Table of Contents
|
Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga(Eds.)
|
Front Matter |
Keynotes
|
Recent Developments in Low-Level Software Security Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem Groef, Frank Piessens |
1-16 |
Towards a C2I Platform for Combating the Cyber-Threat Paul Kearney |
17-19 |
Veracity, Plausibility, and Reputation Dieter Gollmann |
20-28 |
Protocols
|
Another Fallen Hash-Based RFID Authentication Protocol Julio Hernandez-Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi |
29-37 |
Protocols (Short Papers)
|
HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network G. Kirubavathi Venkatesh, R. Anitha Nadarajan |
38-48 |
How to Break EAP-MD5 Fanbao Liu, Tao Xie |
49-57 |
Privacy
|
Privacy Preserving Social Network Publication on Bipartite Graphs Jian Zhou, Jiwu Jing, Ji Xiang, Lei Wang |
58-70 |
Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications Andreas Reinhardt, Matthias Hollick, Michaela Kauer, Delphine Christin, Pablo Sánchez López |
71-86 |
Privacy (Short Paper)
|
Privacy Preservation of User History Graph Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake |
87-96 |
Policy and Access Control
|
HiPoLDS: A Security Policy Language for Distributed Systems Matteo Dell’amico, Gabriel Serme, Muhammad Idrees, Anderson Santana de Olivera, Yves Roudier |
97-112 |
ROAC: A Role-Oriented Access Control Model Nezar Nassr, Eric Steegmans |
113-127 |
Multi-Party Computation
|
Optimal Parameters for Efficient Two-Party Computation Protocols Chaya Ganesh, C. Pandu Rangan |
128-143 |
Assisting Server for Secure Multi-Party Computation Jens-Matthias Bohli, Wenting Li, Jan Seedorf |
144-159 |
Cryptography (Short Papers)
|
An Efficient Lattice-Based Secret Sharing Construction Rachid Bansarkhani, Mohammed Meziani |
160-168 |
On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger |
169-178 |
Impossible Differential Cryptanalysis of Reduced-Round LBlock Ferhat Karakoç, Hüseyin Demirci, A. Harmancı |
179-188 |
Mobile Security
|
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices Johann Großschädl, Dan Page, Stefan Tillich |
189-207 |
Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android Daniel Schreckling, Joachim Posegga, Johannes Köstler, Matthias Schaff |
208-223 |