenticated Dictionary Based on Frequency. 293-306 - Daniela Pöhn, Stefan Metzger, Wolfgang Hommel:
Géant-TrustBroker: Dynamic, Scalable Management of SAML-Based Inter-federation Authentication and Authorization Infrastructures. 307-320 - Miaomiao Tian, Liusheng Huang:
Efficient Identity-Based Signature from Lattices. 321-329 - Yair Diaz-Tellez, Eliane L. Bodanese, Theo Dimitrakos, Michael Turner:
Context-Aware Multifactor Authentication Based on Dynamic Pin. 330-338
Identifiability and Decision Making
- Min Yang, Kam-Pui Chow:
Authorship Attribution for Forensic Investigation with Thousands of Authors. 339-350 - Christoph Bier, Jonas Prior:
Detection and Labeling of Personal Identifiable Information in E-mails. 351-358 - Nor Athiyah Abdullah, Dai Nishioka, Yuko Tanaka, Yuko Murayama:
A Preliminary Study on User's Decision Making towards Retweet Messages. 359-365
Malicious Behavior and Fraud
- Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula:
Behavior Analysis of Web Service Attacks. 366-379 - Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero:
BankSealer: An Online Banking Fraud Analysis and Decision Support System. 380-394 - Serif Bahtiyar, Gürkan Gür, Levent Altay:
Security Assessment of Payment Systems under PCI DSS Incompatibilities. 395-402
Organizational Security
- Andreas Put, Italo Dacosta, Milica Milutinovic, Bart De Decker:
PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications. 403-416 - Lena Yuryna Connolly, Michael Lang, J. Doug Tygar:
Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values. 417-430 - Gurpreet Dhillon, Romilla Chowdhuri, Cristiane Pedron:
Organizational Transformation and Information Security Culture: A Telecom Case Study. 431-437 - Theodoros Spyridopoulos, Ioanna-Aikaterini Topa, Theo Tryfonas, Maria Karyda:
A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model. 438-445
Privacy II
- Jaap-Henk Hoepman:
Privacy Design Strategies - (Extended Abstract). 446-459 - Alberto Blanco-Justicia, Josep Domingo-Ferrer, Oriol Farràs, David Sánchez:
Distance Computation between Two Private Preference Functions. 460-470 - Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti:
Privacy-Preserving Implicit Authentication. 471-484 - Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens:
Trusted Computing to Increase Security and Privacy in eID Authentication. 485-492
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.