


default search action
SEC 2011: Lucerne, Switzerland
- Jan Camenisch, Simone Fischer-Hübner, Yuko Murayama, Armand Portmann, Carlos Rieder:

Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings. IFIP Advances in Information and Communication Technology 354, Springer 2011, ISBN 978-3-642-21423-3
Kristian Beckman Award Keynote
- Ann Cavoukian:

Patience, Persistence, and Faith: Evolving the Gold Standard in Privacy and Data Protection. 1-16
Malware, Information Flow and DoS Attacks
- Dimitrios Damopoulos, Georgios Kambourakis

, Stefanos Gritzalis
:
iSAM: An iPhone Stealth Airborne Malware. 17-28 - Raz Abramov, Amir Herzberg

:
TCP Ack Storm DoS Attacks. 29-40 - Felix C. Freiling, Sebastian Schinzel:

Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. 41-55
Authentication
- Paul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde:

Breaking reCAPTCHA: A Holistic Approach via Shape Recognition. 56-67 - Alessandro Armando

, Roberto Carbone
, Luca Compagna, Jorge Cuéllar, Giancarlo Pellegrino
, Alessandro Sorniotti:
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? 68-79 - Mohd Zalisham Jali

, Steven Furnell
, Paul Dowland
:
Quantifying the Effect of Graphical Password Guidelines for Better Security. 80-91
Network Security and Security Protocols
- Amir Alsbih, Felix C. Freiling, Christian Schindelhauer:

A Case Study in Practical Security of Cable Networks. 92-103 - Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton

:
Ceremony Analysis: Strengths and Weaknesses. 104-115 - Reto E. Koenig, Rolf Haenni, Stephan Fischli:

Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes. 116-127 - Hongxia Jin, Jeffrey B. Lotspiech:

Piracy Protection for Streaming Content in Home Networks. 128-141
Software Security
- Ping Chen, Yi Fang, Bing Mao, Li Xie:

JITDefender: A Defense against JIT Spraying Attacks. 142-153 - Pádraig O'Sullivan, Kapil Anand, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis:

Retrofitting Security in COTS Software with Binary Rewriting. 154-172 - Sebastien Mondet, Ion Alberdi, Thomas Plagemann:

Generating Optimised and Formally Checked Packet Parsing Code. 173-184
Policy Compliance and Obligations
- Ella Kolkowska, Gurpreet Dhillon

:
Organizational Power and Information Security Rule Compliance. 185-196 - Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Daniel Le Métayer, Guillaume Piolle:

Delegation of Obligations and Responsibility. 197-209 - Mirko Montanari, Ellick Chan, Kevin Larson, Wucherl Yoo

, Roy H. Campbell:
Distributed Security Policy Conformance. 210-222
Privacy Attacks and Privacy-Enhancing Technologies
- Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada

, Sadayuki Hongo:
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets. 223-234 - Benjamin Kellermann:

Privacy-Enhanced Web-Based Event Scheduling with Majority Agreement. 235-246 - Ge Zhang:

Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users. 247-258
Risk Analysis and Security Metrics
- Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh:

Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain. 259-270 - Sandeep N. Bhatt, William G. Horne, Prasad Rao:

On Computing Enterprise IT Risk Metrics. 271-280 - Nwokedi C. Idika, Bharat K. Bhargava:

A Kolmogorov Complexity Approach for Measuring Attack Path Complexity. 281-292
Intrusion Detection
- Sven Patzina, Lars Patzina, Andy Schürr:

Extending LSCs for Behavioral Signature Modeling. 293-304 - Jonathan-Christofer Demay, Frédéric Majorczyk, Eric Totel, Frédéric Tronel

:
Detecting Illegal System Calls Using a Data-Oriented Detection Model. 305-316
Appendix
- Kai Rannenberg, S. H. (Basie) von Solms, Leon Strous:

IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems. 317-325

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














