NordSec 2011 Accepted Full Papers

  • Hakem Beitollahi. A Ring Based Onion Circuit for Hidden Services

  • Károly Boda, Ádám Máté Földes, Gábor György Gulyás and Sándor Imre. User Tracking on the Web via Cross-Browser Fingerprinting

  • Jordi Cucurull, Simin Nadjm-Tehrani and Massimiliano Raciti. Modular anomaly detection for smartphone ad-hoc communication

  • Mathias Claes, Vincent Van Der Leest and An Braeken. Comparison of SRAM and D Flip-Flop PUFs in 65nm technology

  • Jérôme Dossogne and Frédéric Lafitte. Mental Voting Booths

  • Kazutomo Hamamoto, Yasuyuki Tahara and Akihiko Ohsuga. Methods for Privacy Protection Considering Status of Service Provider and User Community

  • Kirsi Helkala and Nils Kalstad Svendsen. Security and Memorability Analysis of Passwords Generated by Using Association Element and Personal Factor

  • Elahe Kani-Zabihi and Martin Helmhout. Increasing Service Users’ Privacy Awareness by Introducing On-line Interactive Privacy Features

  • Frédérick Lemay, Raphael Khoury and Nadia Tawbi. Optimized Inlining of Runtime Monitors

  • Radu Lupu, Eugen Borcoci and Tinku Rasheed. Identity-based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Service

  • Veelasha Moonsamy, Ronghua Tian and Lynn Batten. Feature Reduction to speed up Malware Classification

  • Assem Nazar, Mark M. Seeger and Harald Baier. Rooting Android  —  Extending the ADB by an Auto-Connecting WiFi-Accessible Root Service

  • Jaydip Sen and Subhamoy Maitra. An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks

  • Deian Stefan, David Mazieres, John Mitchell and Alejandro Russo. Disjunction Category Labels

  • Inger Anne Tøndel. Visualization Control for Event-Based Public Display Systems used in a Hospital Setting

  • Erich Wenger and Michael Hutter. Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations

NordSec 2011 Accepted Short Papers

  • Monika Desoi, Matthias Pocs and Benjamin Stach. The “Three-Step-Model” – Legally Compatible Design of Future Biometric Systems for Crime Prevention

  • Ashar Javed. CSP AiDer: An Automated Recommendation of Content Security Policy for Web Applications

  • Kristjan Valur Jonsson and Ymir Vigfusson. Securing Distributed Aggregation with Trusted Devices

  • Audun Jøsang and Kashif Sana Dar. Server Certificates based on DNSSEC

  • Dalia Khader, Ben Smyth, Peter Ryan and Feng Hao. A Fair and Robust Voting System by Broadcast

  • Igor Kotenko, Alexey Konovalov and Andrey Shorov. Simulation of botnets and protection mechanisms against them: software environment and experiments

  • Hanno Langweg. Comparison of Malware Protection of Electronic Signature Applications

  • Benedikt Westermann, Lars Fischer, Vinh Pham and Dogan Kesdogan. 50 Bucks Attack on Tor