


default search action
DPM/QASA@ESORICS 2016: Heraklion, Crete, Greece
- Giovanni Livraga, Vicenç Torra

, Alessandro Aldini
, Fabio Martinelli, Neeraj Suri
:
Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Lecture Notes in Computer Science 9963, Springer 2016, ISBN 978-3-319-47071-9
Quantitative Aspects in Security Assurance
- Dayana Spagnuelo

, Cesare Bartolini, Gabriele Lenzini
:
Metrics for Transparency. 3-18 - Maarten van Wieren, Christian Doerr, Vivian Jacobs, Wolter Pieters:

Understanding Bifurcation of Slow Versus Fast Cyber-Attackers. 19-33 - Ilaria Matteucci

, Francesco Santini
:
Decomposing Global Quantitative Properties into Local Ones. 34-50 - Alexander Weigl

:
Efficient SAT-Based Pre-image Enumeration for Quantitative Information Flow in Programs. 51-58
Privacy Protection
- Joachim Biskup, Ralf Menzel, Jaouad Zarouali:

Controlled Management of Confidentiality-Preserving Relational Interactions. 61-77 - Álvaro García-Recuero

, Jeffrey Burdges
, Christian Grothoff:
Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks. 78-93 - Yang Liu

, Andrew Simpson
:
Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis. 94-110
Identification, Authentication, and Authorization
- Ghassane Amchyaa, Julien Bringer, Roch Lescuyer:

Searchable Encryption for Biometric Identification Revisited. 113-129 - Ahmad Sabouri:

On the User Acceptance of Privacy-Preserving Attribute-Based Credentials - A Qualitative Study. 130-145 - Yousra Javed, Mohamed Shehab

:
Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook. 146-162
Security and Secure Applications
- Peeter Laud, Alisa Pankova:

Securing Multiparty Protocols Against the Exposure of Data to Honest Parties. 165-180 - Hiroki Imabayashi, Yu Ishimaki, Akira Umayabara, Hiroki Sato, Hayato Yamana

:
Secure Frequent Pattern Mining by Fully Homomorphic Encryption with Ciphertext Packing. 181-195 - Florian Kammüller:

Isabelle Modelchecking for Insider Threats. 196-210
DPM Short Papers
- Martin Schanzenbach

, Christian Banse
:
Managing and Presenting User Attributes over a Decentralized Secure Name System. 213-220 - Sourya Joyee De, Daniel Le Métayer:

PRIAM: A Privacy Risk Analysis Methodology. 221-229 - Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma:

A Study from the Data Anonymization Competition Pwscup 2015. 230-237 - Florian Kammüller:

Refactoring Preserves Security. 238-245

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














