Skip to main content
  • Conference proceedings
  • © 2013

Security and Privacy Protection in Information Processing Systems

28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013, Proceedings

  • State-of-the-art research

  • Fast-track conference proceedings

  • Unique visibility

Conference proceedings info: SEC 2013.

Buying options

eBook USD 99.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-39218-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 149.00
Price excludes VAT (USA)
Hardcover Book USD 129.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (31 papers)

  1. Front Matter

  2. Malware

    1. Exploring Timeline-Based Malware Classification

      • Rafiqul Islam, Irfan Altas, Md. Saiful Islam
      Pages 1-13Open Access
    2. Screening Smartphone Applications Using Behavioral Signatures

      • Suyeon Lee, Jehyun Lee, Heejo Lee
      Pages 14-27Open Access
    3. Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention

      • Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mengmeng Ge
      Pages 28-41Open Access
  3. Authentication and Authorization

    1. Evolving a Secure Internet

      • William J. Caelli, Lam-For Kwok, Dennis Longley
      Pages 42-54Open Access
    2. Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones

      • Yuxin Meng, Wenjuan Li, Lam-For Kwok
      Pages 55-68Open Access
    3. Applying DAC Principles to the RDF Graph Data Model

      • Sabrina Kirrane, Alessandra Mileo, Stefan Decker
      Pages 69-82Open Access
    4. A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error

      • Thang Hoang, Deokjai Choi, Viet Vo, Anh Nguyen, Thuc Nguyen
      Pages 83-101Open Access
    5. A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

      • Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes
      Pages 102-110Open Access
  4. Network Security/ Cryptography

    1. Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation

      • Markus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig
      Pages 111-124Open Access
    2. Key Derivation Function: The SCKDF Scheme

      • Chai Wen Chuah, Edward Dawson, Leonie Simpson
      Pages 125-138Open Access
    3. Sustainable Pseudo-random Number Generator

      • Huafei Zhu, Wee-Siong Ng, See-Kiong Ng
      Pages 139-147Open Access
  5. Software Security

    1. Improving Mobile Device Security with Operating System-Level Virtualization

      • Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert
      Pages 148-161Open Access
    2. Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation

      • Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath
      Pages 162-175Open Access
    3. An Empirical Evaluation of the Android Security Framework

      • Alessandro Armando, Alessio Merlo, Luca Verderame
      Pages 176-189Open Access
    4. A Security Engineering Process Approach for the Future Development of Complex Aircraft Cabin Systems

      • Hartmut Hintze, Benjamin Wiegraefe, Ralf God
      Pages 190-202Open Access
    5. Mobile Device Encryption Systems

      • Peter Teufl, Thomas Zefferer, Christof Stromberger
      Pages 203-216Open Access
    6. Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation

      • Vrizlynn L. L. Thing, Zheng-Leong Chua
      Pages 217-230Open Access
    7. Program Transformation for Non-interference Verification on Programs with Pointers

      • Mounir Assaf, Julien Signoles, Frédéric Tronel, Éric Totel
      Pages 231-244Open Access
  6. Policy Compliance and Obligations

Other Volumes

  1. Security and Privacy Protection in Information Processing Systems

    28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings

About this book

This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on malware, authentication and authorization, network security/cryptography, software security, policy compliance and obligations, privacy protection, risk analysis and security metrics, social engineering, and security management/forensics.

Keywords

  • Web services
  • cloud computing
  • denial of service
  • network security
  • smartphones
  • algorithm analysis and problem complexity

Editors and Affiliations

  • The University of Auckland, Auckland, New Zealand

    Lech J. Janczewski

  • University of Otago, Dunedin, New Zealand

    Henry B. Wolfe

  • The University of Tulsa, Tulsa, USA

    Sujeet Shenoi

Bibliographic Information

Buying options

eBook USD 99.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-39218-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 149.00
Price excludes VAT (USA)
Hardcover Book USD 129.99
Price excludes VAT (USA)