IFIPSEC 2019 June 25, 2019 to June 27, 2019, Lisbon, Portugal

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Keynote 1: Access Control Evolution and Prospects Ravi Sandhu N/A
Crypto and Encryption Fengjun Li , Anirudh Narasimman , Qiaozhi Wang , Dongwon Lee , And Bo Luo N/A
BlockTag: Design and Applications of a Tagging System for Blockchain Analysis Yazan Boshmaf , Husam Al Jawaheri , And Sabah N/A
Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data Laurent Gomez , Lorenzo Frigerio , Anderson Oliveira , And Patrick Duverger N/A
ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment Majid Hatamian , Sebastian Rannenberg N/A
SocialAuth: Designing Touch Behavioral Smartphone User Authentication based on Social Networking Applications Wenjuan Li , Weizhi Meng , Lijun Jiang , And Jianying Zhou N/A
Predicting Students’ Security Behavior Using Information-Motivation-Behavioral Skills Model Ali Farooq , Debora Jeske , And Jouni Isoaho N/A
Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym David Harborth , Xinyuan Cai , And Sebastian Pape N/A
Towards Contractual Agreements for Revocation of Online Data Markus Dürmuth , Theodor Schnitzler , And Christina Pöpper N/A
Physical presence verification using TOTP and QR codes Emin Seigneur N/A
An Authentication and Key Agreement Scheme using ECQV in IoT Environments Dae-hwi Lee N/A
Efficiently Vectorized Anonymization in Data Mining using Genetic Algorithms Gerald Quirchmayr , Peter Kieseberg , Fatemeh Amiri , Alessio Weippl N/A
Access Control Models via Non-Standard Logics Mikhail A. N/A
On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques Sarwar Marco-gisbert N/A
Automatically Proving Purpose Limitation in Software Architectures Hannes Federrath , Tobias Mueller , Kai Bavendiek , Florian Wittner , Thea Schwaneberg , Christian-alexander Behrendt , Wolfgang Schulz , And Sibylle Schupp N/A
Commit Signatures for Centralized Version Control Systems (Extended Abstract) Reza Curtmola , Santiago Torres-arias , Sangat Vaidya , And Justin Cappos N/A
A Short-cycle Framework Approach to Integrating Psychometric Feedback and Data Analytics to Rapid Cyber Defense Erik Moore , Steve Fulton , Roberta Mancuso , Tristen Likarish N/A
Identifying Security Requirements Body of Knowledge for the Security Systems Engineer Sune Marnewick N/A
Introducing Research into the Undergraduate Curriculum in Cybersecurity Susanne Damopoulos N/A
Compliance vs. Risk Management - Two Perspectives on Supply Chain Risk Management Rob Arnold N/A
Towards an Automated Extraction of ABAC Constraints from Natural Language Policies Hassan Takabi , Manar Alohaly , And Eduardo Blanco N/A
An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications Eric Totel , David Lanoë , Michel Hurfin , And Carlos Maziero N/A
A Structured Comparison of the Corporate Information Security Maturity Level Michael Pape N/A
Privacy by Design using Agents and Sovereign Identities Kalman Anderson-priddy N/A
ID-Based Proxy Re-encryption for Collusion Resistance in Cloud Storage Won-bin Lee N/A
A Machine Learning Framework for Studying User Behaviors in Phishing Email Processing Yi Li , Kaiqi Li N/A
On the Administrative Information Security: definition and impact on Security Governance Gurpreet Picoto N/A
Learning Principles and the Secure Programming Clinic Matt Bishop , Melissa Dark , Lynn Niekerk N/A
Light Cryptography Takaaki Mizuki , Pascal Lafourcade , Atsuki Shinagawa N/A
An Educational Intervention for Teaching Secure Coding Practices Lynn Niekerk , Vuyolwethu Mdunyelwa N/A
Performance of Password Guessing Enumerators Under Cracking Conditions Patrick Lacharme , Mathieu Valois , And Bars N/A
An Offline Dictionary Attack against zkPAKE Protocol José Becerra , Peter Ryan , Petra Sala , And Marjan Skrobot N/A
Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption Dominik Ziegler , Josef Sabongui , And Gerald Palfinger N/A
Lessons Learned from an Organizational Information Security Awareness Campaign Jacques Scrimgeour N/A
A Comprehensive Framework for Understanding Security Culture in Organizations Alaa Tolah , Steven Papadaki N/A
Using Gamification to Improve Information Security Behavior: A Password Strength Experiment Jacques Dietz N/A
Forward Secure Identity-based Signature Scheme with RSA Hankyung Ko , Gweonho Jeong , Jongho Kim , Jihye Oh N/A
Removing Problems in Rule-Based Policies Zheng Cheng , Jean-claude Royer , And Massimo Tisi N/A
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild Luigi Lo Iacono , Stephan Wiefling , And Markus Dürmuth N/A
Andragogy as a Scientific Basis for Training Professionals in Information Security Alexander Miloslavskaya N/A
Identifying Information Security Risks in a Social Network using Self-organising Map Rudi Serfontein , Hennie Drevin N/A
Blockchain and its Security: Ignore or Insert into Academic Training? Natalia Tolstoy N/A
Control Logic Injection Attacks on Industrial Control Systems Hyunguk Ahmed N/A
Addressing the Graduate Student Pipeline Problem in Cybersecurity Susanne Wetzel N/A
Integrating Blockchain into Security Curricula Kane Smith N/A
App Users Privacy and Personal Data Protection Solomon Meso N/A
A theoretical study and review on Blockchain's Privacy Mechanisms Adam Crainicu N/A
WHOIS and the GDPR - A (never) ending story in cyberspace? Matthias Hudobnik N/A
Soter: Trust Discovery Framework for Internet of Medical Things (IoMT) Maha Khan N/A