


default search action
STM 2017: Oslo, Norway
- Giovanni Livraga, Chris J. Mitchell:
Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings. Lecture Notes in Computer Science 10547, Springer 2017, ISBN 978-3-319-68062-0
Cryptosystems and Applied Cryptography
- Kazuto Ogawa, Sakurako Tamura, Goichiro Hanaoka:
Key Management for Versatile Pay-TV Services. 3-18 - Daniel Homann
, Christian Göge, Lena Wiese
:
Dynamic Similarity Search over Encrypted Data with Low Leakage. 19-35 - Papa B. Seye, Augustin P. Sarr:
Enhanced Modelling of Authenticated Key Exchange Security. 36-52
Software Security and Risk Management
- Job Noorman, Jan Tobias Mühlberg
, Frank Piessens:
Authentic Execution of Distributed Event-Driven Applications with a Small TCB. 55-71 - William Dash, Matthew J. Craven
:
Exploring Botnet Evolution via Multidimensional Models and Visualisation. 72-88 - Per Håkon Meland, Inger Anne Tøndel, Marie Elisabeth Gaup Moe
, Fredrik Seehusen:
Facing Uncertainty in Cyber Insurance Policies. 89-100
Authorization
- Hiroaki Kikuchi, Koichi Niihara, Michihiro Yamada:
How Much is Risk Increased by Sharing Credential in Group? 103-117 - Giacomo Giorgi
, Antonio La Marra, Fabio Martinelli, Paolo Mori
, Andrea Saracino
:
Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV. 118-133 - Audun Jøsang
:
A Consistent Definition of Authorization. 134-144
Security Vulnerabilities and Protocols
- Jorden Whitefield
, Liqun Chen
, Frank Kargl, Andrew Paverd
, Steve A. Schneider
, Helen Treharne
, Stephan Wesemeyer
:
Formal Analysis of V2X Revocation Protocols. 147-163 - Olga Gadyatskaya, Ravi Jhawar, Sjouke Mauw, Rolando Trujillo-Rasua
, Tim A. C. Willemse:
Refinement-Aware Generation of Attack Trees. 164-179 - László Erdödi, Audun Jøsang
:
Exploit Prevention, Quo Vadis? 180-190
Secure Systems
- Kalonji Kalala, Tao Feng, Iluju Kiringa:
EigenTrust for Hierarchically Structured Chord. 203-212 - Tim Grube, Markus Thummerer, Jörg Daubert, Max Mühlhäuser:
Cover Traffic: A Trade of Anonymity and Efficiency. 213-223 - Luca Arnaboldi
, Charles Morisset:
Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems. 224-233

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
