Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_24
Muhammad Mohzary, Srikanth Tadisetty, Kambiz Ghazinour
{"title":"A Privacy Protection Layer for Wearable Devices","authors":"Muhammad Mohzary, Srikanth Tadisetty, Kambiz Ghazinour","doi":"10.1007/978-3-030-45371-8_24","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_24","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134459566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_11
D. Preuveneers, W. Joosen
{"title":"TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE","authors":"D. Preuveneers, W. Joosen","doi":"10.1007/978-3-030-45371-8_11","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_11","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115224277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_10
Silvio Ranise, Giada Sciarretta, A. Tomasi
{"title":"Enroll, and Authentication Will Follow - eID-Based Enrollment for a Customized, Secure, and Frictionless Authentication Experience","authors":"Silvio Ranise, Giada Sciarretta, A. Tomasi","doi":"10.1007/978-3-030-45371-8_10","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_10","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_17
Edoukou Berenger Ayebie, Hafsa Assidi, E. M. Souidi
{"title":"An Efficient Identification Scheme Based on Rank Metric","authors":"Edoukou Berenger Ayebie, Hafsa Assidi, E. M. Souidi","doi":"10.1007/978-3-030-45371-8_17","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_17","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_12
Simon Tanner, Ilian Vogels, Roger Wattenhofer
{"title":"Protecting Android Apps from Repackaging Using Native Code","authors":"Simon Tanner, Ilian Vogels, Roger Wattenhofer","doi":"10.1007/978-3-030-45371-8_12","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_12","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121351054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_21
David Gérault, P. Lafourcade
{"title":"Towards Secure TMIS Protocols","authors":"David Gérault, P. Lafourcade","doi":"10.1007/978-3-030-45371-8_21","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_21","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126693153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_14
C. Morisset, Sowmya Ravidas, Nicola Zannone
{"title":"On Attribute Retrieval in ABAC","authors":"C. Morisset, Sowmya Ravidas, Nicola Zannone","doi":"10.1007/978-3-030-45371-8_14","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_14","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_20
P. Lafourcade, Marius Lombard-Platet
{"title":"Get-your-ID: Decentralized Proof of Identity","authors":"P. Lafourcade, Marius Lombard-Platet","doi":"10.1007/978-3-030-45371-8_20","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_20","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123902761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_25
Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, K. Sakiyama
{"title":"Validating the DFA Attack Resistance of AES (Short Paper)","authors":"Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, K. Sakiyama","doi":"10.1007/978-3-030-45371-8_25","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_25","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"281 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127476085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-05DOI: 10.1007/978-3-030-45371-8_4
Bruno Reis, Eva Maia, Isabel Praça
{"title":"Selection and Performance Analysis of CICIDS2017 Features Importance","authors":"Bruno Reis, Eva Maia, Isabel Praça","doi":"10.1007/978-3-030-45371-8_4","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_4","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122359083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}