


default search action
11th FPS 2018: Montreal, QC, Canada
- Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, Joaquín García-Alfaro

:
Foundations and Practice of Security - 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11358, Springer 2019, ISBN 978-3-030-18418-6
Invited Papers
- Guang Gong

:
Securing Internet-of-Things. 3-16 - Sébastien Gambs:

Privacy and Ethical Challenges in Big Data. 17-26
Mobile Security
- Tobias Hamann, Heiko Mantel:

Decentralized Dynamic Security Enforcement for Mobile Applications with CliSeAuDroid. 29-45 - David Bissessar, Maryam Hezaveh, Fayzah Alshammari, Carlisle Adams:

Mobile Travel Credentials. 46-58
Cloud Security and Big Data
- Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi

:
Cloud Security Auditing: Major Approaches and Existing Challenges. 61-77 - Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye:

Secure Joins with MapReduce. 78-94 - Aniss Chohra, Mourad Debbabi

, Paria Shirani
:
Daedalus: Network Anomaly Detection on IDS Stream Logs. 95-111
IoT Security
- Luigi Logrippo, Abdelouadoud Stambouli:

Configuring Data Flows in the Internet of Things for Security and Privacy Requirements. 115-130 - Tahir Ahmad

, Silvio Ranise
:
Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper). 131-139
Software Security, Malware Analysis, and Vulnerability Detection
- Erick Eduardo Bernal Martinez, Bella Oh, Feng Li, Xiao Luo:

Evading Deep Neural Network and Random Forest Classifiers by Generating Adversarial Samples. 143-155 - Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet:

Protection of Systems Against Fuzzing Attacks. 156-172 - Yuri Gil Dantas, Tobias Hamann, Heiko Mantel:

A Comparative Study Across Static and Dynamic Side-Channel Countermeasures. 173-189
Cryptography
- Hibiki Ono, Yoshifumi Manabe:

Card-Based Cryptographic Protocols with the Minimum Number of Cards Using Private Operations. 193-207 - Giovanni Di Crescenzo:

Cryptographic Formula Obfuscation. 208-224 - Onur Duman

, Amr M. Youssef:
Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna. 225-240
Cyber Physical Security and Hardware Security
- Sébanjila Kevin Bukasa, Ludovic Claudepierre, Ronan Lashermes, Jean-Louis Lanet:

When Fault Injection Collides with Hardware Complexity. 243-256 - Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Joaquín García-Alfaro

:
A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper). 257-264
Access Control
- Thang Bui, Scott D. Stoller, Jiajie Li:

Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data. 267-284 - Antonio Nehme

, Vitor Jesus
, Khaled Mahbub, Ali E. Abdallah:
Fine-Grained Access Control for Microservices. 285-300 - Vignesh M. Pagadala, Indrakshi Ray:

Achieving Mobile-Health Privacy Using Attribute-Based Access Control. 301-316

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














