Foundations and practice of security [electronic resource] : 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers / Joaquin Garcia-Alfaro, Pascal Lafourcade (eds.)
Annotation This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresse...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , |
Other title: | FPS 2011. |
Format: | Electronic Conference Proceeding eBook |
Language: | English |
Published: |
Heidelberg ; New York :
Springer,
©2012.
|
Series: | Lecture notes in computer science ;
6888. LNCS sublibrary. Security and cryptology. |
Subjects: |
Table of Contents:
- Keynote Address. Preserving Privacy in Online Social Networks / Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi
- Short Papers. TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections / Jordi Pujol-Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca, Oriol Farràs
- Automated Verification of Block Cipher Modes of Operation, an Improved Method / Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini
- Pervasive Security and Threshold Cryptography. SC 2: Secure Communication over Smart Cards / Nicola Dragoni, Eduardo Lostal, Davide Papini, Javier Fabra
- Private Identification of RFID Tags / Behzad Malek, Ali Miri
- Threshold Encryption into Multiple Ciphertexts / Martin Stanek
- Encryption, Cryptanalysis and Automatic Verification.A Novel Commutative Blinding Identity Based Encryption Scheme / Yu Chen, Song Luo, Jianbin Hu, Zhong Chen.
- A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules / Marina Pudovkina
- A Computational Indistinguishability Logic for the Bounded Storage Model / Gilles Barthe, Mathilde Duclos, Yassine Lakhnech
- Keynote Addresses. Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol / Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis
- Secret Key Establishment over Noisy Channels / Hadi Ahmadi, Reihaneh Safavi-Naini
- Formal Methods and Network Security. Formal Specification and Validation of Security Policies / Tony Bourdier, Horatiu Cirstea, Mathieu Jaume, Hélène Kirchner
- Vote-Independence: A Powerful Privacy Notion for Voting Protocols / Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech
- Black-Box Property of Cryptographic Hash Functions / Michal Rjaško
- Phishing Detection with Popular Search Engines: Simple and Effective / Jun Ho Huh, Hyoungshick Kim.
- Ongoing Research.A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress / Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis
- A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress / Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Régine Laleau, Richard St-Denis
- Specification and Verification of Access Control Policies in EB3SEC: Work in Progress / Pierre Konopacki, Hakim Belhaouari, Marc Frappier, Régine Laleau
- A Metamodel of the B Modeling of Access-Control Policies: Work in Progress / Jérémy Milhau, Marc Frappier, Régine Laleau
- Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress / Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro.