Table of Contents
|
Information Security Theory and Practice Raja Naeem Akram, Sushil Jajodia (Eds.)
|
Front Matter |
Security and Privacy Services
|
On Secrecy Amplification Protocols Radim Ošťádal, Petr Švenda, Vashek Matyáš |
3-19 |
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing Tassos Dimitriou, Ioannis Krontiris |
20-35 |
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols Alejandro Calleja, Pedro Peris-Lopez, Juan Tapiador |
36-51 |
Private Minutia-Based Fingerprint Matching Neyire Sarier |
52-67 |
Secure Resource Sharing and Access Control
|
Secure Resource Sharing for Embedded Protected Module Architectures Jo Bulck, Job Noorman, Jan Mühlberg, Frank Piessens |
71-87 |
Secure Obfuscation of Authoring Style Hoi Le, Reihaneh Safavi-Naini, Asadullah Galib |
88-103 |
DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption Miguel Morales-Sandoval, Arturo Diaz-Perez |
104-119 |
WSACd - A Usable Access Control Framework for Smart Home Devices Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas, Ioannis Papaefstathiou |
120-133 |
Secure Devices and Execution Environment
|
Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques Masoud Narouei, Hassan Takabi |
137-152 |
Practical and Privacy-Preserving TEE Migration Ghada Arfaoui, Jean-François Lalande, Saïd Gharout, Jacques Traoré |
153-168 |
Randomizing the Montgomery Powering Ladder Duc-Phong Le, Chik Tan, Michael Tunstall |
169-184 |
Challenges of Security and Reliability
|
How Current Android Malware Seeks to Evade Automated Code Analysis Siegfried Rasthofer, Irfan Asrar, Stephan Huber, Eric Bodden |
187-202 |
On Linkability and Malleability in Self-blindable Credentials Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers |
203-218 |
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality Qiao Hu, Lavinia Dinca, Gerhard Hancke |
219-234 |
Short Papers
|
Normalizing Security Events with a Hierarchical Knowledge Base David Jaeger, Amir Azodi, Feng Cheng, Christoph Meinel |
237-248 |
Attack Tree Generation by Policy Invalidation Marieta Ivanova, Christian Probst, René Hansen, Florian Kammüller |
249-259 |
Lightweight Password Hashing Scheme for Embedded Systems George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas, Ioannis Askoxylakis |
260-270 |
Secure and Authenticated Access to LLN Resources Through Policy Constraints Konstantinos Rantos, Konstantinos Fysarakis, Othonas Soultatos, Ioannis Askoxylakis |
271-280 |