default search action
8. FPS 2015: Clermont-Ferrand, France
- Joaquín García-Alfaro, Evangelos Kranakis, Guillaume Bonfante:
Foundations and Practice of Security - 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9482, Springer 2016, ISBN 978-3-319-30302-4
Keynote Talks
- Evangelos Kranakis, Danny Krizanc:
Optimization Problems in Infrastructure Security. 3-13 - Geoffroy Couteau, Thomas Peters, David Pointcheval:
Secure Distributed Computation on Private Inputs. 14-26
RFID, Sensors and Secure Computation
- Agnès Brelurut, David Gérault, Pascal Lafourcade:
Survey of Distance Bounding Protocols and Threats. 29-49 - Pascal Bissig, Philipp Brandes, Jonas Passerini, Roger Wattenhofer:
Inferring Touch from Motion in Real World Data. 50-65 - Toomas Krips, Jan Willemson:
Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation. 66-82
Security Policies and Biometrics
- Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Security Mechanisms Planning to Enforce Security Policies. 85-101 - Raphaël Khoury, Sylvain Hallé:
Runtime Enforcement with Partial Control. 102-116 - Masaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada, Takashi Shinzaki, Takeshi Koshiba:
Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes. 117-133
Evaluation of Protocols and Obfuscation Security
- Pascal Lafourcade, Maxime Puys:
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties. 137-155 - Paolo Modesti:
AnBx: Automatic Generation and Verification of Security Protocols Implementations. 156-173 - Rabih Mohsen, Alexandre Miranda Pinto:
Evaluating Obfuscation Security: A Quantitative Approach. 174-192
Spam Emails, Botnets and Malware
- Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli:
Fast and Effective Clustering of Spam Emails Based on Structural Similarity. 195-211 - Fariba Haddadi, Nur Zincir-Heywood:
A Closer Look at the HTTP and P2P Based Botnets from a Detector's Perspective. 212-228 - Minh Hai Nguyen, Mizuhito Ogawa, Quan Thanh Tho:
Obfuscation Code Localization Based on CFG Generation of Malware. 229-247
Short Papers
- Sylvain Hallé, Raphaël Khoury:
Runtime Monitoring of Stream Logic Formulae. 251-258 - Fabio Bellini, Roberto Chiodi, Isabella Mastroeni:
MIME: A Formal Approach to (Android) Emulation Malware Analysis. 259-267 - Erik Bergström, Rose-Mharie Åhlfeldt:
Information Classification Enablers. 268-276 - Meriam Ben-Ghorbel-Talbi, François Lesueur, Gaetan Perrin:
Information Flow Control on a Multi-paradigm Web Application for SQL Injection Prevention. 277-285 - Tim Waage, Ramaninder Singh Jhajj, Lena Wiese:
Searchable Encryption in Apache Cassandra. 286-293 - François Gagnon, Marc-Antoine Ferland, Marc-Antoine Fortier, Simon Desloges, Jonathan Ouellet, Catherine Boileau:
AndroSSL: A Platform to Test Android Applications Connection Security. 294-302 - Adrian Antunez-Veas, Guillermo Navarro-Arribas:
Onion Routing in Deterministic Delay Tolerant Networks. 303-310 - Guangye Sui, Mohamed Mejri:
Security Enforcement by Rewriting: An Algebraic Approach. 311-321
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.