: 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24–25, 2015 Proceedings
\ Raja Naeem Akram, Sushil Jajodia (eds.)
Cham
: Springer
, 2015
1 online resource (xii, 281 p.)
:ill.
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
; 9311
International conference proceedings
Index
Bibliography
Security and Privacy Services On Secrecy Amplification Protocols Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols Private Minutia-based Fingerprint Matching Secure Resource Sharing and Access Control Secure Resource Sharing for Embedded Protected Module Architectures Secure Obfuscation of Authoring Style DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption WSACd A Usable Access Control Framework for Smart Home Devices.-Secure Devices and Execution Environment Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques Practical and Privacy-Preserving TEE Migration Randomizing the Montgomery Powering Ladder Challenges of Security and Reliability How Current Android Malware Seeks to Evade Automated Code Analysis On linkability and malleability in self-blindable credentials Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality Short Papers Normalizing Security Events with a Hierarchical Knowledge Base Attack Tree Generation by Policy Invalidation Lightweight Password Hashing Scheme for Embedded Systems Secure and Authenticated Access to LLN Resources Through Policy Constraints