Sciweavers

SAFECOMP
2015
Springer
8 years 8 months ago
Simulative Evaluation of Security Attacks in Networked Critical Infrastructures
ICT is becoming a fundamental and pervasive component of critical infrastructures (CIs). Despite the advantages that it brings about, ICT also exposes CIs to a number of security a...
Marco Tiloca, Francesco Racciatti, Gianluca Dini
SAFECOMP
2015
Springer
8 years 8 months ago
Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design
This paper addresses quantifying security risks associated with data assets within design models of embedded systems. Attack and system behaviours are modelled as time-dependent st...
Maria Vasilevskaya, Simin Nadjm-Tehrani
SAFECOMP
2015
Springer
8 years 8 months ago
Improving Dependability of Vision-Based Advanced Driver Assistance Systems Using Navigation Data and Checkpoint Recognition
Advanced Driver Assistance Systems (ADAS), like adaptive cruise control, collision avoidance systems, and, ultimately, piloted and autonomous driving are increasingly evolving into...
Ayhan Mehmed, Sasikumar Punnekkat, Wilfried Steine...
SAFECOMP
2015
Springer
8 years 8 months ago
Requirement Engineering for Functional Alarm System for Interoperable Medical Devices
Abstract. This paper addresses the problem of high-assurance operation for medical cyber-physical systems built from interoperable medical devices. Such systems are different from...
Krishna K. Venkatasubramanian, Eugene Y. Vasserman...
SAFECOMP
2015
Springer
8 years 8 months ago
Automatic Architecture Hardening Using Safety Patterns
Safety critical systems or applications must satisfy safety requirements ensuring that catastrophic consequences of combined component failures are avoided or kept below a satisfyi...
Kevin Delmas, Rémi Delmas, Claire Pagetti
PROVSEC
2015
Springer
8 years 8 months ago
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
Christian Badertscher, Christian Matt 0002, Ueli M...
PROVSEC
2015
Springer
8 years 8 months ago
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
Abstract. Sanitizable signatures, introduced by Ateniese et al. at ESORICS’05, allow to issue a signature on a message where certain predefined message blocks may later be chang...
David Derler, Daniel Slamanig
PROVSEC
2015
Springer
8 years 8 months ago
BetterTimes - Privacy-Assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields
We present a privacy-assured multiplication protocol using which an arbitrary arithmetic formula with inputs from two parties over a finite field Fp can be jointly computed on en...
Per A. Hallgren, Martín Ochoa, Andrei Sabel...
PROVSEC
2015
Springer
8 years 8 months ago
Functional Signcryption: Notion, Construction, and Applications
Functional encryption (FE) enables sophisticated control over decryption rights in a multi-user scenario, while functional signature (FS) allows to enforce complex constraints on s...
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay