


default search action
17. ESORICS 2012: Pisa, Italy - DPM/SETOP
- Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State:

Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers. Lecture Notes in Computer Science 7731, Springer 2013, ISBN 978-3-642-35889-0
Data Privacy Management
- Panayiotis Kotzanikolaou

, Emmanouil Magkos, Nikolaos Petrakos, Christos Douligeris, Vassilios Chrissikopoulos:
Fair Anonymous Authentication for Location Based Services. 1-14 - Tuan Ta, John S. Baras:

Enhancing Privacy in LTE Paging System Using Physical Layer Identification. 15-28 - Xihui Chen, David Fonkwe, Jun Pang:

Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems. 29-42 - Mohammed Meziani, Rachid El Bansarkhani:

An Efficient and Secure Coding-Based Authenticated Encryption Scheme. 43-60 - Ronny Merkel, Matthias Pocs, Jana Dittmann, Claus Vielhauer:

Proposal of Non-invasive Fingerprint Age Determination to Improve Data Privacy Management in Police Work from a Legal Perspective Using the Example of Germany. 61-74 - Arnaud Casteigts, Marie-Hélène Chomienne, Louise Bouchard, Guy-Vincent Jourdan:

Differential Privacy in Tripartite Interaction: A Case Study with Linguistic Minorities in Canada. 75-88 - Carlo Blundo

, Emiliano De Cristofaro, Paolo Gasti:
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity. 89-103 - Sébastien Gambs, Julien Lolive:

SlopPy: Slope One with Privacy. 104-117 - Florian Kammüller:

A Semi-lattice Model for Multi-lateral Security. 118-132 - Ilaria Matteucci

, Paolo Mori
, Marinella Petrocchi:
Prioritized Execution of Privacy Policies. 133-145 - Elisa Costante, Jerry den Hartog, Milan Petkovic:

What Websites Know About You. 146-159 - Peng Yu, Jakub Sendor, Gabriel Serme, Anderson Santana de Oliveira:

Automating Privacy Enforcement in Cloud Platforms. 160-173 - Kuzman Katkalov, Peter Fischer, Kurt Stenzel, Nina Moebius, Wolfgang Reif

:
Evaluation of Jif and Joana as Information Flow Analyzers in a Model-Driven Approach. 174-186
Autonomous and Spontaneous Security
- Nizar Kheir:

Analyzing HTTP User Agent Anomalies for Malware Detection. 187-200 - Mohammad Ali Hadavi, Ernesto Damiani

, Rasool Jalili, Stelvio Cimato
, Zeinab Ganjei:
AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing. 201-216 - Matteo Maria Casalino, Henrik Plate, Serena Elisa Ponta:

Configuration Assessment as a Service. 217-226 - William M. Fitzgerald, Ultan Neville, Simon N. Foley

:
Automated Smartphone Security Configuration. 227-242 - Denise Dudek:

On the Detectability of Weak DoS Attacks in Wireless Sensor Networks. 243-257 - Amrita Ghosal

, Sanjib Sur, DasBit Sipra
:
μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks. 258-273 - David Goergen, Thibault Cholez

, Jérôme François
, Thomas Engel:
Security Monitoring for Content-Centric Networking. 274-286 - Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Stephane Morucci:

Towards Session-Aware RBAC Delegation: Function Switch. 287-302 - Wihem Arsac, Annett Laube, Henrik Plate:

Policy Chain for Securing Service Oriented Architectures. 303-317 - Wael Kanoun, Layal Samarji, Nora Cuppens-Boulahia, Samuel Dubus, Frédéric Cuppens:

Towards a Temporal Response Taxonomy. 318-331

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














