Security and Privacy Protection in Information Processing Systems

28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings

  • Lech J. Janczewski
  • Henry B. Wolfe
  • Sujeet Shenoi

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 405)

Table of contents

  1. Front Matter
  2. Malware

    1. Rafiqul Islam, Irfan Altas, Md. Saiful Islam
      Pages 1-13
    2. Suyeon Lee, Jehyun Lee, Heejo Lee
      Pages 14-27
    3. Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mengmeng Ge
      Pages 28-41
  3. Authentication and Authorization

    1. William J. Caelli, Lam-For Kwok, Dennis Longley
      Pages 42-54
    2. Sabrina Kirrane, Alessandra Mileo, Stefan Decker
      Pages 69-82
    3. Thang Hoang, Deokjai Choi, Viet Vo, Anh Nguyen, Thuc Nguyen
      Pages 83-101
    4. Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes
      Pages 102-110
  4. Network Security/ Cryptography

    1. Markus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig
      Pages 111-124
    2. Chai Wen Chuah, Edward Dawson, Leonie Simpson
      Pages 125-138
    3. Huafei Zhu, Wee-Siong Ng, See-Kiong Ng
      Pages 139-147
  5. Software Security

    1. Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert
      Pages 148-161
    2. Alessandro Armando, Alessio Merlo, Luca Verderame
      Pages 176-189
    3. Peter Teufl, Thomas Zefferer, Christof Stromberger
      Pages 203-216
    4. Mounir Assaf, Julien Signoles, Frédéric Tronel, Éric Totel
      Pages 231-244
  6. Policy Compliance and Obligations

  7. Privacy Protection

    1. Padmanabhan Krishnan, Kostyantyn Vorobyov
      Pages 272-285
    2. Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar Weippl
      Pages 286-299
  8. Risk Analysis and Security Metrics

    1. Lisa Rajbhandari, Einar Snekkenes
      Pages 315-329
    2. Jin B. Hong, Dong Seong Kim
      Pages 330-343
    3. Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, Vivek Shandilya
      Pages 344-365
  9. Social Engineering

    1. Kathryn Parsons, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, Cate Jerram
      Pages 366-378
    2. Wayne D. Kearney, Hennie A. Kruger
      Pages 379-390
    3. Lotfi Ben Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat Bhargava, Mohd Murtadha Mohamad
      Pages 391-404
  10. Security Management/Forensic

    1. Gurpreet Dhillon, Romilla Chowdhuri, Filipe de Sá-Soares
      Pages 405-418
    2. Thomas Laurenson
      Pages 419-433
  11. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on malware, authentication and authorization, network security/cryptography, software security, policy compliance and obligations, privacy protection, risk analysis and security metrics, social engineering, and security management/forensics.


Web services cloud computing denial of service network security smartphones

Editors and affiliations

  • Lech J. Janczewski
    • 1
  • Henry B. Wolfe
    • 2
  • Sujeet Shenoi
    • 3
  1. 1.The University of AucklandAucklandNew Zealand
  2. 2.University of OtagoDunedinNew Zealand
  3. 3.The University of TulsaTulsaUSA

Bibliographic information

  • DOI
  • Copyright Information IFIP International Federation for Information Processing 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-39217-7
  • Online ISBN 978-3-642-39218-4
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software
Energy, Utilities & Environment