Skip to main content
  • Conference proceedings
  • © 2016

Information Security Theory and Practice

10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9895)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISTP: IFIP International Conference on Information Security Theory and Practice

Conference proceedings info: WISTP 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

    Pages I-X
  2. Authentication and Key Management

    1. Front Matter

      Pages 1-1
    2. Securing Transactions with the eIDAS Protocols

      • Frank Morgner, Paul Bastian, Marc Fischlin
      Pages 3-18
    3. Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY

      • Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent
      Pages 19-34
    4. Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms

      • Vlasta Stavova, Vashek Matyas, Mike Just
      Pages 35-50
  3. Secure Hardware Systems

    1. Front Matter

      Pages 51-51
    2. An Implementation of a High Assurance Smart Meter Using Protected Module Architectures

      • Jan Tobias Mühlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, Frank Piessens
      Pages 53-69
    3. Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments

      • Vassilios Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis
      Pages 70-84
    4. An HMM-Based Anomaly Detection Approach for SCADA Systems

      • Kyriakos Stefanidis, Artemios G. Voyiatzis
      Pages 85-99
  4. Attacks to Software and Network Systems

    1. Front Matter

      Pages 101-101
    2. Attacking and Defending Dynamic Analysis System-Calls Based IDS

      • Ishai Rosenberg, Ehud Gudes
      Pages 103-119
    3. Towards Automatic Risk Analysis and Mitigation of Software Applications

      • Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy
      Pages 120-135
    4. Runtime Code Polymorphism as a Protection Against Side Channel Attacks

      • Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet
      Pages 136-152
    5. Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks

      • Guillaume Barbu, Alberto Battistello
      Pages 153-168
  5. Access Control and Data Protection

    1. Front Matter

      Pages 169-169
    2. LAMP - Label-Based Access-Control for More Privacy in Online Social Networks

      • Leila Bahri, Barbara Carminati, Elena Ferrari, William Lucia
      Pages 171-186
    3. Fault-Channel Watermarks

      • Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust
      Pages 204-219

Other Volumes

  1. Information Security Theory and Practice

About this book

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions.

WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.

Editors and Affiliations

  • Università degli Studi di Milano, Crema, Italy

    Sara Foresti

  • University of Malaga, Malaga, Spain

    Javier Lopez

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access