© 2018

Foundations and Practice of Security

10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers

  • Abdessamad Imine
  • José M. Fernandez
  • Jean-Yves Marion
  • Luigi Logrippo
  • Joaquin Garcia-Alfaro
Conference proceedings FPS 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10723)

Also part of the Security and Cryptology book sub series (LNSC, volume 10723)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Access Control

    1. Front Matter
      Pages 1-1
    2. Johannes Blömer, Peter Günther, Volker Krummel, Nils Löken
      Pages 3-17
    3. Richard Gay, Jinwei Hu, Heiko Mantel, Sogol Mazaheri
      Pages 18-34
  3. Formal Verification

    1. Front Matter
      Pages 51-51
    2. Elliott Blot, Jannik Dreier, Pascal Lafourcade
      Pages 53-67
    3. Olivier Pereira, Florentin Rochet, Cyrille Wiedling
      Pages 68-82
  4. Privacy

  5. Physical Security

    1. Front Matter
      Pages 125-125
    2. Maxime Puys, Marie-Laure Potet, Abdelaziz Khaled
      Pages 127-143
    3. Julio Navarro, Véronique Legrand, Sofiane Lagraa, Jérôme François, Abdelkader Lahmadi, Giulia De Santis et al.
      Pages 144-159
    4. Mohamed Recem Boussaha, Raphaël Khoury, Sylvain Hallé
      Pages 160-169
  6. Network Security, Encrypted DBs and Blockchain

    1. Front Matter
      Pages 171-171
    2. Konrad-Felix Krentz, Christoph Meinel, Hendrik Graupner
      Pages 173-188
    3. Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello
      Pages 189-205

About these proceedings


This book constitutes revised selected papers from the 10th International Symposium on Foundations and Practice of Security, FPS 2017, held in Nancy, France in October 2017.

The 20 papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers were organized in topical sections named: access control; formal verification; privacy; physical security; network security, encrypted DBs and blockchain; vulnerability analysis and deception systems; and defence against attacks and anonymity. 


access control artificial intelligence authentication computer crime computer networks computer operating systems cryptography data privacy data security encryption graph theory internet privacy semantics telecommunication networks intrusion detection network security

Editors and affiliations

  1. 1.University of LorraineVillers-lès-NancyFrance
  2. 2.Polytechnique de MontréalMontrealCanada
  3. 3.LORIAVandœuvre-lès-NancyFrance
  4. 4.Université du Québec en OutaouaisGatineauCanada
  5. 5.Télécom SudParisEvry CedexFrance

Bibliographic information