default search action
NordSec 2010: Espoo, Finland
- Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg:
Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers. Lecture Notes in Computer Science 7127, Springer 2012, ISBN 978-3-642-27936-2
Network Security
- Mikko Särelä, Christian Esteve Rothenberg, András Zahemszky, Pekka Nikander, Jörg Ott:
BloomCasting: Security in Bloom Filter Based Multicast. 1-16 - Sanna Suoranta, Jani Heikkinen, Pekka Silvekoski:
Authentication Session Migration. 17-32 - Miika Komu, Sasu Tarkoma, Andrey Lukyanenko:
Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles. 33-48 - Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert:
Experimental Analysis of the Femtocell Location Verification Techniques. 49-54
Invited Talk
- Erka Koivunen:
"Why Wasn't I Notified?": Information Security Incident Reporting Demystified. 55-70
Monitoring and Reputation
- Pern Hui Chia, Andreas P. Heiner, N. Asokan:
Use of Ratings from Personalized Communities for Trustworthy Application Installation. 71-88 - Gunnar Kreitz, Mads Dam, Douglas Wikström:
Practical Private Information Aggregation in Large Networks. 89-103 - Magnus Almgren, Wolfgang John:
Tracking Malicious Hosts on a 10Gbps Backbone Link. 104-120
Privacy
- Elahe Kani-Zabihi, Lizzie Coles-Kemp:
Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices. 121-135 - Dominik Herrmann, Christoph Gerber, Christian Banse, Hannes Federrath:
Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions. 136-154
Policy Enforcement
- Jason Crampton, Michael Huth:
A Framework for the Modular Specification and Orchestration of Authorization Policies. 155-170 - Kari Kostiainen, N. Asokan, Jan-Erik Ekberg:
Credential Disabling from Trusted Execution Environments. 171-186 - Olga Gadyatskaya, Fabio Massacci, Federica Paci, Sergey A. Stankevich:
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications. 187-192 - Filippo Del Tedesco, Alejandro Russo, David Sands:
Implementing Erasure Policies Using Taint Analysis. 193-209
Selected OWASP AppSec Research 2010 Papers
- Juan José Conti, Alejandro Russo:
A Taint Mode for Python via a Library. 210-222 - Philippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens, Wouter Joosen:
Security of Web Mashups: A Survey. 223-238 - Jonas Magazinius, Phu H. Phung, David Sands:
Safe Wrappers and Sane Policies for Self Protecting JavaScript. 239-255
Cryptography and Protocols
- Jose Quaresma, Christian W. Probst:
Protocol Implementation Generator. 256-268 - Billy Bob Brumley:
Secure and Fast Implementations of Two Involution Ciphers. 269-282 - Markku-Juhani O. Saarinen:
The PASSERINE Public Key Encryption and Authentication Mechanism. 283-288
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.