Publications

Book

  • M. Burmester, G. Tsudik, S. S. Magliveras, I. Ilić, (eds.), “Information Security”, Proceedings of the 13th International Conference on Information Security (ISC2010), LNCS 6531, Springer, 2011.

Book Chapter

  • M. VanHilst and E.B.Fernandez, "A Construct Grid Approach to Security Classification and Analysis", accepted as a chapter in "Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions ", Manish Gupta, John Walp, and Raj Sharman, IGI Global 2011.
  • E.B.Fernandez, N. Yoshioka, H. Washizaki, J. Jurjens, M.VanHilst , and G. Pernul, "Using security patterns to develop secure systems", in H. Mouratidis, Ed., Software engineering for secure systems: Industrial and Research Perspectives, IGI Global Group, 2010.
  • E. B. Fernandez, K. Hashizume, I. Buckley, M. M. Larrondo-Petrie, and M. VanHilst, "Web services security: Standards and products", Chapter 8 in "Web Services Security Development and Architecture: Theoretical and Practical Issues", Carlos A. Gutierrez, Eduardo Fernandez-Medina, and Mario Piattini (Eds.), IGI Global Group 2010. 152-177.
  • E. B. Fernandez, M.M. Larrondo-Petrie, T. Sorgente, and M. VanHilst, "A methodology to develop secure systems using patterns", Chapter 5 in "Integrating security and software engineering: Advances and future vision", H. Mouratidis and P. Giorgini (Eds.), IDEA Press, 2006, 107-126. (ISI BCI)
  • E. B. Fernandez, "Wireless network security for health applications", will appear as Chapter 15 in the "Pervasive Communication Handbook”, M. Ilyas (Ed.), CRC Press 2011.
  • E. B. Fernandez, Carolina Marin, and Maria M. Larrondo Petrie, "Security requirements for social networks in Web 2.0", in the Handbook of Social Networks: Technologies and Applications, B. Furht (Editor), Springer 2010.
  • E.B.Fernandez, "Security patterns and a methodology to apply them", in Security and Dependability for Ambient Intelligence, G. Spanoudakis and A. Maña (Eds.), Springer Verlag, 2009.
  • J. Jurjens and E.B.Fernandez, "Secure database development", in Encyclopedia of Database Systems, Ling Liu and Tamer Oszu (eds.), Springer Verlag, Berlin, Germany, 2009.
  • E. B. Fernandez and M. VanHilst, "An overview of WiMax security", Chapter 10 in the "Handbook of WiMax security and QoS", S. Ahson and M. Ilyas (Eds.), CRC Press, Taylor and Francis Group, Boca Raton, FL, 2008, 197-204.
  • A. Bogdanov, T. Eisenbarth, C.Paar, M. Wolf “Trusted Computing for Automotive Systems“ chapter in Trusted Computing, N.Pohlmann, H.Reimer (eds.), Vieweg-Verlag, 2007.
  • E. B. Fernandez and M. M. Larrondo Petrie, "Securing design patterns for distributed systems", Chapter 3 in "Security in Distributed, Grid, and Pervasive Computing", Y. Xiao (Ed.)., Auerbach Pubs., Taylor & Francis Group, LLC, 2007, 53-66.

Journal

  • A. Bonisoli, J.W. Hirschfeld, S.S. Magliveras (guest eds.): Special issue “Designs, Codes and Cryptography”, 2011 (to appear).
  • K. Gaj and R. Steinwandt (guest eds.): special issue "Hardware Architectures for Algebra, Cryptology and Number Theory" Integration, the VLSI Journal, vol. 44, no. 4, 2011.
  • R. Steinwandt, W. Geiselmann, and Ç.K. Koç (guest eds.): "Special Section on Special-Purpose Hardware for Cryptography and Cryptanalysis" of IEEE Transactions on Computers, vol. 57, no. 11, 2008.
  • M. I. González Vasco and R. Steinwandt (guest eds.): special issue "Applications of Algebra to Cryptography" of Discrete Applied Mathematics, vol. 156, no. 16, 2008.

