Table of Contents
|
Information Security Theory and Practice Gerhard P. Hancke, Ernesto Damiani |
Front Matter |
Security in Emerging Systems
|
A Secure and Trusted Channel Protocol for UAVs Fleets Raja Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette |
3-24 |
Philanthropy on the Blockchain Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Akram, Keith Mayes |
25-38 |
Security of Data
|
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database Shujie Cui, Ming Zhang, Muhammad Asghar, Giovanni Russello |
41-55 |
JACPoL: A Simple but Expressive JSON-based Access Control Policy Language Hao Jiang, Ahmed Bouabdallah |
56-72 |
Trusted Execution
|
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs Carlton Shepherd, Raja Akram, Konstantinos Markantonakis |
75-92 |
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip Sebanjila Bukasa, Ronan Lashermes, Hélène Bouder, Jean-Louis Lanet, Axel Legay |
93-109 |
Defences and Evaluation
|
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications Madeline Cheah, Hoang Nguyen, Jeremy Bryans, Siraj Shaikh |
113-129 |
Examination of a New Defense Mechanism: Honeywords Ziya Genç, Süleyman Kardaş, Mehmet Kiraz |
130-139 |
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics Yonas Leguesse, Mark Vella, Joshua Ellul |
140-152 |
Protocols and Algorithms
|
A More Efficient 1–Checkable Secure Outsourcing Algorithm for Bilinear Maps Öznur Kalkar, Mehmet Kiraz, İsa Sertkaya, Osmanbey Uzunkol |
155-164 |
A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons Pau Conejero-Alberola, M. Hinarejos, Josep-Lluís Ferrer-Gomila |
165-176 |
Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough? Nektaria Kaloudi, Aikaterini Mitrokotsa |
177-188 |