© 2013

Security and Privacy Protection in Information Processing Systems

28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings

  • Lech J. Janczewski
  • Henry B. Wolfe
  • Sujeet Shenoi
Conference proceedings SEC 2013

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 405)

Table of contents

  1. Front Matter
  2. Malware

    1. Rafiqul Islam, Irfan Altas, Md. Saiful Islam
      Pages 1-13
    2. Suyeon Lee, Jehyun Lee, Heejo Lee
      Pages 14-27
    3. Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mengmeng Ge
      Pages 28-41
  3. Authentication and Authorization

    1. William J. Caelli, Lam-For Kwok, Dennis Longley
      Pages 42-54
    2. Sabrina Kirrane, Alessandra Mileo, Stefan Decker
      Pages 69-82
    3. Thang Hoang, Deokjai Choi, Viet Vo, Anh Nguyen, Thuc Nguyen
      Pages 83-101
    4. Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes
      Pages 102-110
  4. Network Security/ Cryptography

    1. Markus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig
      Pages 111-124
    2. Chai Wen Chuah, Edward Dawson, Leonie Simpson
      Pages 125-138
    3. Huafei Zhu, Wee-Siong Ng, See-Kiong Ng
      Pages 139-147
  5. Software Security

    1. Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert
      Pages 148-161
    2. Alessandro Armando, Alessio Merlo, Luca Verderame
      Pages 176-189
    3. Peter Teufl, Thomas Zefferer, Christof Stromberger
      Pages 203-216
    4. Mounir Assaf, Julien Signoles, Frédéric Tronel, Éric Totel
      Pages 231-244
  6. Policy Compliance and Obligations

About these proceedings


This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on malware, authentication and authorization, network security/cryptography, software security, policy compliance and obligations, privacy protection, risk analysis and security metrics, social engineering, and security management/forensics.


Web services cloud computing denial of service network security smartphones

Editors and affiliations

  • Lech J. Janczewski
    • 1
  • Henry B. Wolfe
    • 2
  • Sujeet Shenoi
    • 3
  1. 1.The University of AucklandAucklandNew Zealand
  2. 2.University of OtagoDunedinNew Zealand
  3. 3.The University of TulsaTulsaUSA

Bibliographic information

Industry Sectors
IT & Software
Consumer Packaged Goods
Materials & Steel
Finance, Business & Banking
Energy, Utilities & Environment
Oil, Gas & Geosciences