author: joaquin garcia alfaro

Foundations and Practice of Security: 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers

... TPA can check the integrity of files/blocks on behave of the users/mediator by sending chal = {(8, vs)} to the cloud ... Task 1 to |A || BI||c. DTE &L (**) \es User 3 User 4 ~ k=2 | Task 2 & | FG |H| || to L-2 User 5 User 6 2. To ...

Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II

... Android devices/versions: Nexus 6/Android 7.1.1, Moto X/Android 5.1, and Moto G2/Android 5.1.1 by running our subject apps on these devices in different combinations. This test has not revealed any deployment and operational issues. For ...

Foundations and Practice of Security: 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers

... clone detector framework proposed in [9]. RE-Clone considers the same problem definition, that is the exact and inexact clone detection, as stated in [9]. Exact clones share the same assembly features, i.e., mnemonics, operands and ...

Foundations and Practice of Security: 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers

... delegator, delegate a subset of their user attributes to another user acting as the delegatee. The delegated ... Engineering department (e.g. user.role = "faculty" AND user.department = "SoftEng"). In this example, both the attributes ...

Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part I

... Theme Change, Check 50 4250 for Updates 0% 100% FileZilla File Upload & Download 20 90K 0% 100% WinSCP File Upload ... WinRAR File Compression, Browsing, 10 230K 0% Test/Repair Archives, Licensing, 100% Check for Updates Firefox File ...

Computer Security: ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers

... file and folder and email encryption. Integration with Symantec Data Loss Prevention automatically encrypts sensitive data being moved onto removable media devices or residing in emails and files. Robust management features include ...

Research in Attacks, Intrusions, and Defenses: 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings

... thegeekstuff.com/2010/11/50-linux-commands/?utmsource= feedburner Percival, C.: Cache missing for fun and profit. In: Proceedings of BSDCan (2005) Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud ...

Data Privacy Management and Autonomous Spontaneous Security: 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers

... tag PRNG and matrix algebra operations, Dolev et al. present in [17] two low-overhead proactive unidirectional ... (UC) model [8]. It is shown that the O-TRAP protocol meets the UC definition of anonymous authentication and anonymous key ...

Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers

... AdIDoS. In the following, we give a detailed view on some specific implementation issues. 5.1 AdIDoS for WS-Attacker We implemented all XML-based DoS attacks listed in Sect. 2.3 as a WS Attacker plugin – called AdIDoS (Adaptive ...

Foundations and Practice of Security: 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers

... decrypted ciphertext CTPK by the transformation service using the transformation key. The session service performs a Decaps operation on CTPK using the decapsulation key skPK,ID and obtains k which is used by FileCrypt to decrypt CTk ...

Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers

... car manufacturer stocks produced cars using an outsourced parking service. The data related to production, stocks, and sale of cars flow across organizational boundaries. The XYZ car manufacturer produces custom-built cars, runabout cars ...

Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers

... Yuilop (1.4.2) 4879 1615 0.8 19.7 Table 4. Runtime comparison with micro-benchmarks for normal function calls and guarded function calls with policies disabled as well as the introduced runtime overhead. Function call Original call (ms) ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.