default search action
NordSec 2013: Ilulissat, Greenland
- Hanne Riis Nielson, Dieter Gollmann:
Secure IT Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings. Lecture Notes in Computer Science 8208, Springer 2013, ISBN 978-3-642-41487-9
Cyber-Physical Systems
- Alessio Di Mauro, Xenofon Fafoutis, Sebastian Mödersheim, Nicola Dragoni:
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs. 1-16 - Roberto Vigo, Alessandro Bruni, Ender Yüksel:
Security Games for Cyber-Physical Systems. 17-32 - Willem Burgers, Roel Verdult, Marko C. J. D. van Eekelen:
Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials. 33-50
Security Policies
- Tero Hasu, Anya Helene Bagge, Magne Haveraaen:
Inferring Required Permissions for Statically Composed Programs. 51-66 - Mike Ter Louw, Phu H. Phung, Rohini Krishnamurti, Venkat N. Venkatakrishnan:
SafeScript: JavaScript Transformation for Policy Enforcement. 67-83
Information Flow
- Musard Balliu:
A Logic for Information Flow Analysis of Distributed Programs. 84-99 - Martin Pettai, Peeter Laud:
Dynamics and Secure Information Flow for a Higher-Order Pi-Calculus. 100-115 - Pablo Buiras, Alejandro Russo:
Lazy Programs Leak Secrets. 116-122
Security Experiences
- Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson:
High-Performance Qualified Digital Signatures for X-Road. 123-138 - Tigist Ayalew, Tigist Kidane, Bengt Carlsson:
Identification and Evaluation of Security Activities in Agile Projects. 139-153 - Marcin Nagy, N. Asokan, Jörg Ott:
PeerShare: A System Secure Distribution of Sensitive Data among Social Contacts. 154-165
Cyber-Physical Systems
- Marina Krotofil, Alvaro A. Cárdenas:
Resilience of Process Control Systems to Cyber-Physical Attacks. 166-182 - Fabian van den Broek, Ronny Wichers Schreur:
Femtocell Security in Theory and Practice. 183-198 - Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi:
Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques. 199-214
Web Security
- Thierry Sans, Iliano Cervesato, Soha Hussein:
Controlling Data Flow with a Policy-Based Programming Language for the Web. 215-230 - Bastian Braun, Christian v. Pollak, Joachim Posegga:
A Survey on Control-Flow Integrity Means in Web Application Frameworks. 231-246
Security Policies
- Dimiter Milushev, Dave Clarke:
Incremental Hyperproperty Model Checking via Games. 247-262 - Klara Stokes:
Graph k-Anonymity through k-Means and as Modular Decomposition. 263-278
Network Security
- Nicolae Paladi, Christian Gehrmann, Fredric Morenius:
Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds. 279-296 - Nabil Hachem, Joaquín García-Alfaro, Hervé Debar:
An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies. 297-312 - Ahto Buldas, Andres Kroonmaa, Risto Laanoja:
Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees. 313-320
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.