Skip to Main content Skip to Navigation


...
hal-01567593v1  Conference papers
Hongxia JinJeffrey Lotspiech. Piracy Protection for Streaming Content in Home Networks
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.128-141, ⟨10.1007/978-3-642-21424-0_11⟩
...
hal-01567597v1  Conference papers
Sebastien MondetIon AlberdiThomas Plagemann. Generating Optimised and Formally Checked Packet Parsing Code
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.173-184, ⟨10.1007/978-3-642-21424-0_14⟩
...
hal-01567601v1  Conference papers
Sandeep BhattWilliam HornePrasad Rao. On Computing Enterprise IT Risk Metrics
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.271-280, ⟨10.1007/978-3-642-21424-0_22⟩
...
hal-01567603v1  Conference papers
Amir AlsbihFelix C. FreilingChristian Schindelhauer. A Case Study in Practical Security of Cable Networks
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.92-103, ⟨10.1007/978-3-642-21424-0_8⟩
...
hal-01567595v1  Conference papers
Reto KoenigRolf HaenniStephan Fischli. Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.116-127, ⟨10.1007/978-3-642-21424-0_10⟩
...
hal-01567584v1  Conference papers
Kenneth RadkeColin BoydJuan Gonzalez NietoMargot Brereton. Ceremony Analysis: Strengths and Weaknesses
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.104-115, ⟨10.1007/978-3-642-21424-0_9⟩
...
hal-01567587v1  Conference papers
Felix C. FreilingSebastian Schinzel. Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.41-55, ⟨10.1007/978-3-642-21424-0_4⟩
...
hal-01567604v1  Conference papers
Kai RannenbergSh SolmsLeon Strous. IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.317-325, ⟨10.1007/978-3-642-21424-0_26⟩
...
hal-01567586v1  Conference papers
Mirko MontanariEllick ChanKevin LarsonWucherl yooRoy H. Campbell. Distributed Security Policy Conformance
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.210-222, ⟨10.1007/978-3-642-21424-0_17⟩
...
hal-01567594v1  Conference papers
Hiroaki KikuchiDaisuke KagawaAnirban BasuKazuhiko IshiiMasayuki Terada et al.  Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.223-234, ⟨10.1007/978-3-642-21424-0_18⟩
...
hal-01567596v1  Conference papers
Benjamin Kellermann. Privacy-Enhanced Web-Based Event Scheduling with Majority Agreement
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.235-246, ⟨10.1007/978-3-642-21424-0_19⟩
...
hal-01567589v1  Conference papers
Paul BaecherNiklas BüscherMarc FischlinBenjamin Milde. Breaking reCAPTCHA: A Holistic Approach via Shape Recognition
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.56-67, ⟨10.1007/978-3-642-21424-0_5⟩
...
hal-01567592v1  Conference papers
Ella KolkowskaGurpreet Dhillon. Organizational Power and Information Security Rule Compliance
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.185-196, ⟨10.1007/978-3-642-21424-0_15⟩
...
hal-01567602v1  Conference papers
Ge Zhang. Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.247-258, ⟨10.1007/978-3-642-21424-0_20⟩
...
hal-01567606v1  Conference papers
Raz AbramovAmir Herzberg. TCP Ack Storm DoS Attacks
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.29-40, ⟨10.1007/978-3-642-21424-0_3⟩
...
hal-01567608v1  Conference papers
Sven PatzinaLars PatzinaAndy Schürr. Extending LSCs for Behavioral Signature Modeling
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.293-304, ⟨10.1007/978-3-642-21424-0_24⟩
...
hal-00657971v1  Conference papers
Jonathan-Christofer DemayFrédéric MajorczykEric TotelFrédéric Tronel. Detecting illegal system calls using a data-oriented detection model
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩
...
hal-01567588v1  Conference papers
Ann Cavoukian. Patience, Persistence, and Faith: Evolving the Gold Standard in Privacy and Data Protection
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.1-16, ⟨10.1007/978-3-642-21424-0_1⟩
...
hal-01567590v1  Conference papers
Mohd JaliSteven FurnellPaul Dowland. Quantifying the Effect of Graphical Password Guidelines for Better Security
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.80-91, ⟨10.1007/978-3-642-21424-0_7⟩
...
hal-01567599v1  Conference papers
Alessandro ArmandoRoberto CarboneLuca CompagnaJorge CuellarGiancarlo Pellegrino et al.  From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.68-79, ⟨10.1007/978-3-642-21424-0_6⟩
...
hal-01567600v1  Conference papers
Nwokedi IdikaBharat Bhargava. A Kolmogorov Complexity Approach for Measuring Attack Path Complexity
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.281-292, ⟨10.1007/978-3-642-21424-0_23⟩
...
hal-00606018v1  Conference papers
Meriam Ben GhorbelFrédéric CuppensNora Cuppens-BoulahiaDaniel Le MétayerGuillaume Piolle. Delegation of Obligations and Responsibility
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.197-209, ⟨10.1007/978-3-642-21424-0_16⟩
...
hal-01567591v1  Conference papers
Pádraig O’sullivanKapil AnandAparna KothaMatthew SmithsonRajeev Barua et al.  Retrofitting Security in COTS Software with Binary Rewriting
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.154-172, ⟨10.1007/978-3-642-21424-0_13⟩
...
hal-01567598v1  Conference papers
Ping Chenyi FangBing MaoLi Xie. JITDefender: A Defense against JIT Spraying Attacks
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.142-153, ⟨10.1007/978-3-642-21424-0_12⟩
...
hal-01567607v1  Conference papers
Dimitrios DamopoulosGeorgios KambourakisStefanos Gritzalis. iSAM: An iPhone Stealth Airborne Malware
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.17-28, ⟨10.1007/978-3-642-21424-0_2⟩