ICT Systems Security and Privacy Protection

31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings

Editors:

ISBN: 978-3-319-33629-9 (Print) 978-3-319-33630-5 (Online)

Table of contents (27 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XIII

  2. Cryptographic Protocols

    1. Front Matter

      Pages 1-1

    2. No Access

      Chapter and Conference Paper

      Pages 3-16

      Coercion-Resistant Proxy Voting

    3. No Access

      Chapter and Conference Paper

      Pages 17-31

      A Posteriori Openable Public Key Encryption

    4. No Access

      Chapter and Conference Paper

      Pages 32-46

      Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid

  3. Human Aspects of Security

    1. Front Matter

      Pages 47-47

    2. No Access

      Chapter and Conference Paper

      Pages 49-61

      Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research

    3. No Access

      Chapter and Conference Paper

      Pages 62-75

      Evaluating CVSS Base Score Using Vulnerability Rewards Programs

    4. No Access

      Chapter and Conference Paper

      Pages 76-87

      Defining Objectives for Preventing Cyberstalking

  4. Cyber Infrastructure

    1. Front Matter

      Pages 89-89

    2. No Access

      Chapter and Conference Paper

      Pages 91-104

      Using Process Invariants to Detect Cyber Attacks on a Water Treatment System

    3. No Access

      Chapter and Conference Paper

      Pages 105-118

      Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud

    4. No Access

      Chapter and Conference Paper

      Pages 119-132

      Software Defined Networking Reactive Stateful Firewall

  5. Phishing and Data Sharing

    1. Front Matter

      Pages 133-133

    2. No Access

      Chapter and Conference Paper

      Pages 135-149

      Teaching Phishing-Security: Which Way is Best?

    3. No Access

      Chapter and Conference Paper

      Pages 150-160

      On Gender Specific Perception of Data Sharing in Japan

    4. No Access

      Chapter and Conference Paper

      Pages 161-175

      TORPEDO: TOoltip-poweRed Phishing Email DetectiOn

  6. Social Networks

    1. Front Matter

      Pages 177-177

    2. No Access

      Chapter and Conference Paper

      Pages 179-193

      SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks

    3. No Access

      Chapter and Conference Paper

      Pages 194-208

      Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence

  7. Software Vulnerabilities

    1. Front Matter

      Pages 209-209

    2. No Access

      Chapter and Conference Paper

      Pages 211-226

      Automated Source Code Instrumentation for Verifying Potential Vulnerabilities

    3. No Access

      Chapter and Conference Paper

      Pages 227-242

      An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities

    4. No Access

      Chapter and Conference Paper

      Pages 243-258

      XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners

  8. TPM and Internet of Things

    1. Front Matter

      Pages 259-259

    2. No Access

      Chapter and Conference Paper

      Pages 261-275

      A Utility-Based Reputation Model for the Internet of Things

    3. No Access

      Chapter and Conference Paper

      Pages 276-289

      Advanced Remote Firmware Upgrades Using TPM 2.0

  9. Sidechannel Analysis

    1. Front Matter

      Pages 291-291

    2. No Access

      Chapter and Conference Paper

      Pages 293-307

      RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks

previous Page of 2