Information Security Theory and Practice

10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings

  • Sara Foresti
  • Javier Lopez

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9895)

Also part of the Security and Cryptology book sub series (LNSC, volume 9895)

Table of contents

  1. Front Matter
    Pages I-X
  2. Authentication and Key Management

    1. Front Matter
      Pages 1-1
    2. Frank Morgner, Paul Bastian, Marc Fischlin
      Pages 3-18
    3. Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent
      Pages 19-34
    4. Vlasta Stavova, Vashek Matyas, Mike Just
      Pages 35-50
  3. Secure Hardware Systems

    1. Front Matter
      Pages 51-51
    2. Jan Tobias Mühlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, Frank Piessens
      Pages 53-69
    3. Vassilios Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis
      Pages 70-84
    4. Kyriakos Stefanidis, Artemios G. Voyiatzis
      Pages 85-99
  4. Attacks to Software and Network Systems

    1. Front Matter
      Pages 101-101
    2. Ishai Rosenberg, Ehud Gudes
      Pages 103-119
    3. Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy
      Pages 120-135
    4. Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet
      Pages 136-152
    5. Guillaume Barbu, Alberto Battistello
      Pages 153-168
  5. Access Control and Data Protection

    1. Front Matter
      Pages 169-169
    2. Leila Bahri, Barbara Carminati, Elena Ferrari, William Lucia
      Pages 171-186
    3. Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust
      Pages 204-219
  6. Short Papers

    1. Front Matter
      Pages 221-221
    2. Hervé Chabanne, Julien Keuffer, Roch Lescuyer
      Pages 236-244
    3. Fatma Al Maqbali, Chris J. Mitchell
      Pages 245-253
    4. Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos
      Pages 254-261
    5. Madeline Cheah, Siraj A. Shaikh, Jeremy Bryans, Hoang Nga Nguyen
      Pages 262-269
  7. Back Matter
    Pages 271-271

About these proceedings


This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions.

WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.


access control Advanced Encryption Standard (AES) authentication cryptography data protection embedded systems information security intrusion detection key management machine learning network security security security policies security protocols side-channel analysis smart devices systems security passwords privacy

Editors and affiliations

  • Sara Foresti
    • 1
  • Javier Lopez
    • 2
  1. 1.Università degli Studi di MilanoCremaItaly
  2. 2.University of MalagaMalagaSpain

Bibliographic information

  • DOI
  • Copyright Information IFIP International Federation for Information Processing 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-45930-1
  • Online ISBN 978-3-319-45931-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software