


default search action
SEC 2019: Lisbon, Portugal
- Gurpreet Dhillon, Fredrik Karlsson, Karin Hedström, André Zúquete:

ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings. IFIP Advances in Information and Communication Technology 562, Springer 2019, ISBN 978-3-030-22311-3
Intrusion Detection
- Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Kazumasa Omote, Ayumu Kubota:

Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack. 3-18 - Guanxiong Liu, Issa Khalil

, Abdallah Khreishah
:
GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier. 19-32 - Hyunguk Yoo, Irfan Ahmed

:
Control Logic Injection Attacks on Industrial Control Systems. 33-48 - David Lanoë, Michel Hurfin, Eric Totel, Carlos Maziero:

An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications. 49-63
Access Control
- Mathieu Valois, Patrick Lacharme, Jean-Marie Le Bars:

Performance of Password Guessing Enumerators Under Cracking Conditions. 67-80 - José Becerra, Peter Y. A. Ryan

, Petra Sala, Marjan Skrobot
:
An Offline Dictionary Attack Against zkPAKE Protocol. 81-90 - Dominik Ziegler

, Josef Sabongui, Gerald Palfinger
:
Fine-Grained Access Control in Industrial Internet of Things - Evaluating Outsourced Attribute-Based Encryption. 91-104 - Manar Alohaly, Hassan Takabi, Eduardo Blanco:

Towards an Automated Extraction of ABAC Constraints from Natural Language Policies. 105-119 - Zheng Cheng

, Jean-Claude Royer
, Massimo Tisi:
Removing Problems in Rule-Based Policies. 120-133 - Stephan Wiefling

, Luigi Lo Iacono
, Markus Dürmuth
:
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild. 134-148
Organizational and Behavioral Security
- Lorenzo Frigerio, Anderson Santana de Oliveira, Laurent Gomez, Patrick Duverger:

Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data. 151-164 - Majid Hatamian

, Sebastian Pape
, Kai Rannenberg:
ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment. 165-179 - Weizhi Meng

, Wenjuan Li
, Lijun Jiang, Jianying Zhou
:
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications. 180-193 - Joëlle Simonet, Stephanie Teufel

:
The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users. 194-208 - Patrick Murmann, Delphine Reinhardt

, Simone Fischer-Hübner:
To Be, or Not to Be Notified - Eliciting Privacy Notification Preferences for Online mHealth Services. 209-222 - Michael Schmid

, Sebastian Pape
:
A Structured Comparison of the Corporate Information Security Maturity Level. 223-237 - Ali Farooq

, Debora Jeske, Jouni Isoaho
:
Predicting Students' Security Behavior Using Information-Motivation-Behavioral Skills Model. 238-252 - David Harborth

, Xinyuan Cai, Sebastian Pape
:
Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym. 253-267
Crypto and Encryption
- Anirudh Narasimman, Qiaozhi Wang, Fengjun Li

, Dongwon Lee, Bo Luo
:
Arcana: Enabling Private Posts on Public Microblog Platforms. 271-285 - Jan Camenisch, Manu Drijvers, Petr Dzurenda

, Jan Hajny:
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards. 286-298 - Yazan Boshmaf, Husam Al Jawaheri, Mashael Al Sabah:

BlockTag: Design and Applications of a Tagging System for Blockchain Analysis. 299-313 - Hankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim, Hyunok Oh:

Forward Secure Identity-Based Signature Scheme with RSA. 314-327
Integrity
- Sarwar Sayeed

, Hector Marco-Gisbert
:
On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques. 331-344 - Kai Bavendiek, Tobias Mueller, Florian Wittner, Thea Schwaneberg, Christian-Alexander Behrendt

, Wolfgang Schulz, Hannes Federrath, Sibylle Schupp:
Automatically Proving Purpose Limitation in Software Architectures. 345-358 - Sangat Vaidya

, Santiago Torres-Arias
, Reza Curtmola, Justin Cappos:
Commit Signatures for Centralized Version Control Systems. 359-373 - Theodor Schnitzler

, Markus Dürmuth
, Christina Pöpper
:
Towards Contractual Agreements for Revocation of Online Data. 374-387

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














