index - ICT Systems Security and Privacy Protection
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
ICT Systems Security and Privacy Protection
Gurpreet Dhillon, Fredrik Karlsson, Karin Hedström, André Zúquete
Front Matter

Intrusion Detection


Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack
Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Kazumasa Omote, Ayumu Kubota
3-18
GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier
Guanxiong Liu, Issa Khalil, Abdallah Khreishah
19-32
Control Logic Injection Attacks on Industrial Control Systems
Hyunguk Yoo, Irfan Ahmed
33-48
An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications
David Lanoe, Michel Hurfin, Eric Totel, Carlos Maziero
49-63

Access Control


Performance of Password Guessing Enumerators Under Cracking Conditions
Mathieu Valois, Patrick Lacharme, Jean-Marie Le Bars
67-80
An Offline Dictionary Attack Against zkPAKE Protocol
José Becerra, Peter Ryan, Petra Šala, Marjan Škrobot
81-90
Fine-Grained Access Control in Industrial Internet of Things
Dominik Ziegler, Josef Sabongui, Gerald Palfinger
91-104
Towards an Automated Extraction of ABAC Constraints from Natural Language Policies
Manar Alohaly, Hassan Takabi, Eduardo Blanco
105-119
Removing Problems in Rule-Based Policies
Zheng Cheng, Jean-Claude Royer, Massimo Tisi
120-133
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild
Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth
134-148

Organizational and Behavioral


ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment
Majid Hatamian, Sebastian Pape, Kai Rannenberg
165-179
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications
Weizhi Meng, Wenjuan Li, Lijun Jiang, Jianying Zhou
180-193
The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users
Joëlle Simonet, Stephanie Teufel
194-208
To Be, or Not to Be Notified
Patrick Murmann, Delphine Reinhardt, Simone Fischer-Hübner
209-222
A Structured Comparison of the Corporate Information Security Maturity Level
Michael Schmid, Sebastian Pape
223-237
Predicting Students’ Security Behavior Using Information-Motivation-Behavioral Skills Model
Ali Farooq, Debora Jeske, Jouni Isoaho
238-252
Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym
David Harborth, Xinyuan Cai, Sebastian Pape
253-267

Crypto and Encryption


Arcana: Enabling Private Posts on Public Microblog Platforms
Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee, Bo Luo
271-285
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny
286-298
BlockTag: Design and Applications of a Tagging System for Blockchain Analysis
Yazan Boshmaf, Husam Al Jawaheri, Mashael Al Sabah
299-313
Forward Secure Identity-Based Signature Scheme with RSA
Hankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim, Hyunok Oh
314-327

Integrity


On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques
Sarwar Sayeed, Hector Marco-Gisbert
331-344
Automatically Proving Purpose Limitation in Software Architectures
Kai Bavendiek, Tobias Mueller, Florian Wittner, Thea Schwaneberg, Christian-Alexander Behrendt, Wolfgang Schulz, Hannes Federrath, Sibylle Schupp
345-358
Commit Signatures for Centralized Version Control Systems
Sangat Vaidya, Santiago Torres-Arias, Reza Curtmola, Justin Cappos
359-373
Towards Contractual Agreements for Revocation of Online Data
Theodor Schnitzler, Markus Dürmuth, Christina Pöpper
374-387

 


Designed by Inria-IES Team : http://ifip.hal.science/    Hosted by HAL : http://hal.archives-ouvertes.fr/