default search action
28th NordSec 2023: Oslo, Norway
- Lothar Fritsch, Ismail Hassan, Ebenezer Paintsil:
Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings. Lecture Notes in Computer Science 14324, Springer 2024, ISBN 978-3-031-47747-8
Privacy and Data Protection
- Jonas Palm, Meiko Jensen:
Analysis of a Consent Management Specification and Prototype Under the GDPR. 3-17 - Philippe Mangeard, Xiufen Yu, Mohammad Mannan, Amr M. Youssef:
No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites. 18-36 - Esko Vuorinen, Panu Puhtila, Sampsa Rauti, Ville Leppänen:
From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channels. 37-53
Cryptography, Protocols, Analysis
- Paul Cotan, George Teseleanu:
Small Private Key Attack Against a Family of RSA-Like Cryptosystems. 57-72 - Amirreza Hamidi, Hossein Ghodosi:
Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service. 73-86 - Marc Roßberger, Dogan Kesdogan:
Smart Noise Detection for Statistical Disclosure Attacks. 87-103
Cyber Security
- Karianne Kjønås, Gaute Wangen:
Cybersecurity Challenges and Smart Technology Adoption in Norwegian Livestock Farming. 107-125 - Rajendra Patil, Viktoria Fodor, Mathias Ekstedt:
Mean Value Analysis of Critical Attack Paths with Multiple Parameters. 126-143 - Mordechai Guri:
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM. 144-161 - Lars Berg, Kirsi Helkala, André Årnes:
Legal Considerations on Gray Zone Operations - From a Norwegian Perspective. 162-181
Aspects of Trust
- Mario Lins, René Mayrhofer, Michael Roland, Alastair R. Beresford:
Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems. 185-203 - Joakim Brorsson, Martin Gunnarsson:
DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties. 204-222 - Vera Schmitt, Daniel Sivizaca Conde, Premtim Sahitaj, Sebastian Möller:
What is Your Information Worth? A Systematic Analysis of the Endowment Effect of Different Data Types. 223-242
Defenses and Forensics
- Thorsten Jenke, Elmar Padilla, Lilli Bruckschen:
Towards Generic Malware Unpacking: A Comprehensive Study on the Unpacking Behavior of Malicious Run-Time Packers. 245-262 - Philipp Eichhammer, Hans P. Reiser:
A Self-forming Community Approach for Intrusion Detection in Heterogeneous Networks. 263-280 - Samantha Klier, Harald Baier:
To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers. 281-303
Machine Learning and Artificial Intelligence in Information Security
- Tanveer Khan, Khoa Nguyen, Antonis Michalas:
A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning. 307-329 - Tianxiang Dai, Li Duan, Yufan Jiang, Yong Li, Fei Mei, Yulian Sun:
Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU. 330-349
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.