Filters








88 Hits in 7.2 sec

Smart energy grid security workshop (SEGS'13)

Klaus Kursawe, Benessa Defend
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
SEGS also includes presentations from other communities, such as law, economics, and HCI, that present these communities' perspectives on technological issues.  ...  SEGS publications offer perspectives from both academia and industry, and present novel research on theoretical and practical aspects of smart grid security and privacy, including design, analysis, experimentation  ...  CCS'13, November 4-8, 2013, Berlin, Germany. ACM 978-1-4503-2477-9/13/11. http://dx.doi.org/10.1145/2508859.2509035.  ... 
doi:10.1145/2508859.2509035 dblp:conf/ccs/KursaweD13 fatcat:6fwisnd2fnbn7gedqoluy5ygbi

12th workshop on privacy in the electronic society (WPES 2013)

Sara Foresti
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
The advantage of the growing availability of computational power and connectivity resources at low prices is the easiness of collecting, sharing, processing, and accessing information.  ...  The evolution of the Information and Communication Technology (ICT) has radically changed our lives, making information available from anywhere at any time through different kinds of devices.  ...  CCS'13, November 4-8, 2013 , Berlin, Germany.  ... 
doi:10.1145/2508859.2509028 dblp:conf/ccs/Foresti13 fatcat:vzewc65ctrhbpchoduygkth7sq

CCS'13 co-located workshop summary for SPSM 2013

Adrienne Porter Felt, N. Asokan
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
Security and privacy in smartphones and mobile devices is an emerging area which has received significant attention from the research community during the past few years.  ...  The SPSM workshop was created to bring together these researchers and practitioners.  ...  CCS'13, November 4-8, 2013, Berlin, Germany.  ... 
doi:10.1145/2508859.2509034 dblp:conf/ccs/FeltA13 fatcat:34iyf6fhpbd35a4wctb4jrzgmq

Fifth ACM cloud computing security workshop (CCSW 2013)

Ari Juels, Bryan Parno
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
The Cloud Computing Security Workshop (CCSW) focuses on the security challenges and opportunities raised by cloud computing.  ...  As a multi-faceted trend, cloud computing creates many and varied security and privacy requirements at the intersection of a broad range of disciplines.  ...  CCS '13, November 4-8, 2013 , Berlin, Germany.  ... 
doi:10.1145/2508859.2509033 dblp:conf/ccs/JuelsP13 fatcat:q4got2aygzh4fkzwtqrkg4t3jy

The cyber arms race

Mikko Hypponen
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
CCS'13, November 4-8, 2013, Berlin, Germany. Copyright is held by the owner/author(s). ACM 978-1-4503-2477-9/13/11 ...$15.00. http://dx.doi.org/10. 1145/2508859.2516756 . cans.  ...  His TED Talk on computer security has been translated to over 35 languages. His columns have been published in the New York Times, Wired, CNN and BBC. Mr.  ... 
doi:10.1145/2508859.2516756 dblp:conf/ccs/Hypponen13 fatcat:fjng5vwxxfemnlg5mifxwyegkm

The first workshop on language support for privacy-enhancing technologies (PETShop'13)

Martin Franz, Andreas Holzer, Rupak Majumdar, Bryan Parno, Helmut Veith
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
The Workshop on Language Support for Privacy-Enhancing Technologies (PETShop'13) aims at bringing together researchers from the areas of security, programming languages, compiler construction, and program  ...  verification to exchange ideas and research results to improve the practicality of state of the art cryptographic privacy-enhancing technologies.  ...  ACKNOWLEDGMENTS This workshop was partially supported by the Austrian National Research Network S11403 and S11405 (RiSE) of the Austrian Science Fund (FWF) and by the Vienna Science and Technology Fund  ... 
doi:10.1145/2508859.2509032 dblp:conf/ccs/FranzHMPV13 fatcat:qsu4uv4xhrhb5ljov6la65ka7e

Constructive and destructive aspects of embedded security in the internet of things

Christof Paar
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
Very recently, even NSA released two lightweight ciphers, SIMON ACM 978-1-4503-2477-9/13/11.. and SPECK.  ...  These examples show the destructive and constructive aspects of modern embedded security. In this tutorial we will address both the constructive and "penetration testing" aspect of embedded security.  ...  CCS'13, November 4-8, 2013, Berlin, Germany. ACM 978-1-4503-2477-9/13/11.. and SPECK.  ... 
doi:10.1145/2508859.2516757 dblp:conf/ccs/Paar13 fatcat:7ua4tyndvbdlzed4ug6sgpofyi

Third international workshop on trustworthy embedded devices (TrustED 2013)

