Journal: ERCIM News

Volume 2016, Issue 106

0 -- 0Andreas Konstantinidis 0002, Georgios Chatzimilioudis, Demetrios Zeinalipour-Yazti. Privacy-Preserving Indoor Localisation and Navigation
0 -- 0Nicolás Notario, Stephan Krenn, Bernd Zwattendorfer, Felix Hörandner. CREDENTIAL: Secure Cloud Identity Wallet
0 -- 0Anze Zitnik, Antonio Álvarez Romero, Stephanie Parker. CyberWISER-Light: Supporting Cyber Risk Assessment with Automated Vulnerability Scanning
0 -- 0Paolo Mori, Andrea Saracino, Francesco Di Cerbo. Data Usage Control: Introducing a New Framework for Cloud and Mobile Environments
0 -- 0Evangelos Markatos, Egidija Versinskiene, Evaldas Bruze. SENTER: A Network of the European Centres of Excellence in Cyber Crime Research, Training, and Education
0 -- 0Thijs Veugen. Client-Server Framework for Securely Outsourcing Computations
0 -- 0Nisrine Jafri, Axel Legay, Jean-Louis Lanet. Vulnerability Prediction Against Fault Attacks
0 -- 0Ioannis G. Askoxylakis, Nikolaos E. Petroulakis, Vivek Kulkami, Florian Zeiger. VirtuWind - Security in a Virtual and Programmable Industrial Network Prototype Deployed in an Operational Wind Park
0 -- 0Christophe Ponsard, Philippe Massonet, Gautier Dallons. Co-engineering Security and Safety Requirements for Cyber-Physical Systems
0 -- 0László Havasi, Tamás Szirányi. Multi-View Security and Surveillance at MTA SZTAKI
0 -- 0Vicente Matellán, Francisco J. Rodríguez Lera, Jesús Balsa. Cybersecurity in Robotic Systems
0 -- 0Marcel Caria. Cyber-Physical Systems: Closing the Gap between Hardware and Software
0 -- 0Nicolas Sendrier, Jean-Pierre Tillich. Code-Based Cryptography: New Security Solutions Against a Quantum Adversary
0 -- 0Arthur Melissen. Flexible Decentralised Access Control using Invitation-Response Dialogue
0 -- 0Marc Stevens. Deprecating an Internet Security Standard with Cryptanalysis
0 -- 0Giulia Barbagelata, Marco Attene, Tor Dokken. CAxMan: Design for Additive Manufacturing Made Easy and Cost-effective
0 -- 0Fabio Martinelli, Edgar R. Weippl. Cybersecurity - Introduction to the Special Theme
0 -- 0Martin Schmiedecker, Sebastian Neuner. On Reducing Bottlenecks in Digital Forensics
0 -- 0Dimitris E. Simos. SPLIT: Security Protocol Interaction Testing in Practice
0 -- 0Stefano Cresci, Marinella Petrocchi, Maurizio Tesconi, Roberto Di Pietro, Angelo Spognardi. Social Fingerprinting - or the Truth About You
0 -- 0Ana Nieto, Rodrigo Roman, Javier Lopez. Digital Witness: Digital Evidence Management Framework for the Internet of Things
0 -- 0Benjamin André, Nicolas Anciaux, Philippe Pucheral, Paul Tran-Van. A Root of Trust for the Personal Cloud
0 -- 0Marco Tiloca, Christian Gehrmann, Ludwig Seitz. Robust and Scalable DTLS Session Establishment
0 -- 0José Bacelar Almeida, Manuel Barbosa, Hugo Pacheco, Vitor Pereira. A Tool-Chain for High-Assurance Cryptographic Software
0 -- 0Florian Dold, Christian Grothoff. GNU Taler: Ethical Online Payments for the Internet Age
0 -- 0Philippe Antoine, Guillaume Bonfante, Jean-Yves Marion. Gorille: Efficient and Relevant Software Comparisons
0 -- 0Joppe W. Bos, Wil Michiels. Security Assessment of Software Security: A Closer Look at White-Box Cryptographic Implementations
0 -- 0Thomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls. A New Architecture for Developing Cryptographic Cloud Services
0 -- 0Carmela Gambardella, Ilaria Matteucci, Marinella Petrocchi. Data Sharing Agreements: How to Glue Definition, Analysis and Mapping Together
0 -- 0Marco Gramaglia, Marco Fiore. Thwarting Uniqueness in Datasets of Spatiotemporal Trajectories
0 -- 0Valérie Viet Triem Tong, Jean-François Lalande, Mourad Leslous. Challenges in Android Malware Analysis
0 -- 0Robert N. M. Watson, Simon W. Moore, Peter G. Neumann. CHERI: A Hardware-Software System to Support the Principle of Least Privilege
0 -- 0Florian Skopik, Maria Leitner, Timea Pahi. CISA: Establishing National Cyber Situational Awareness to Counter New Threats
0 -- 0Fabrizio Biondi, Sébastien Josse, Axel Legay. Bypassing Malware Obfuscation with Dynamic Synthesis
0 -- 0Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani. Using Cryptography to Control Your Data at a Distance
0 -- 0Erno Rigó, Mihály Héder. A Network of Internet Probes for Fighting Cyber Attacks
0 -- 0Nataliia Bielova, Frédéric Besson, Thomas P. Jensen. Using JavaScript Monitoring to Prevent Device Fingerprinting
0 -- 0Haralampos Pozidis, Nikolaos Papandreou, Thomas Mittelholzer, Evangelos Eleftheriou. High-Density Data Storage in Phase-Change Memory