Table of Contents
|
Communications and Multimedia Security Bart De Decker, André Zúquete (Eds.)
|
Front Matter |
Research Papers
|
Malicious MPLS Policy Engine Reconnaissance Abdulrahman Al-Mutairi, Stephen Wolthusen |
3-18 |
USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizations André Pereira, Manuel Correia, Pedro Brandão |
19-32 |
Free Typed Text Using Keystroke Dynamics for Continuous Authentication Paulo Pinto, Bernardo Patrão, Henrique Santos |
33-45 |
Secure Storage on Android with Context-Aware Access Control Faysal Boukayoua, Jorn Lapon, Bart Decker, Vincent Naessens |
46-59 |
Work in Progress
|
A Study on Advanced Persistent Threats Ping Chen, Lieven Desmet, Christophe Huygens |
63-72 |
Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems Suaad Alarifi, Stephen Wolthusen |
73-85 |
Touchpad Input for Continuous Biometric Authentication Alexander Chan, Tzipora Halevi, Nasir Memon |
86-91 |
A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption Bernd Zwattendorfer, Daniel Slamanig, Klaus Stranacher, Felix Hörandner |
92-103 |
D–Shuffle for Prêt à Voter Dalia Khader |
104-117 |
An Approach to Information Security Policy Modeling for Enterprise Networks Dmitry Chernyavskiy, Natalia Miloslavskaya |
118-127 |
Extended Abstracts
|
Introduction to Attribute Based Searchable Encryption Dalia Khader |
131-135 |
Risk Analysis of Physically Unclonable Functions Andrea Kolberger, Ingrid Schaumüller-Bichl, Martin Deutschmann |
136-139 |
Decentralized Bootstrap for Social Overlay Networks Rodolphe Marques, André Zúquete |
140-143 |
Keynotes
|
Enhancing Privacy with Quantum Networks Paulo Mateus, Nikola Paunković, João Rodrigues, André Souto |
147-153 |
The Fundamental Principle of Breach Prevention Rui Biscaia |
154-156 |