Foundations and practice of security [electronic resource] : 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers / Joaquin Garcia-Alfaro, Pascal Lafourcade (eds.)

Annotation This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresse...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: FPS 2011 Paris, France
Other Authors: Garcia-Alfaro, Joaquin, Lafourcade, Pascal
Other title:FPS 2011.
Format: Electronic Conference Proceeding eBook
Language:English
Published: Heidelberg ; New York : Springer, ©2012.
Series:Lecture notes in computer science ; 6888.
LNCS sublibrary. Security and cryptology.
Subjects:
Table of Contents:
  • Keynote Address. Preserving Privacy in Online Social Networks / Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi
  • Short Papers. TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections / Jordi Pujol-Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca, Oriol Farràs
  • Automated Verification of Block Cipher Modes of Operation, an Improved Method / Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini
  • Pervasive Security and Threshold Cryptography. SC 2: Secure Communication over Smart Cards / Nicola Dragoni, Eduardo Lostal, Davide Papini, Javier Fabra
  • Private Identification of RFID Tags / Behzad Malek, Ali Miri
  • Threshold Encryption into Multiple Ciphertexts / Martin Stanek
  • Encryption, Cryptanalysis and Automatic Verification.A Novel Commutative Blinding Identity Based Encryption Scheme / Yu Chen, Song Luo, Jianbin Hu, Zhong Chen.
  • A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules / Marina Pudovkina
  • A Computational Indistinguishability Logic for the Bounded Storage Model / Gilles Barthe, Mathilde Duclos, Yassine Lakhnech
  • Keynote Addresses. Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol / Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis
  • Secret Key Establishment over Noisy Channels / Hadi Ahmadi, Reihaneh Safavi-Naini
  • Formal Methods and Network Security. Formal Specification and Validation of Security Policies / Tony Bourdier, Horatiu Cirstea, Mathieu Jaume, Hélène Kirchner
  • Vote-Independence: A Powerful Privacy Notion for Voting Protocols / Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech
  • Black-Box Property of Cryptographic Hash Functions / Michal Rjaško
  • Phishing Detection with Popular Search Engines: Simple and Effective / Jun Ho Huh, Hyoungshick Kim.
  • Ongoing Research.A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress / Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis
  • A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress / Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Régine Laleau, Richard St-Denis
  • Specification and Verification of Access Control Policies in EB3SEC: Work in Progress / Pierre Konopacki, Hakim Belhaouari, Marc Frappier, Régine Laleau
  • A Metamodel of the B Modeling of Access-Control Policies: Work in Progress / Jérémy Milhau, Marc Frappier, Régine Laleau
  • Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress / Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro.