Search - Information Security Theory and Practice Access content directly

Filter your results

18 results
Contributor/author Internal identifier : 200187
Image document

Fault-Channel Watermarks

Peter Samarin , Alexander Skripnik , Kerstin Lemke-Rust
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.204-219, ⟨10.1007/978-3-319-45931-8_13⟩
Conference papers hal-01639613v1
Image document

Delegating Biometric Authentication with the Sumcheck Protocol

Hervé Chabanne , Julien Keuffer , Roch Lescuyer
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.236-244, ⟨10.1007/978-3-319-45931-8_15⟩
Conference papers hal-01639622v1
Image document

Attacking and Defending Dynamic Analysis System-Calls Based IDS

Ishai Rosenberg , Ehud Gudes
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.103-119, ⟨10.1007/978-3-319-45931-8_7⟩
Conference papers hal-01639619v1
Image document

Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms

Vlasta Stavova , Vashek Matyas , Mike Just
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.35-50, ⟨10.1007/978-3-319-45931-8_3⟩
Conference papers hal-01639601v1
Image document

Combining Third Party Components Securely in Automotive Systems

Madeline Cheah , Siraj A. Shaikh , Jeremy Bryans , Hoang Nga Nguyen
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.262-269, ⟨10.1007/978-3-319-45931-8_18⟩
Conference papers hal-01639623v1
Image document

Assessing the Performance of Agile Teams

Marta Kristin Larusdottir , Marcel Kyas
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.71-83, ⟨10.1007/978-3-030-46540-7_8⟩
Conference papers hal-03188826v1
Image document

Provable Network Activity for Protecting Users Against False Accusation

Panagiotis Papadopoulos , Elias Athanasopoulos , Eleni Kosta , George Siganos , Angelos D. Keromytis , et al.
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.254-261, ⟨10.1007/978-3-319-45931-8_17⟩
Conference papers hal-01639610v1
Image document

Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks

Guillaume Barbu , Alberto Battistello
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-45931-8_10⟩
Conference papers hal-01639620v1
Image document

Securing Transactions with the eIDAS Protocols

Frank Morgner , Paul Bastian , Marc Fischlin
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.3-18, ⟨10.1007/978-3-319-45931-8_1⟩
Conference papers hal-01639614v1
Image document

Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data

Ling Chen , Ting Yu , Rada Chirkova
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.187-203, ⟨10.1007/978-3-319-45931-8_12⟩
Conference papers hal-01639604v1
Image document

An HMM-Based Anomaly Detection Approach for SCADA Systems

Kyriakos Stefanidis , Artemios G. Voyiatzis
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.85-99, ⟨10.1007/978-3-319-45931-8_6⟩
Conference papers hal-01639609v1
Image document

Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments

Vassilios Vassilakis , Emmanouil Panaousis , Haralambos Mouratidis
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.70-84, ⟨10.1007/978-3-319-45931-8_5⟩
Conference papers hal-01639606v1

Information Security Theory and Practice

Sara Foresti , Javier Lopez
Springer International Publishing, LNCS-9895, 2016, Lecture Notes in Computer Science, 978-3-319-45930-1. ⟨10.1007/978-3-319-45931-8⟩
Books hal-01639612v1
Image document

The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs — An Empirical Experiment

Ahmad Sabouri
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.223-235, ⟨10.1007/978-3-319-45931-8_14⟩
Conference papers hal-01639611v1
Image document

Password Generators: Old Ideas and New

Fatma Al Maqbali , Chris J. Mitchell
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.245-253, ⟨10.1007/978-3-319-45931-8_16⟩
Conference papers hal-01639616v1
Image document

Towards Automatic Risk Analysis and Mitigation of Software Applications

Leonardo Regano , Daniele Canavese , Cataldo Basile , Alessio Viticchié , Antonio Lioy
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.120-135, ⟨10.1007/978-3-319-45931-8_8⟩
Conference papers hal-01639603v1
Image document

LAMP - Label-Based Access-Control for More Privacy in Online Social Networks

Leila Bahri , Barbara Carminati , Elena Ferrari , William Lucia
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.171-186, ⟨10.1007/978-3-319-45931-8_11⟩
Conference papers hal-01639607v1
Image document

An Implementation of a High Assurance Smart Meter Using Protected Module Architectures

Jan Tobias Mühlberg , Sara Cleemput , Mustafa A. Mustafa , Jo Van Bulck , Bart Preneel , et al.
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.53-69, ⟨10.1007/978-3-319-45931-8_4⟩
Conference papers hal-01639618v1