default search action
SEC 2011: Lucerne, Switzerland
- Jan Camenisch, Simone Fischer-Hübner, Yuko Murayama, Armand Portmann, Carlos Rieder:
Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings. IFIP Advances in Information and Communication Technology 354, Springer 2011, ISBN 978-3-642-21423-3
Kristian Beckman Award Keynote
- Ann Cavoukian:
Patience, Persistence, and Faith: Evolving the Gold Standard in Privacy and Data Protection. 1-16
Malware, Information Flow and DoS Attacks
- Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis:
iSAM: An iPhone Stealth Airborne Malware. 17-28 - Raz Abramov, Amir Herzberg:
TCP Ack Storm DoS Attacks. 29-40 - Felix C. Freiling, Sebastian Schinzel:
Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. 41-55
Authentication
- Paul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde:
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition. 56-67 - Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuéllar, Giancarlo Pellegrino, Alessandro Sorniotti:
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? 68-79 - Mohd Zalisham Jali, Steven Furnell, Paul Dowland:
Quantifying the Effect of Graphical Password Guidelines for Better Security. 80-91
Network Security and Security Protocols
- Amir Alsbih, Felix C. Freiling, Christian Schindelhauer:
A Case Study in Practical Security of Cable Networks. 92-103 - Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton:
Ceremony Analysis: Strengths and Weaknesses. 104-115 - Reto E. Koenig, Rolf Haenni, Stephan Fischli:
Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes. 116-127 - Hongxia Jin, Jeffrey B. Lotspiech:
Piracy Protection for Streaming Content in Home Networks. 128-141
Software Security
- Ping Chen, Yi Fang, Bing Mao, Li Xie:
JITDefender: A Defense against JIT Spraying Attacks. 142-153 - Pádraig O'Sullivan, Kapil Anand, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis:
Retrofitting Security in COTS Software with Binary Rewriting. 154-172 - Sebastien Mondet, Ion Alberdi, Thomas Plagemann:
Generating Optimised and Formally Checked Packet Parsing Code. 173-184
Policy Compliance and Obligations
- Ella Kolkowska, Gurpreet Dhillon:
Organizational Power and Information Security Rule Compliance. 185-196 - Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Daniel Le Métayer, Guillaume Piolle:
Delegation of Obligations and Responsibility. 197-209 - Mirko Montanari, Ellick Chan, Kevin Larson, Wucherl Yoo, Roy H. Campbell:
Distributed Security Policy Conformance. 210-222
Privacy Attacks and Privacy-Enhancing Technologies
- Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo:
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets. 223-234 - Benjamin Kellermann:
Privacy-Enhanced Web-Based Event Scheduling with Majority Agreement. 235-246 - Ge Zhang:
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users. 247-258
Risk Analysis and Security Metrics
- Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh:
Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain. 259-270 - Sandeep N. Bhatt, William G. Horne, Prasad Rao:
On Computing Enterprise IT Risk Metrics. 271-280 - Nwokedi C. Idika, Bharat K. Bhargava:
A Kolmogorov Complexity Approach for Measuring Attack Path Complexity. 281-292
Intrusion Detection
- Sven Patzina, Lars Patzina, Andy Schürr:
Extending LSCs for Behavioral Signature Modeling. 293-304 - Jonathan-Christofer Demay, Frédéric Majorczyk, Eric Totel, Frédéric Tronel:
Detecting Illegal System Calls Using a Data-Oriented Detection Model. 305-316
Appendix
- Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous:
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. 317-325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.