Table of Contents
|
Information Security Theory and Practice: Securing the Internet of Things David Naccache, Damien Sauveron (Eds.)
|
Front Matter |
Invited Paper
|
Sweet Dreams and Nightmares: Security in the Internet of Things Timo Kasper, David Oswald, Christof Paar |
1-9 |
Cryptography and Cryptanalysis
|
A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations Ju-Sung Kang, Nayoung Kim, Wangho Ju, Ok-Yeon Yi |
10-23 |
Towards More Practical Time-Driven Cache Attacks Raphael Spreitzer, Benoît Gérard |
24-39 |
Orthogonal Direct Sum Masking Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi |
40-56 |
Smart Cards and Embedded Devices
|
New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards Guillaume Barbu, Christophe Giraud |
57-75 |
A Pre-processing Composition for Secret Key Recovery on Android Smartphone Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Shinsaku Kiyomoto, Yutaka Miyake |
76-91 |
Privacy
|
Usable Privacy for Mobile Sensing Applications Delphine Christin, Franziska Engelmann, Matthias Hollick |
92-107 |
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection Dan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka, Shin’ichiro Matsuo, Jan Willemson |
108-123 |
End-to-End Secure and Privacy Preserving Mobile Chat Application Raja Akram, Ryan Ko |
124-139 |
Short Papers
|
S-box, SET, Match: A Toolbox for S-box Analysis Stjepan Picek, Lejla Batina, Domagoj Jakobović, Barış Ege, Marin Golub |
140-149 |
Policy-Based Access Control for Body Sensor Networks Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, Konstantinos Kagiambakis, Ioannis Papaefstathiou |
150-159 |
Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider André Zúquete, Hélder Gomes, Cláudio Teixeira |
160-169 |
CAN Bus Risk Analysis Revisit Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes |
170-179 |
AU2EU: Privacy-Preserving Matching of DNA Sequences Tanya Ignatenko, Milan Petković |
180-189 |
Early DDoS Detection Based on Data Mining Techniques Konstantinos Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj |
190-199 |