IFIP TC6 Open Digital Library

6. WISTP 2012: Egham, UK

Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings

Ioannis G. Askoxylakis, Henrich Christopher Pöhls, Joachim Posegga

Springer, Lecture Notes in Computer Science 7322, ISBN: 978-3-642-30954-0



Recent Developments in Low-Level Software Security.

Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, Frank Piessens


Towards a C2I Platform for Combating the Cyber-Threat.

Paul Kearney


Veracity, Plausibility, and Reputation.

Dieter Gollmann



Another Fallen Hash-Based RFID Authentication Protocol.

Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi


Protocols (Short Papers)

HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network.

G. Kirubavathi Venkatesh, R. Anitha Nadarajan


How to Break EAP-MD5.

Fanbao Liu, Tao Xie



Privacy Preserving Social Network Publication on Bipartite Graphs.

Jian Zhou, Jiwu Jing, Ji Xiang, Lei Wang


Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications.

Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, Michaela Kauer


Privacy (Short Paper)

Privacy Preservation of User History Graph.

Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake


Policy and Access Control

HiPoLDS: A Security Policy Language for Distributed Systems.

Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira, Yves Roudier


ROAC: A Role-Oriented Access Control Model.

Nezar Nassr, Eric Steegmans


Multi-Party Computation

Optimal Parameters for Efficient Two-Party Computation Protocols.

Chaya Ganesh, C. Pandu Rangan


Assisting Server for Secure Multi-Party Computation.

Jens-Matthias Bohli, Wenting Li, Jan Seedorf


Cryptography (Short Papers)

An Efficient Lattice-Based Secret Sharing Construction.

Rachid El Bansarkhani, Mohammed Meziani


On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems.

Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger


Impossible Differential Cryptanalysis of Reduced-Round LBlock.

Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci


Mobile Security

Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices.

Johann Großschädl, Dan Page, Stefan Tillich


Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android.

Daniel Schreckling, Joachim Posegga, Johannes Köstler, Matthias Schaff