


default search action
10th FPS 2017: Nancy, France
- Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquín García-Alfaro

:
Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10723, Springer 2018, ISBN 978-3-319-75649-3
Access Control
- Johannes Blömer, Peter Günther, Volker Krummel, Nils Löken:

Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. 3-17 - Richard Gay, Jinwei Hu, Heiko Mantel, Sogol Mazaheri:

Relationship-Based Access Control for Resharing in Decentralized Online Social Networks. 18-34 - Alexey Rabin, Ehud Gudes:

Secure Protocol of ABAC Certificates Revocation and Delegation. 35-50
Formal Verification
- Elliott Blot, Jannik Dreier, Pascal Lafourcade

:
Formal Analysis of Combinations of Secure Protocols. 53-67 - Olivier Pereira, Florentin Rochet, Cyrille Wiedling:

Formal Analysis of the FIDO 1.x Protocol. 68-82 - Harry Halpin:

A Roadmap for High Assurance Cryptography. 83-91
Privacy
- Tushar Kanti Saha

, Takeshi Koshiba
:
Privacy-Preserving Equality Test Towards Big Data. 95-110 - Luigi Logrippo:

Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy. 111-123
Physical Security
- Maxime Puys

, Marie-Laure Potet, Abdelaziz Khaled:
Generation of Applicative Attacks Scenarios Against Industrial Systems. 127-143 - Mohamed Recem Boussaha, Raphaël Khoury, Sylvain Hallé

:
Monitoring of Security Properties Using BeepBeep. 160-169
Network Security, Encrypted DBs and Blockchain
- Konrad-Felix Krentz, Christoph Meinel, Hendrik Graupner

:
More Lightweight, yet Stronger 802.15.4 Security Through an Intra-layer Optimization. 173-188 - Shujie Cui, Muhammad Rizwan Asghar

, Steven D. Galbraith
, Giovanni Russello:
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage. 189-205 - Sergei Tikhomirov:

Ethereum: State of Knowledge and Research Perspectives. 206-221
Vulnerability Analysis and Deception Systems
- Nina Bindel

, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber:
Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics. 225-241 - Alberto Ferrante

, Miroslaw Malek, Fabio Martinelli, Francesco Mercaldo, Jelena Milosevic:
Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection. 242-258 - Daniel Fraunholz, Christoph Lipps, Marc Zimmermann, Simon Duque Antón

, Johannes Karl Martin Mueller, Hans Dieter Schotten:
Deception in Information Security: Legal Considerations in the Context of German and European Law. 259-274
Defence Against Attacks and Anonymity
- Sunny Raj

, Laura Pullum
, Arvind Ramanathan, Sumit Kumar Jha
:
SATYA : Defending Against Adversarial Attacks Using Statistical Hypothesis Testing. 277-292 - Gustavo Gonzalez Granadillo, Elena Doynikova

, Igor V. Kotenko
, Joaquín García-Alfaro
:
Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric. 293-302 - Khalid Shahbar, Nur Zincir-Heywood

:
Weighted Factors for Evaluating Anonymity. 303-318

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














