ICT Systems Security and Privacy Protection

31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings

  • Jaap-Henk Hoepman
  • Stefan Katzenbeisser

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 471)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Cryptographic Protocols

    1. Front Matter
      Pages 1-1
    2. Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer
      Pages 3-16
    3. Xavier Bultel, Pascal Lafourcade
      Pages 17-31
    4. Sérgio Câmara, Dhananjay Anand, Victoria Pillitteri, Luiz Carmo
      Pages 32-46
  3. Human Aspects of Security

    1. Front Matter
      Pages 47-47
    2. Awad Younis, Yashwant K. Malaiya, Indrajit Ray
      Pages 62-75
    3. Gurpreet Dhillon, Chandrashekar Challa, Kane Smith
      Pages 76-87
  4. Cyber Infrastructure

    1. Front Matter
      Pages 89-89
    2. Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey
      Pages 105-118
    3. Salaheddine Zerkane, David Espes, Philippe Le Parc, Frederic Cuppens
      Pages 119-132
  5. Phishing and Data Sharing

    1. Front Matter
      Pages 133-133
    2. Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack et al.
      Pages 135-149
    3. Markus Tschersich, Shinsaku Kiyomoto, Sebastian Pape, Toru Nakamura, Gökhan Bal, Haruo Takasaki et al.
      Pages 150-160
    4. Melanie Volkamer, Karen Renaud, Benjamin Reinheimer
      Pages 161-175
  6. Social Networks

    1. Front Matter
      Pages 177-177
    2. Dieudonné Mulamba, Indrajit Ray, Indrakshi Ray
      Pages 179-193
    3. Iraklis Symeonidis, Fatemeh Shirazi, Gergely Biczók, Cristina Pérez-Solà, Bart Preneel
      Pages 194-208

About these proceedings


This book constitutes the refereed proceedings of the 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2016, held in Ghent, Belgium, in May/June 2016. The 27 revised full papers presented were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on cryptographic protocols, human aspects of security, cyber infrastructure, social networks, software vulnerabilities, TPM and internet of things, sidechannel analysis, software security, and privacy.


access control authentication cloud security computer crime cryptography encryption information security internet network security privacy privacy protection public key cryptography reputation security systems security policy social networks software security trust

Editors and affiliations

  • Jaap-Henk Hoepman
    • 1
  • Stefan Katzenbeisser
    • 2
  1. 1.Instit. Computing & Information SciencesRadboud University NijmegenNijmegenThe Netherlands
  2. 2.Security Engineering GroupTechnische Universität DarmstadtDarmstadtGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-33630-5
  • Copyright Information IFIP International Federation for Information Processing 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-33629-9
  • Online ISBN 978-3-319-33630-5
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • About this book