index - Information Security Theory and Practice Access content directly

Full Text Documents

Chargement de la page


Chargement de la page

Table of Contents
Information Security Theory and Practice
Gerhard P. Hancke, Ernesto Damiani
Front Matter

Security in Emerging Systems

A Secure and Trusted Channel Protocol for UAVs Fleets
Raja Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette
Philanthropy on the Blockchain
Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Akram, Keith Mayes

Security of Data

Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database
Shujie Cui, Ming Zhang, Muhammad Asghar, Giovanni Russello
JACPoL: A Simple but Expressive JSON-based Access Control Policy Language
Hao Jiang, Ahmed Bouabdallah

Trusted Execution

EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
Carlton Shepherd, Raja Akram, Konstantinos Markantonakis
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip
Sebanjila Bukasa, Ronan Lashermes, Hélène Bouder, Jean-Louis Lanet, Axel Legay

Defences and Evaluation

Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications
Madeline Cheah, Hoang Nguyen, Jeremy Bryans, Siraj Shaikh
Examination of a New Defense Mechanism: Honeywords
Ziya Genç, Süleyman Kardaş, Mehmet Kiraz
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics
Yonas Leguesse, Mark Vella, Joshua Ellul

Protocols and Algorithms

A More Efficient 1–Checkable Secure Outsourcing Algorithm for Bilinear Maps
Öznur Kalkar, Mehmet Kiraz, İsa Sertkaya, Osmanbey Uzunkol
A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons
Pau Conejero-Alberola, M. Hinarejos, Josep-Lluís Ferrer-Gomila
Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough?
Nektaria Kaloudi, Aikaterini Mitrokotsa



Designed by Inria-IES Team :    Hosted by HAL :