Information Security Theory and Practice

9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings

  • Raja Naeem Akram
  • Sushil Jajodia
Conference proceedings WISTP 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9311)

Also part of the Security and Cryptology book sub series (LNSC, volume 9311)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Security and Privacy Services

    1. Front Matter
      Pages 1-1
    2. Radim Ošťádal, Petr Švenda, Vashek Matyáš
      Pages 3-19
    3. Tassos Dimitriou, Ioannis Krontiris
      Pages 20-35
    4. Alejandro Calleja, Pedro Peris-Lopez, Juan E. Tapiador
      Pages 36-51
    5. Neyire Deniz Sarier
      Pages 52-67
  3. Secure Resource Sharing and Access Control

    1. Front Matter
      Pages 69-69
    2. Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg, Frank Piessens
      Pages 71-87
    3. Hoi Le, Reihaneh Safavi-Naini, Asadullah Galib
      Pages 88-103
    4. Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas, Ioannis Papaefstathiou
      Pages 120-133
  4. Secure Devices and Execution Environment

    1. Front Matter
      Pages 135-135
    2. Ghada Arfaoui, Saïd Gharout, Jean-François Lalande, Jacques Traoré
      Pages 153-168
    3. Duc-Phong Le, Chik How Tan, Michael Tunstall
      Pages 169-184
  5. Challenges of Security and Reliability

    1. Front Matter
      Pages 185-185
    2. Siegfried Rasthofer, Irfan Asrar, Stephan Huber, Eric Bodden
      Pages 187-202
    3. Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers
      Pages 203-218
  6. Short Papers

    1. Front Matter
      Pages 235-235
    2. David Jaeger, Amir Azodi, Feng Cheng, Christoph Meinel
      Pages 237-248
    3. Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller
      Pages 249-259
    4. George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas, Ioannis Askoxylakis
      Pages 260-270
    5. Konstantinos Rantos, Konstantinos Fysarakis, Othonas Soultatos, Ioannis Askoxylakis
      Pages 271-280
  7. Back Matter
    Pages 281-281

About these proceedings


This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory and Practices, WISTP 2015, held in Heraklion, Crete, Greece, in August 2015. The 14 revised full papers and 4 short papers presented together were carefully reviewed and selected from 52 submissions. 
WISTP 2015 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of elded systems, the application of security technology, the implementation of systems, and lessons learned. We encouraged submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues. 


Cryptography Security Services Security in Hardware Systems Security Mobile and Wireless Security access control anonymity countermeasures internet of things lightweight cryptography natural language processing network security password hashing security protocols side-channel analysis smart home trusted computing ubiquitous computing vulnerability Web services

Editors and affiliations

  • Raja Naeem Akram
    • 1
  • Sushil Jajodia
    • 2
  1. 1.ISG-SCCUniversity of LondonEghamUnited Kingdom
  2. 2.George Mason UniversityFAIRFAXUSA

Bibliographic information

  • DOI
  • Copyright Information IFIP International Federation for Information Processing 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-24017-6
  • Online ISBN 978-3-319-24018-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking