


default search action
SEC 2022: Copenhagen, Denmark
- Weizhi Meng

, Simone Fischer-Hübner
, Christian Damsgaard Jensen
:
ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings. IFIP Advances in Information and Communication Technology 648, Springer 2022, ISBN 978-3-031-06974-1
Privacy Models and Preferences
- David Harborth

, Sebastian Pape
:
A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App. 3-19 - Stuart S. Shapiro

:
Deriving and Using Synthetic Consequences for Privacy Risk Modeling. 20-33 - Alexander Richter, Patrick Kühtreiber, Delphine Reinhardt

:
Enhanced Privacy in Smart Workplaces: Employees' Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches. 34-50
Network Security and IDS
- Alexandre Dey, Eric Totel, Benjamin Costé

:
DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring. 53-69 - Wouter Hellemans, Md Masoom Rabbani, Jo Vliegen, Nele Mentens

:
FOCUS: Frequency Based Detection of Covert Ultrasonic Signals. 70-86 - Florian Wilkens

, Steffen Haas, Johanna Amann, Mathias Fischer:
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring. 87-105
Network Security and Privacy
- Martin Fejrskov

, Emmanouil Vasilomanolakis
, Jens Myrup Pedersen
:
A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention. 109-125 - Peishuai Sun

, Shuhao Li, Jiang Xie
, Hongbo Xu
, Zhenyu Cheng
, Rui Qin
:
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features. 126-141 - Kevin Köster, Matthias Marx, Anne Kunstmann

, Hannes Federrath:
Evaluation of Circuit Lifetimes in Tor. 142-157
Forensics
- Mark Vella

, Christian Colombo
:
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage. 161-178 - Supriya Adhatarao, Cédric Lauradoux:

Robust PDF Files Forensics Using Coding Style. 179-195 - Kunwar Muhammed Saaim, Muhamad Felemban, Saleh Alsaleh

, Ahmad Almulhem:
Light-Weight File Fragments Classification Using Depthwise Separable Convolutions. 196-211
Trust and PETs
- Davide Ferraris, M. Carmen Fernández Gago, Javier López:

Novel Approaches for the Development of Trusted IoT Entities. 215-230 - Vasilis Kalos, George C. Polyzos:

Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials. 231-247
Crypto-Based solutions
- Shaoqiang Wu, Chunfu Jia, Ding Wang

:
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties. 251-269 - Bingnan Zhong, Zicheng Wang, Yinggang Guo, Qingkai Zeng:

CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware Feature. 270-286
Usable Security
- Lydia Kraus

, Matej Grabovský
, Martin Ukrop
, Katarína Galanská, Vashek Matyás:
Usability Insights from Establishing TLS Connections. 289-305 - Michael Körber, Anatoli Kalysch, Werner Massonne, Zinaida Benenson:

Usability of Antivirus Tools in a Threat Detection Scenario. 306-322 - Christian Burkert

, Johanna Ansohn McDougall
, Hannes Federrath:
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations. 323-339
Blockchain
- Simeon Wuthier

, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang:
Greedy Networking in Cryptocurrency Blockchain. 343-359 - Amshumaan Pericherla, Proteet Paul, Shamik Sural

, Jaideep Vaidya, Vijay Atluri:
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain. 360-376
Mobile Security and Privacy
- Ardalan Foroughipour, Natalia Stakhanova, Farzaneh Abazari, Bahman Sistany:

AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps. 379-397 - Efi Siapiti, Ioanna Dionysiou

, K. Harald Gjermundrød
:
One Light, One App: Tackling a Common Misperception Causing Breach of User Privacy. 398-411 - Wenjuan Li, Jiao Tan, Nan Zhu:

Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones. 412-428
PETs and Crypto
- Lin Zhu, Changlu Lin, Fuchun Lin, Liang Feng Zhang:

Post-Quantum Cheating Detectable Private Information Retrieval. 431-448 - Vasco Guita, Daniel Andrade

, João Nuno Silva
, Miguel Correia:
Anonymous Trusted Data Relocation for TEEs. 449-466 - Tianci Li, Jiaojiao Wu, Jianfeng Wang

:
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries. 467-485
Vulnerabilities
- Bogdan Covrig, Enrique Barrueco Mikelarena, Constanta Rosca, Catalina Goanta

, Gerasimos Spanakis
, Apostolis Zarras
:
Upside Down: Exploring the Ecosystem of Dark Web Data Markets. 489-506 - Yue Yu, Xiaoqi Jia, Xun An, Shengzhi Zhang:

An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification. 507-523

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







last updated on 2026-04-30 00:10 CEST by the 







