Skip to main content
  • Conference proceedings
  • © 2012

Foundations and Practice of Security

4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers

  • Up-to-date results
  • Fast-track conference proceedings
  • State-of-the-art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6888)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FPS: International Symposium on Foundations and Practice of Security

Conference proceedings info: FPS 2011.

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 papers)

  1. Front Matter

  2. Keynote Address

    1. Preserving Privacy in Online Social Networks

      • Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi
      Pages 1-13
  3. Short Papers

    1. TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections

      • Jordi Pujol-Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca, Oriol Farràs
      Pages 14-22
    2. Automated Verification of Block Cipher Modes of Operation, an Improved Method

      • Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini
      Pages 23-31
  4. Pervasive Security and Threshold Cryptography

    1. SC 2: Secure Communication over Smart Cards

      • Nicola Dragoni, Eduardo Lostal, Davide Papini, Javier Fabra
      Pages 32-48
    2. Private Identification of RFID Tags

      • Behzad Malek, Ali Miri
      Pages 49-61
  5. Encryption, Cryptanalysis and Automatic Verification

    1. A Novel Commutative Blinding Identity Based Encryption Scheme

      • Yu Chen, Song Luo, Jianbin Hu, Zhong Chen
      Pages 73-89
    2. A Computational Indistinguishability Logic for the Bounded Storage Model

      • Gilles Barthe, Mathilde Duclos, Yassine Lakhnech
      Pages 102-117
  6. Keynote Addresses

    1. Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol

      • Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis
      Pages 118-131
    2. Secret Key Establishment over Noisy Channels

      • Hadi Ahmadi, Reihaneh Safavi-Naini
      Pages 132-147
  7. Formal Methods and Network Security

    1. Formal Specification and Validation of Security Policies

      • Tony Bourdier, Horatiu Cirstea, Mathieu Jaume, Hélène Kirchner
      Pages 148-163
    2. Vote-Independence: A Powerful Privacy Notion for Voting Protocols

      • Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech
      Pages 164-180
  8. Ongoing Research

    1. A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress

      • Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquin Garcia-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris
      Pages 208-217
    2. A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress

      • Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Régine Laleau, Richard St-Denis
      Pages 218-226
    3. Specification and Verification of Access Control Policies in EB3SEC: Work in Progress

      • Pierre Konopacki, Hakim Belhaouari, Marc Frappier, Régine Laleau
      Pages 227-233
    4. A Metamodel of the B Modeling of Access-Control Policies: Work in Progress

      • Jérémy Milhau, Marc Frappier, Régine Laleau
      Pages 234-241

Other Volumes

  1. Foundations and Practice of Security

About this book

This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methods in network security.

Editors and Affiliations

  • TELECOM-Bretagne, Campus de Rennes, Cesson Sévigné Cedex, France

    Joaquin Garcia-Alfaro

  • Université Joseph Fourier, Laboratoire Verimag, Centre Equation, Gires, France

    Pascal Lafourcade

Bibliographic Information

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access