Data Privacy Management and Autonomous Spontaneous Security

8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers

ISBN: 978-3-642-54567-2 (Print) 978-3-642-54568-9 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xvii

  2. Keynote Address

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-13

      Quantifying and Measuring Anonymity

  3. Data Privacy Management

    1. Front Matter

      Pages 15-15

    2. No Access

      Book Chapter

      Pages 17-33

      Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones

    3. No Access

      Book Chapter

      Pages 34-50

      Practical Packing Method in Somewhat Homomorphic Encryption

    4. No Access

      Book Chapter

      Pages 51-65

      Collaborative and Privacy-Aware Sensing for Observing Urban Movement Patterns

    5. No Access

      Book Chapter

      Pages 66-82

      Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting

    6. No Access

      Book Chapter

      Pages 83-99

      Privacy Analysis of a Hidden Friendship Protocol

    7. No Access

      Book Chapter

      Pages 100-113

      Anonymous and Transferable Electronic Ticketing Scheme

    8. No Access

      Book Chapter

      Pages 114-132

      Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model

    9. No Access

      Book Chapter

      Pages 133-147

      Privacy-Preserving Processing of Raw Genomic Data

    10. No Access

      Book Chapter

      Pages 148-161

      Using Search Results to Microaggregate Query Logs Semantically

    11. No Access

      Book Chapter

      Pages 162-177

      Legal Issues About Metadata Data Privacy vs Information Security

    12. No Access

      Book Chapter

      Pages 178-193

      Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model

    13. No Access

      Book Chapter

      Pages 194-212

      Differentially Private Smart Metering with Battery Recharging

    14. No Access

      Book Chapter

      Pages 213-231

      AppGuard – Fine-Grained Policy Enforcement for Untrusted Android Applications

  4. Autonomous and Spontaneous Security

    1. Front Matter

      Pages 233-233

    2. No Access

      Book Chapter

      Pages 235-249

      Reference Monitors for Security and Interoperability in OAuth 2.0

    3. No Access

      Book Chapter

      Pages 250-267

      Remote Biometrics for Robust Persistent Authentication

    4. No Access

      Book Chapter

      Pages 268-283

      Classifying Android Malware through Subgraph Mining

    5. No Access

      Book Chapter

      Pages 284-299

      Introducing Probabilities in Contract-Based Approaches for Mobile Application Security

    6. No Access

      Book Chapter

      Pages 300-315

      Advanced Detection Tool for PDF Threats

    7. No Access

      Book Chapter

      Pages 316-332

      Enforcing Input Validation through Aspect Oriented Programming

previous Page of 2