Accepted Papers

NordSec 2014 Accepted Papers:


  • Aleksandr Lenin, Jan Willemson and Dyan Sari. Attacker profiling in quantitative security assessment based on attack trees
  • Ahto Buldas, Ahto Truu, Risto Laanoja and Rainer Gerhards. Efficient Record-Level Keyless Signatures for Logs
  • Aapo Kalliola, Tuomas Aura and Sanja Šćepanović. Denial-of-service mitigation for Internet services
  • Elena Reshetova, Janne Karhunen, Thomas Nyman and N. Asokan. Security of OS-level virtualization technologies
  • Alberto Trombetta, Giuseppe Persiano and Stefano Braghin. Processing private queries over an obfuscated database using hidden vector encryption
  • Frédéric Besson, Nataliia Bielova and Thomas Jensen. Browser Randomisation against Fingerprinting: a Quantitative Information Flow Approach
  • Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Haakon Jacobsen, Rune Erlend Jensen and Mohamed El-Hadedy. $\pi$-Cipher: AuthenticatedEncryption for Big Data
  • Markku Antikainen, Tuomas Aura and Mikko Särelä. Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch
  • Liangyu Xu and Amin B. Cremers. Patients’ Privacy Protection against Insurance Companies in eHealth Systems
  • Anika Pflug and Christoph Busch. Segmentation and Normalization of Human Ears using Cascaded Pose Regression
  • Marco Giunti. Static semantics of secret channel abstractions
  • Kalpana Gondi, A. Prasad Sistla and Venkat Venkatakrishnan. DEICS: Data Erasure In Concurrent Software
  • Dan Bogdanov, Sven Laur and Riivo Talviste. A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation
  • Erik Bergström and Rose-Mharie Åhlfeldt. Information Classification Issues
  • Julio Angulo, Erik Wästlund and Johan Högberg. What would it take for you to tell your secrets to a cloud?

Leave a Reply

Your email address will not be published.