default search action
23rd NordSec 2018: Oslo, Norway
- Nils Gruschka:
Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings. Lecture Notes in Computer Science 11252, Springer 2018, ISBN 978-3-030-03637-9
Privacy
- Avikarsha Mandal, Frederik Armknecht
, Erik Zenner:
Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid. 3-18 - Iulia Bastys
, Frank Piessens, Andrei Sabelfeld:
Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps. 19-37 - Mirja Nitschke
, Philipp Holler
, Lukas Hartmann, Dogan Kesdogan:
MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix Zones. 38-53 - Hongliang Liang, Yudong Wang, Tianqi Yang, Yue Yu:
AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications. 54-70
Cryptography
- George Teseleanu
:
Unifying Kleptographic Attacks. 73-87 - Tobias Pulls
, Rasmus Dahlberg
:
Steady - A Simple End-to-End Secure Logging System. 88-103 - Arash Atashpendar, Guru-Vamsi Policharla, Peter B. Rønne
, Peter Y. A. Ryan
:
Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation. 104-120 - Zheng Yang
, Mohsin Khan
, Wanping Liu
, Jun He
:
On Security Analysis of Generic Dynamic Authenticated Group Key Exchange. 121-137 - Ahto Buldas
, Risto Laanoja, Ahto Truu:
A Blockchain-Assisted Hash-Based Signature Scheme. 138-153 - Matilda Backendal
, Mihir Bellare
, Jessica Sorrell
, Jiahao Sun
:
The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants. 154-170 - Rasmus Dahlberg
, Tobias Pulls
:
Verifiable Light-Weight Monitoring for Certificate Transparency Logs. 171-183
Network and Cloud Security
- Charalampos Stylianopoulos
, Linus Johansson, Oskar Olsson, Magnus Almgren
:
CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs. 187-202 - Sebastian Zillien
, Steffen Wendzel
:
Detection of Covert Channels in TCP Retransmissions. 203-218 - Vivien M. Rooney
, Simon N. Foley
:
What You Can Change and What You Can't: Human Experience in Computer Network Defenses. 219-235 - Alexander Bajic, Georg T. Becker:
Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques. 236-254 - Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser
:
Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection. 255-271 - Ehtesham Zahoor, Asim Ikram, Sabina Akhtar, Olivier Perrin:
Authorization Policies Specification and Consistency Management within Multi-cloud Environments. 272-288
Cyber Security and Malware
- Kaie Maennel
, Sten Mäses, Olaf Maennel
:
Cyber Hygiene: The Big Picture. 291-305 - Ahmed Seid Yesuf, Christian W. Probst:
Estimating the Risk of Fraud Against E-Services. 306-322 - Juha Nurmi
, Mikko S. Niemelä
:
PESTEL Analysis of Hacktivism Campaign Motivations. 323-335 - Alexander Reinthal
, Eleftherios Lef Filippakis
, Magnus Almgren
:
Data Modelling for Predicting Exploits. 336-351 - Kursat Aktas, Sevil Sen
:
UpDroid: Updated Android Malware and Its Familial Classification. 352-368 - Barbara Krumay
, Edward W. N. Bernroider
, Roman Walser
:
Evaluation of Cybersecurity Management Controls and Metrics of Critical Infrastructures: A Literature Review Considering the NIST Cybersecurity Framework. 369-384 - Ziya Alper Genç
, Gabriele Lenzini
, Peter Y. A. Ryan
:
Next Generation Cryptographic Ransomware. 385-401
Security for Software and Software Development
- Ronan Lashermes, Hélène Le Bouder, Gaël Thomas:
Hardware-Assisted Program Execution Integrity: HAPEI. 405-420 - Roberto Guanciale
:
Protecting Instruction Set Randomization from Code Reuse Attacks. 421-436 - Tobias Hamann, Mihai Herda
, Heiko Mantel, Martin Mohr, David Schneider, Markus Tasch:
A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode. 437-453 - Kuyju Kim, Taeyun Kim, Seungjin Lee, Soolin Kim, Hyoungshick Kim:
When Harry Met Tinder: Security Analysis of Dating Apps on Android. 454-467 - Hanne Rygge, Audun Jøsang
:
Threat Poker: Solving Security and Privacy Threats in Agile Software Development. 468-483
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.