Accepted Papers

STM 2013 Accepted Papers

(Papers are sorted according to the alphabetical order of authors)

  • Marco Botta (Univ. di Torino), Davide Cavagnino (Univ. di Torino) and Victor Pomponiu (University of Pittsburgh).                                                                                                                                         Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain
  • Mauro Conti (University of Padua, Italy), Nicola Dragoni (Technical University of Denmark) and Sebastiano Gottardo (University of Padua, Italy and Technical University of Denmark).           MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities
  • Alessandra De Benedictis (Department of Electrical Engineering and Information Technology - University of Naples Federico II - Naples, Italy), Behzad Koosha (Center for Secure Information Systems - George Mason University - Fairfax, VA, USA), Massimiliano Albanese (Center for Secure Information Systems - George Mason University - Fairfax, VA, USA) and Valentina Casola (Department of Electrical Engineering and Information Technology - University of Naples Federico II - Naples, Italy).                                                                                                                                                      A Probabilistic Framework for Distributed Localization of Attackers in MANETs
  • Constantinos Delakouridis (Athens University of Economics and Business) and Christos Anagnostopoulos (Ionian University, Corfu, Greeece).                                                                                  On Enhancement of ‘Share The Secret’ Scheme for Location Privacy
  • Marco Rocchetto (University of Verona, Italy), Luca Viganò (University of Verona, Italy), Marco Volpe (University of Verona, Italy), and Giacomo Dalle Vedove (University of Verona, Italy).        Using Interpolation for the Verification of Security Protocols
  • Ana Ferreira (University of Luxembourg), Jean-Louis Huynen (University of Luxembourg), Vincent Koenig (University of Luxembourg), Gabriele Lenzini (University of Luxembourg) and Salvador Rivas (University of Luxembourg).                                                                                                                 Socio-technical study on the effect of Trust and Context when choosing WiFi names
  • Javier Franco-Contreras (Institut Mines-TELECOM/ TELECOM Bretagne), Gouenou Coatrieux (Institut Mines-TELECOM/ TELECOM Bretagne), Nora Cuppens-Boulahia (Institut Mines-TELECOM/ TELECOM Bretagne), Fréderic Cuppens (Institut Mines-TELECOM/ TELECOM Bretagne) and Christian Roux (Institut Mines-TELECOM/ TELECOM Bretagne).                  Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation
  • Thomas Koslowski (University of Freiburg) and Christian Zimmermann (University of Freiburg).                                                                                                                                                                     Towards a Detective Approach to Business Process-centered Resilience
  • Peeter Laud (Cybernetica AS, Estonia) and Alisa Pankova (University of Tartu, Estonia).                        New Attacks against Transformation-Based Privacy-Preserving Linear Programming
  • Yannis Mallios (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Dilsun Kaynar (Carnegie Mellon University), Fabio Martinelli (Istituto di Informatica e Telematica, National Research Council) and Charles Morisset (Newcastle University).                                                 Probabilistic Cost Enforcement of Security Policies
  • Alexios Mylonas (Athens University of Economics and Business), Nikolaos Tsalis (Athens University of Economics and Business) and Dimitris Gritzalis (Athens University of Economics and Business).    Evaluating the manageability of web browsers controls
  • Ryan Riley (Qatar University), Chris Clifton (Purdue University) and Qutaibah Malluhi (Qatar University).                                                                                                                                                     Maintaing Database Anonymity in the Presence of Queries
  • Lil Maria Rodriguez-Henriquez (CINVESTAV-IPN, Mexico) and Debrup Chakraborty (CINVESTAV-IPN, Mexico).                                                                                                                            RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
  • Thomas Stocker (University of Freiburg, Germany) and Frank Böhr (University of Freiburg, Germany).                                                                                                                                                            IF-Net: A Meta-model for Security-oriented Process Specification
  • Nik Sultana (Cambridge University), Moritz Y. Becker (Microsoft Research Cambridge) and Markulf Kohlweiss (Microsoft Research Cambridge).                                                                                             Selective Disclosure in Datalog-based Trust Management
Comments