default search action
SEC 2013: Auckland, New Zealand
- Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi:
Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings. IFIP Advances in Information and Communication Technology 405, Springer 2013, ISBN 978-3-642-39217-7
Malware
- Md. Rafiqul Islam, Irfan Altas, Md. Saiful Islam:
Exploring Timeline-Based Malware Classification. 1-13 - Suyeon Lee, Jehyun Lee, Heejo Lee:
Screening Smartphone Applications Using Behavioral Signatures. 14-27 - Theodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mengmeng Ge:
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention. 28-41
Authentication and Authorization
- William J. Caelli, Lam-for Kwok, Dennis Longley:
Evolving a Secure Internet. 42-54 - Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones. 55-68 - Sabrina Kirrane, Alessandra Mileo, Stefan Decker:
Applying DAC Principles to the RDF Graph Data Model. 69-82 - Thang Hoang, Deokjai Choi, Quang Viet Vo, Huy Anh Nguyen, Thuc Dinh Nguyen:
A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error. 83-101 - Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags. 102-110
Network Security/ Cryptography
- Markus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig:
Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation. 111-124 - Chuah Chai Wen, Ed Dawson, Leonie Simpson:
Key Derivation Function: The SCKDF Scheme. 125-138 - Huafei Zhu, Wee Siong Ng, See-Kiong Ng:
Sustainable Pseudo-random Number Generator. 139-147
Software Security
- Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert:
Improving Mobile Device Security with Operating System-Level Virtualization. 148-161 - Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath:
Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation. 162-175 - Alessandro Armando, Alessio Merlo, Luca Verderame:
An Empirical Evaluation of the Android Security Framework. 176-189 - Hartmut Hintze, Benjamin Wiegraefe, Ralf God:
A Security Engineering Process Approach for the Future Development of Complex Aircraft Cabin Systems. 190-202 - Peter Teufl, Thomas Zefferer, Christof Stromberger:
Mobile Device Encryption Systems. 203-216 - Vrizlynn L. L. Thing, Zheng Leong Chua:
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation. 217-230 - Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel:
Program Transformation for Non-interference Verification on Programs with Pointers. 231-244
Policy Compliance and Obligations
- Ezzat Alqurashi, Gary B. Wills, Lester Gilbert:
A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System. 245-256 - Teodor Sommestad, Jonas Hallberg:
A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance. 257-271
Privacy Protection
- Padmanabhan Krishnan, Kostyantyn Vorobyov:
Enforcement of Privacy Requirements. 272-285 - Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar R. Weippl:
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. 286-299 - Bernd Zwattendorfer, Daniel Slamanig:
On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud. 300-314
Risk Analysis and Security Metrics
- Lisa Rajbhandari, Einar Snekkenes:
Using the Conflicting Incentives Risk Analysis Method. 315-329 - Jin B. Hong, Dong Seong Kim:
Performance Analysis of Scalable Attack Representation Models. 330-343 - Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, Vivek Shandilya:
ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy. 344-365
Social Engineering
- Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails. 366-378 - Wayne D. Kearney, Hennie A. Kruger:
Phishing and Organisational Learning. 379-390 - Lotfi Ben Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat K. Bhargava, Mohd Murtadha Mohamad:
A Case for Societal Digital Security Culture. 391-404
Security Management/Forensic
- Gurpreet Dhillon, Romilla Chowdhuri, Filipe de Sá-Soares:
Secure Outsourcing: An Investigation of the Fit between Clients and Providers. 405-418 - Thomas Laurenson:
Performance Analysis of File Carving Tools. 419-433
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.