|
Identification and Authentication I |
|
|
|
Flexible and Transparent User Authentication for Mobile Devices |
|
|
1 | (12) |
|
|
|
|
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable |
|
|
13 | (12) |
|
|
Audio CAPTCHA for SIP-Based VoIP |
|
|
25 | (14) |
|
|
|
|
|
|
Roving Bugnet: Distributed Surveillance Threat and Mitigation |
|
|
39 | (12) |
|
|
|
On Robust Covert Channels Inside DNS |
|
|
51 | (12) |
|
|
|
|
Discovering Application-Level Insider Attacks Using Symbolic Execution |
|
|
63 | (13) |
|
|
|
|
|
Identification and Authentication II |
|
|
|
Custom JPEG Quantization for Improved Iris Recognition Accuracy |
|
|
76 | (11) |
|
|
|
|
On the IPP Properties of Reed-Solomon Codes |
|
|
87 | (11) |
|
|
|
|
|
A Generic Authentication LoA Derivation Model |
|
|
98 | (11) |
|
|
|
Applications of Cryptography and Information Hiding |
|
|
|
Media-Break Resistant eSignatures in eGovernment: An Austrian Experience |
|
|
109 | (10) |
|
|
|
|
How to Bootstrap Security for Ad-Hoc Network: Revisited |
|
|
119 | (13) |
|
|
|
|
|
|
|
132 | (11) |
|
|
Julio C. Hernandez-Castro |
|
|
|
|
Miguel A. Orellana-Quiros |
|
|
|
|
On the Impossibility of Detecting Virtual Machine Monitors |
|
|
143 | (9) |
|
|
|
Implementation of a Trusted Ticket System |
|
|
152 | (12) |
|
|
|
|
|
|
A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor |
|
|
164 | (12) |
|
Guillermo Navarro-Arribas |
|
|
|
A Policy Language for Modelling Recommendations |
|
|
176 | (14) |
|
|
|
Validation, Verification, Evaluation |
|
|
|
On the Security Validation of Integrated Security Solutions |
|
|
190 | (12) |
|
|
|
|
Verification of Security Policy Enforcement in Enterprise Systems |
|
|
202 | (12) |
|
|
|
Optimization of the Controlled Evaluation of Closed Relational Queries |
|
|
214 | (12) |
|
|
|
|
Privacy Protection - Security Assessment |
|
|
|
Collaborative Privacy - A Community-Based Privacy Infrastructure |
|
|
226 | (11) |
|
|
|
|
Security and Privacy Improvements for the Belgian eID Technology |
|
|
237 | (11) |
|
|
|
|
|
|
A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components |
|
|
248 | (11) |
|
|
|
|
Role Mining and Content Protection |
|
|
|
Mining Stable Roles in RBAC |
|
|
259 | (11) |
|
|
|
|
|
Privacy-Preserving Content-Based Publish/Subscribe Networks |
|
|
270 | (13) |
|
|
|
|
Broadcast Encryption for Differently Privileged |
|
|
283 | (11) |
|
|
|
Ontology-Based Secure XML Content Distribution |
|
|
294 | (13) |
|
|
|
|
|
|
|
NGBPA Next Generation BotNet Protocol Analysis |
|
|
307 | (11) |
|
|
|
Non-repudiation Analysis with LYSA |
|
|
318 | (12) |
|
|
|
A Provably Secure Secret Handshake with Dynamic Controlled Matching |
|
|
330 | (12) |
|
|
|
Towards a Theory of White-Box Security |
|
|
342 | (11) |
|
|
|
|
|
|
|
On a Taxonomy of Delegation |
|
|
353 | (11) |
|
|
|
|
|
Efficient Key Management for Enforcing Access Control in Outsourced Seenarios |
|
|
364 | (12) |
|
|
|
Sabrina De Capitani di Vimercati |
|
|
|
|
|
|
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications |
|
|
376 | (11) |
|
|
|
|
|
Automating Access Control Logics in Simple Type Theory with LEO-II |
|
|
387 | (12) |
|
|
Internet and Web Applications Security |
|
|
|
In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security |
|
|
399 | (11) |
|
|
|
Persona: Network Layer Anonymity and Accountability for Next Generation Internet |
|
|
410 | (11) |
|
|
|
|
|
Jason: A Scalable Reputation System for the Semantic Web |
|
|
421 | (11) |
|
|
|
|
Which Web Browsers Process SSL Certificates in a Standardized Way? |
|
|
432 | (11) |
|
|
|
|
|
Author Index |
|
443 | |