Frederik Armknecht, Jean-Pierre Seifert
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
The scope of the Workshop on Trustworthy Embedded Devices (TrustED) is security of embedded devices in general with focus on cyber physical systems and their environments.  ...  TrustED 2013 is a continuation of previous workshops in this series, which were held in conjunction with ESORICS 2011 and IEEE Security & Privacy 2012 (see http://trusted.trust.cased.de for details).  ...  CCS'13, November 4-8, 2013 , Berlin, Germany. ACM 978-1-4503-2477-9/13/11. http://dx.doi.org/10.1145/2508859.2509029.  ... 
doi:10.1145/2508859.2509029 dblp:conf/ccs/ArmknechtS13 fatcat:o5ult7w6rfeztbeuv5bntkzroi

Eighth ACM workshop on digital identity management (DIM 2013)

Thomas Groß, Marit Hansen
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
Starting from a community with a background mainly in computer science, it has developed towards an interdisciplinary workshop where a lively interactive community discusses identity topics from technical  ...  The Workshop Digital Identity Management has evolved during the last decade as one of the most interesting events on identity management issues.  ...  CCS'13, November 4-8, 2013, Berlin, Germany.  ... 
doi:10.1145/2508859.2509036 dblp:conf/ccs/GrossH13 fatcat:3yrz73qjdbhoplt3sr7ca6oanu

Easily instrumenting android applications for security purposes

Eric Bodden
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
Current malware on the Android platform exhibits a very diverse spectrum of malicious behaviors such as sending text messages to costly premium rate numbers [6, 21] , infecting connected computes with  ...  With the increasing market share of the Android operating system, the platform also becomes more and more interesting for adversaries.  ...  CCS'13, November 4-8, 2013, Berlin, Germany. ACM 978-1-4503-2477-9/13/11. http://dx.doi.org/10.1145/2508859.2516759.  ... 
doi:10.1145/2508859.2516759 dblp:conf/ccs/Bodden13 fatcat:noau652i4jhzhe72bsqwdaluke

DEMO: Gradiant asymmetric encryption and verification systems based on handwritten signature

Enrique Argones Rúa, Francisco Javier García Salomón, Luis Pérez-Freire
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
A successful deployment of biometric-based recognition systems in real-life applications depends on crucial issues such as data security and privacy, which have to be specifically addressed.  ...  Besides, cryptographic key protection can represent the main weakness of a secured transmission.  ...  CCS'13, November 4-8, 2013, Berlin, Germany. ACM 978-1-4503-2477-9/13/11. http://dx.doi.org/10.1145/2508859.2512497.  ... 
doi:10.1145/2508859.2512497 dblp:conf/ccs/Argones-RuaSP13 fatcat:6ztafh3yoja7tjslmwp67wkwbi

POSTER: A footprint of third-party tracking on mobile web

Ashar Javed
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
The results show that 62 sites are tracking users' activities on mobile web and Google Analytics is the most widespread tracker on mobile web.  ...  In this paper, we investigate the footprints of third-party tracking on the mobile web.  ...  REFERENCES CCS'13, November 4-8, 2013, Berlin, Germany. ACM 978-1-4503-2477-9/13/11. http://dx.doi.org/10.1145/2508859.2512521.  ... 
doi:10.1145/2508859.2512521 dblp:conf/ccs/Javed13 fatcat:hxuecv7xsjaj5dgatq3voxwh54

POSTER: Signal anomaly based attack detection in wireless sensor networks

Jeton Bacaj, Leon Reznik
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
This paper presents a feasibility study of novel attack detection mechanisms in wireless sensor networks (WSN) based on detecting anomalies and changes in sensor signals and data values.  ...  Typical WSN attacks are considered in the empirical study of various attack detection techniques utilizing features based on sensor signal strength and other WSN technological parameters and using machine  ...  Wormhole attack CCS'13, November 4-8, 2013, Berlin, Germany.  ... 
doi:10.1145/2508859.2512508 dblp:conf/ccs/BacajR13 fatcat:3zygzi4adfgofaexpifjefoq4u

POSTER: SHAMROCK

Daniil Utin, Roger Kazan, Joshua Kramer, Michael Vai, David Whelihan
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
In this poster, we describe a one-size-fits-many Intellectual Property (IP) core which integrates advanced key management technology and streaming encryption into a single component to protect data in-transit  ...  CCS'13, November 4-8, 2013, Berlin, Germany.  ...  ACM 978-1-4503-2477-9/13/11. http://dx.doi.org/10.1145/2508859.2512515 In m te U in S th c s E c in c S f T c p m d d e c in W s c a a ty c c h [ a h s in m a  ... 
doi:10.1145/2508859.2512515 dblp:conf/ccs/UtinKKVW13 fatcat:pszlv2nxavehzcice5bkmb2hg4

Trusted execution environments on mobile devices

Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
In this tutorial, we explain the security features provided by mobile TEEs and describe On-board Credentials (ObC) system that enables third-party TEE development.  ...  of mobile hardware security.  ...  CCS'13, November 4-8, 2013, Berlin, Germany.  ... 
doi:10.1145/2508859.2516758 dblp:conf/ccs/EkbergKA13 fatcat:7cxcepo2zna4ti5xoqgi2b5eeq
« Previous Showing results 1 — 15 out of 88 results