![]() |
Future Challenges in Security and Privacy for Academia and Industry 26th IFIP TC 11 International Information Security Conference, SEC 2011 Lucerne, Switzerland, June 7-9, 2011 |
|
||
---|---|---|
hal-01567593v1
Conference papers
Piracy Protection for Streaming Content in Home Networks 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.128-141, ⟨10.1007/978-3-642-21424-0_11⟩ |
||
hal-01567597v1
Conference papers
Generating Optimised and Formally Checked Packet Parsing Code 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.173-184, ⟨10.1007/978-3-642-21424-0_14⟩ |
||
hal-01567601v1
Conference papers
On Computing Enterprise IT Risk Metrics 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.271-280, ⟨10.1007/978-3-642-21424-0_22⟩ |
||
hal-01567603v1
Conference papers
A Case Study in Practical Security of Cable Networks 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.92-103, ⟨10.1007/978-3-642-21424-0_8⟩ |
||
hal-01567595v1
Conference papers
Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.116-127, ⟨10.1007/978-3-642-21424-0_10⟩ |
||
hal-01567605v1
Conference papers
Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report from the Insurance and Auditing Domain 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.259-270, ⟨10.1007/978-3-642-21424-0_21⟩ |
||
hal-01567584v1
Conference papers
Ceremony Analysis: Strengths and Weaknesses 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.104-115, ⟨10.1007/978-3-642-21424-0_9⟩ |
||
hal-01567587v1
Conference papers
Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.41-55, ⟨10.1007/978-3-642-21424-0_4⟩ |
||
hal-01567604v1
Conference papers
IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.317-325, ⟨10.1007/978-3-642-21424-0_26⟩ |
||
hal-01567586v1
Conference papers
Distributed Security Policy Conformance 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.210-222, ⟨10.1007/978-3-642-21424-0_17⟩ |
||
hal-01567594v1
Conference papers
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.223-234, ⟨10.1007/978-3-642-21424-0_18⟩ |
||
hal-01567596v1
Conference papers
Privacy-Enhanced Web-Based Event Scheduling with Majority Agreement 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.235-246, ⟨10.1007/978-3-642-21424-0_19⟩ |
||
hal-01567589v1
Conference papers
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.56-67, ⟨10.1007/978-3-642-21424-0_5⟩ |
||
hal-01567592v1
Conference papers
Organizational Power and Information Security Rule Compliance 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.185-196, ⟨10.1007/978-3-642-21424-0_15⟩ |
||
hal-01567602v1
Conference papers
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.247-258, ⟨10.1007/978-3-642-21424-0_20⟩ |
||
hal-01567606v1
Conference papers
TCP Ack Storm DoS Attacks 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.29-40, ⟨10.1007/978-3-642-21424-0_3⟩ |
||
hal-01567608v1
Conference papers
Extending LSCs for Behavioral Signature Modeling 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.293-304, ⟨10.1007/978-3-642-21424-0_24⟩ |
||
hal-00657971v1
Conference papers
Detecting illegal system calls using a data-oriented detection model 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩ |
||
hal-01567588v1
Conference papers
Patience, Persistence, and Faith: Evolving the Gold Standard in Privacy and Data Protection 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.1-16, ⟨10.1007/978-3-642-21424-0_1⟩ |
||
hal-01567590v1
Conference papers
Quantifying the Effect of Graphical Password Guidelines for Better Security 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.80-91, ⟨10.1007/978-3-642-21424-0_7⟩ |
||
hal-01567599v1
Conference papers
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.68-79, ⟨10.1007/978-3-642-21424-0_6⟩ |
||
hal-01567600v1
Conference papers
A Kolmogorov Complexity Approach for Measuring Attack Path Complexity 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.281-292, ⟨10.1007/978-3-642-21424-0_23⟩ |
||
hal-00606018v1
Conference papers
Delegation of Obligations and Responsibility 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.197-209, ⟨10.1007/978-3-642-21424-0_16⟩ |
||
hal-01567591v1
Conference papers
Retrofitting Security in COTS Software with Binary Rewriting 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.154-172, ⟨10.1007/978-3-642-21424-0_13⟩ |
||
hal-01567598v1
Conference papers
JITDefender: A Defense against JIT Spraying Attacks 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.142-153, ⟨10.1007/978-3-642-21424-0_12⟩ |
||
hal-01567607v1
Conference papers
iSAM: An iPhone Stealth Airborne Malware 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.17-28, ⟨10.1007/978-3-642-21424-0_2⟩ |
||
|