Skip to main content
  • Conference proceedings
  • © 2018

ICT Systems Security and Privacy Protection

33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings

Conference proceedings info: SEC 2018.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

    Pages I-XIII
  2. Authentication

    1. Front Matter

      Pages 1-1
    2. CPMap: Design of Click-Points Map-Based Graphical Password Authentication

      • Weizhi Meng, Fei Fei, Lijun Jiang, Zhe Liu, Chunhua Su, Jinguang Han
      Pages 18-32
    3. The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View

      • Pardon Blessings Maoneke, Stephen Flowerday, Naomi Isabirye
      Pages 33-46
    4. A Hypergame Analysis for ErsatzPasswords

      • Christopher N. Gutierrez, Mohammed H. Almeshekah, Saurabh Bagchi, Eugene H. Spafford
      Pages 47-61
    5. Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning

      • Giacomo Giorgi, Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi
      Pages 62-76
  3. Failures of Security Management

    1. Front Matter

      Pages 77-77
    2. Practical Cryptographic Data Integrity Protection with Full Disk Encryption

      • Milan Brož, Mikuláš Patočka, Vashek Matyáš
      Pages 79-93
    3. When Your Browser Becomes the Paper Boy

      • Juan D. Parra Rodriguez, Eduard Brehm, Joachim Posegga
      Pages 94-107
    4. EMPower: Detecting Malicious Power Line Networks from EM Emissions

      • Richard Baker, Ivan Martinovic
      Pages 108-121
    5. Attacking RO-PUFs with Enhanced Challenge-Response Pairs

      • Nils Wisiol, Marian Margraf
      Pages 122-126
    6. A Security Analysis of FirstCoin

      • Alexander Marsalek, Christian Kollmann, Thomas Zefferer
      Pages 127-140
    7. PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces

      • Choongin Lee, Jeonghan Bae, Heejo Lee
      Pages 141-155
    8. Assessing Privacy Policies of Internet of Things Services

      • Niklas Paul, Welderufael B. Tesfay, Dennis-Kenji Kipker, Mattea Stelter, Sebastian Pape
      Pages 156-169
    9. JonDonym Users’ Information Privacy Concerns

      • David Harborth, Sebastian Pape
      Pages 170-184
  4. Security Management / Forensic

    1. Front Matter

      Pages 185-185
    2. Optimal Security Configuration for Cyber Insurance

      • Fabio Martinelli, Ganbayar Uuganbayar, Artsiom Yautsiukhin
      Pages 187-200
    3. The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter

      • Clemens Sauerwein, Christian Sillaber, Michael M. Huber, Andrea Mussmann, Ruth Breu
      Pages 201-215
    4. Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic

      • Mayank Agarwal, Rami Puzis, Jawad Haj-Yahya, Polina Zilberman, Yuval Elovici
      Pages 216-230

Other Volumes

  1. ICT Systems Security and Privacy Protection

About this book

This book constitutes the refereed proceedings of the 33rd IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018.
The 27 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in the following topical sections: authentication, failures of security management, security management/forensic, and software security/attacks.

Editors and Affiliations

  • University of Auckland, Auckland, New Zealand

    Lech Jan Janczewski

  • Wrocław University of Technology, Wroclaw, Poland

    Mirosław Kutyłowski

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access