Foundations and Practice of Security

6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers

  • Jean Luc Danger
  • Mourad Debbabi
  • Jean-Yves Marion
  • Joaquin Garcia-Alfaro
  • Nur Zincir Heywood

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8352)

Also part of the Security and Cryptology book sub series (LNSC, volume 8352)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Keynote Address

    1. Front Matter
      Pages 1-1
    2. Jean Goubault-Larrecq, Julien Olivain
      Pages 3-16
  3. Security Protocols

    1. Front Matter
      Pages 17-17
    2. Matthias Wachs, Martin Schanzenbach, Christian Grothoff
      Pages 19-30
    3. Huihui Yang, Lei Jiao, Vladimir A. Oleshchuk
      Pages 31-45
  4. Formal Methods

    1. Front Matter
      Pages 63-63
    2. Andrew Bedford, Josée Desharnais, Théophane G. Godonou, Nadia Tawbi
      Pages 83-101
  5. Physical Security

    1. Front Matter
      Pages 103-103
    2. Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria
      Pages 105-121
    3. Sylvain Guilley, Damien Marion, Zakaria Najm, Youssef Souissi, Antoine Wurcker
      Pages 122-139
  6. Attack Classification and Assessment

    1. Front Matter
      Pages 159-159
    2. Alireza Sadighian, José M. Fernandez, Antoine Lemay, Saman T. Zargar
      Pages 161-177
    3. Vincenzo Ciancia, Fabio Martinelli, Matteucci Ilaria, Charles Morisset
      Pages 178-186
  7. Access Control

    1. Front Matter
      Pages 187-187
    2. Firas Al Khalil, Alban Gabillon, Patrick Capolsini
      Pages 189-208
    3. Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Nikolaos Dellas, Joaquin Garcia-Alfaro, Dimitra I. Kaklamani et al.
      Pages 209-226

About these proceedings

Introduction

This book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Rochelle, France, in October 2013. The 25 revised full papers presented together with a keynote address were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on security protocols, formal methods, physical security, attack classification and assessment, access control, cipher attacks, ad-hoc and sensor networks, resilience and intrusion detection.

Keywords

access control authentication block ciphers cipher attacks cryptography formal methods formal security models intrusion detection key management networks physical security security protocols security services

Editors and affiliations

  • Jean Luc Danger
    • 1
  • Mourad Debbabi
    • 2
  • Jean-Yves Marion
    • 3
  • Joaquin Garcia-Alfaro
    • 4
  • Nur Zincir Heywood
    • 5
  1. 1.Dept. Commun. & ElectroniqueTélécom ParisTechParisFrance
  2. 2.Concordia Institute for Information Syst Concordia University Research Chair TierConcordia UniversityMontrealCanada
  3. 3.École des MinesNancyFrance
  4. 4.RST Department, Rm A105-2Télécom SudParisEvryFrance
  5. 5.Dalhousie UniversityHalifaxCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-05302-8
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-05301-1
  • Online ISBN 978-3-319-05302-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace