default search action
4. FPS 2011: Paris, France
- Joaquín García-Alfaro, Pascal Lafourcade:
Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6888, Springer 2012, ISBN 978-3-642-27900-3
Keynote Address
- Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi:
Preserving Privacy in Online Social Networks. 1-13
Short Papers
- Jordi Pujol Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca, Oriol Farràs:
TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections. 14-22 - Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini:
Automated Verification of Block Cipher Modes of Operation, an Improved Method. 23-31
Pervasive Security and Threshold Cryptography
- Nicola Dragoni, Eduardo Lostal, Davide Papini, Javier Fabra:
SC 2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-application Smart Cards. 32-48 - Behzad Malek, Ali Miri:
Private Identification of RFID Tags. 49-61 - Martin Stanek:
Threshold Encryption into Multiple Ciphertexts. 62-72
Encryption, Cryptanalysis and Automatic Verification
- Yu Chen, Song Luo, Jian-bin Hu, Zhong Chen:
A Novel Commutative Blinding Identity Based Encryption Scheme. 73-89 - Marina Pudovkina:
A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules. 90-101 - Gilles Barthe, Mathilde Duclos, Yassine Lakhnech:
A Computational Indistinguishability Logic for the Bounded Storage Model. 102-117
Keynote Addresses
- Gimer Cervera, Michel Barbeau, Joaquín García-Alfaro, Evangelos Kranakis:
Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol. 118-131 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Secret Key Establishment over Noisy Channels. 132-147
Formal Methods and Network Security
- Tony Bourdier, Horatiu Cirstea, Mathieu Jaume, Hélène Kirchner:
Formal Specification and Validation of Security Policies. 148-163 - Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech:
Vote-Independence: A Powerful Privacy Notion for Voting Protocols. 164-180 - Michal Rjasko:
Black-Box Property of Cryptographic Hash Functions. 181-193 - Jun Ho Huh, Hyoungshick Kim:
Phishing Detection with Popular Search Engines: Simple and Effective. 194-207
Ongoing Research
- Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquín García-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris:
A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress. 208-217 - Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Régine Laleau, Richard St-Denis:
A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress. 218-226 - Pierre Konopacki, Hakim Belhaouari, Marc Frappier, Régine Laleau:
Specification and Verification of Access Control Policies in EB3SEC: Work in Progress. 227-233 - Jérémy Milhau, Marc Frappier, Régine Laleau:
A Metamodel of the B Modeling of Access-Control Policies: Work in Progress. 234-241 - Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro:
Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress. 242-251
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.