Skip to main content

Über dieses Buch

This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 21 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security.



Cryptography and Information Theory

2013 | OriginalPaper | Buchkapitel

MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption

Jie Li, Jianliang Zheng

2013 | OriginalPaper | Buchkapitel

Proofs of Retrievability via Fountain Code

Sumanta Sarkar, Reihaneh Safavi-Naini

2013 | OriginalPaper | Buchkapitel

MARC: Modified ARC4

Jianliang Zheng, Jie Li

2013 | OriginalPaper | Buchkapitel

Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements

Pawel Chwalinski, Roman Belavkin, Xiaochun Cheng

Key Management and Cryptographic Protocols

2013 | OriginalPaper | Buchkapitel

A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes

Khair Eddin Sabri, Ridha Khedri

2013 | OriginalPaper | Buchkapitel

Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities

Hadi Ahmadi, Reihaneh Safavi-Naini

2013 | OriginalPaper | Buchkapitel

COMPASS: Authenticated Group Key Agreement from Signcryption

Nick Mailloux, Ali Miri, Monica Nevins

Privacy and Trust

2013 | OriginalPaper | Buchkapitel

Classifying Online Social Network Users through the Social Graph

Cristina Pérez-Solà, Jordi Herrera-Joancomartí

2013 | OriginalPaper | Buchkapitel

A Formal Derivation of Composite Trust

Tim Muller, Patrick Schweitzer

2013 | OriginalPaper | Buchkapitel

IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability

Ahmad AlSa’deh, Hosnieh Rafiee, Christoph Meinel

Policies and Applications Security

2013 | OriginalPaper | Buchkapitel

Policy Administration in Tag-Based Authorization

Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone

2013 | OriginalPaper | Buchkapitel

Enabling Dynamic Security Policy in the Java Security Manager

Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens

2013 | OriginalPaper | Buchkapitel

A Novel Obfuscation: Class Hierarchy Flattening

Christophe Foket, Bjorn De Sutter, Bart Coppens, Koen De Bosschere

2013 | OriginalPaper | Buchkapitel

RESource: A Framework for Online Matching of Assembly with Open Source Code

Ashkan Rahimian, Philippe Charland, Stere Preda, Mourad Debbabi

2013 | OriginalPaper | Buchkapitel

Touchjacking Attacks on Web in Android, iOS, and Windows Phone

Tongbo Luo, Xing Jin, Ajai Ananthanarayanan, Wenliang Du

Network and Adaptive Security

2013 | OriginalPaper | Buchkapitel

Short-Term Linkable Group Signatures with Categorized Batch Verification

Lukas Malina, Jordi Castellà-Roca, Arnau Vives-Guasch, Jan Hajny

2013 | OriginalPaper | Buchkapitel

GHUMVEE: Efficient, Effective, and Flexible Replication

Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere

2013 | OriginalPaper | Buchkapitel

Extracting Attack Scenarios Using Intrusion Semantics

Sherif Saad, Issa Traore

2013 | OriginalPaper | Buchkapitel

On Securely Manipulating XML Data

Houari Mahfoud, Abdessamad Imine

2013 | OriginalPaper | Buchkapitel

Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks

Isaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi, Issa Traore

2013 | OriginalPaper | Buchkapitel

QoS Aware Adaptive Security Scheme for Video Streaming in MANETs

Tahsin Arafat Reza, Michel Barbeau

2013 | OriginalPaper | Buchkapitel

A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC

Colin O’Flynn, Zhizhang Chen

Short Papers

2013 | OriginalPaper | Buchkapitel

Towards Modelling Adaptive Attacker’s Behaviour

Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin

2013 | OriginalPaper | Buchkapitel

Scalable Deniable Group Key Establishment

Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona

2013 | OriginalPaper | Buchkapitel

Information-Theoretic Foundations of Differential Privacy

Darakhshan J. Mir


Weitere Informationen

Premium Partner

Neuer Inhalt

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.



Product Lifecycle Management im Konzernumfeld – Herausforderungen, Lösungsansätze und Handlungsempfehlungen

Für produzierende Unternehmen hat sich Product Lifecycle Management in den letzten Jahrzehnten in wachsendem Maße zu einem strategisch wichtigen Ansatz entwickelt. Forciert durch steigende Effektivitäts- und Effizienzanforderungen stellen viele Unternehmen ihre Product Lifecycle Management-Prozesse und -Informationssysteme auf den Prüfstand. Der vorliegende Beitrag beschreibt entlang eines etablierten Analyseframeworks Herausforderungen und Lösungsansätze im Product Lifecycle Management im Konzernumfeld.
Jetzt gratis downloaden!