default search action
NordSec 2012: Karlskrona, Sweden
- Audun Jøsang, Bengt Carlsson:
Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings. Lecture Notes in Computer Science 7617, Springer 2012, ISBN 978-3-642-34209-7
Application Security
- Arjan Blom, Gerhard de Koning Gans, Erik Poll, Joeri de Ruiter, Roel Verdult:
Designed to Fail: A USB-Connected Reader for Online Banking. 1-16 - Benjamin Adolphi, Hanno Langweg:
Security Add-Ons for Mobile Platforms. 17-30 - Torben Jensen, Heine Pedersen, Mads Chr. Olesen, René Rydhof Hansen:
THAPS: Automated Vulnerability Scanning of PHP Applications. 31-46
Security Management
- Teodor Sommestad, Jonas Hallberg:
Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments. 47-60 - Tony Proctor:
The Development of Cyber Security Warning, Advice and Report Points. 61-72 - Ramona Groner, Philipp Brune:
Towards an Empirical Examination of IT Security Infrastructures in SME. 73-88 - Fabio Massacci, Federica Paci:
How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners. 89-104
System Security
- Job Noorman, Nick Nikiforakis, Frank Piessens:
There Is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication. 105-120 - Dimiter Milushev, Dave Clarke:
Coinductive Unwinding of Security-Relevant Hyperproperties. 121-136 - Björn Ståhl, Per Mellstrand:
Retooling and Securing Systemic Debugging. 137-152
Network Security
- Kirsi Helkala, Nils Kalstad Svendsen, Per Thorsheim, Anders Wiehe:
Cracking Associative Passwords. 153-168 - Jan Zibuschka, Lothar Fritsch:
A Hybrid Approach for Highly Available and Secure Storage of Pseudo-SSO Credentials. 169-183 - Behrooz Sangchoolie, Mazdak Rajabi Nasab, Tomas Olovsson, Wolfgang John:
Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links. 184-198
Trust Management
- Jason W. Clark:
Everything But the Kitchen Sink: Determining the Effect of Multiple Attacks on Privacy Preserving Technology Users. 199-214 - Huiying Duan, Cäcilia Zirn:
Can We Identify Manipulative Behavior and the Corresponding Suspects on Review Websites Using Supervised Learning? 215-230 - Tobias Pulls:
Privacy-Friendly Cloud Storage for the Data Track - An Educational Transparency Tool. 231-246
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.