Journal Article

  • B. Amento, M. Rötteler and R. Steinwandt, "Quantum Binary Field Inversion: Improved Circuit Depth via Choice of Basis Representation", Quantum Information & Computation 13: 116–134, 2013.
  • B. Amento, M. Rötteler and R. Steinwandt, "Efficient quantum circuits for binary elliptic curve arithmetic: reducing T-gate complexity", Quantum Information & Computation 13: 631–644, 2013.
  • L. Klingler, R. Steinwandt and D. Unruh, "On using probabilistic Turing machines to model participants in cryptographic protocols", Theoretical Computer Science 501: 49–51, 2013.
  • M. González Muñiz and R. Steinwandt, "Security of Message Authentication Codes in the Presence of Key-Dependent Messages", Designs, Codes and Cryptography, vol. 64, no. 1-2, pp. 161-169, 2012.
  • R. Steinwandt and A. Suárez Corona: "Identity-based non-interactive key distribution with forward security", Designs, Codes and Cryptography, vol. 64, no. 1-2, pp. 195-208, 2012.
  • V. Božović, D. Socek, R. Steinwandt and V. I. Villányi: "Multi-authority attribute based encryption with honest-but-curious central authority", International Journal of Computer Mathematics (to appear).
  • E.B.Fernandez and Sergio Mujica , “Model-based development of security requirements”, accepted for the CLEI (Latin-American Center for Informatics Studies) Journal (to appear).
  • E.B.Fernandez and Xiaohong Yuan, "Semantic analysis patterns and secure semantic analysis patterns", Int. Journal of Information and Computer Security (IJICS) (to appear).
  • M. González Muñiz and R. Steinwandt: "Security of Message Authentication Codes in the Presence of Key-Dependent Messages", Designs, Codes and Cryptography (to appear).
  • Anthony Marcus, Mihaela Cardei, Ionut Cardei, E.B.Fernandez, Fulvio Frati, and Ernesto Damiani, "A pattern for web-based WSN monitoring", Journal of Communications (JCM), Special Issue on New Advances in Wireless Sensor Networks (to appear).
  • A. Moradi, M. Kirschbaum, T. Eisenbarth, C. Paar: “Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods” IEEE Transactions on Very Large Scale Integration Systems, 2011 (to appear).
  • R. Steinwandt and A. Suárez Corona: "Identity-based non-interactive key distribution with forward security", Designs, Codes and Cryptography (to appear).
  • H. J. Smith, T. Dinev, and H. Xu. 2011. The Information Privacy Research: An Interdisciplinary Review, MIS Quarterly, forthcoming.
  • M. Grassl, I. Ilić, S. S. Magliveras and R. Steinwandt: "Cryptanalysis of the Tillich-Zémor hash function", Journal of Cryptology, vol. 24, no. 1, pp. 148-156, 2011.
  • S. Hinduja, J.W. Patchin, "Cyberbullying: A review of the legal issues facing educators". Preventing School Failure: Alternative Education for Children and Youth, 55(2), 71-78, 2011.
  • Q. Hu, Z.C. Xu, T. Dinev, and H. Ling. " Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?", Communications of the ACM, 54(6), 34-40, 2011.
  • A. Rupp, T. Eisenbarth, and A. Bogdanov: “Hardware SLE Solvers: Efficient Building Blocks for Cryptographic and Cryptanalytic Applications”, Integration, the VLSI Journal, Volume 44, Issue 4, pp. 290-304, 2011.
  • R. Steinwandt and A. Suárez Corona: "Cryptanalysis of a 2-party key establishment based on a semigroup action problem", Advances in Mathematics of Communications, vol. 5, no. 1, pp. 87-92, 2011.
  • H. Xu, T. Dinev, and H. Li. 2011. Trust in the Social Computing: The Case of Peer-to-Peer (P2P) File Sharing Networks, ICST Transactions on Security and Safety, forthcoming
  • H. Xu, T. Dinev, H. J. Smith, and P. Hart. 2011. Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances, Journal of the Association for Information Systems, forthcoming.
  • H. Xu, and T. Dinev. 2011. The Security-Liberty Debate – Individuals’ Attitudes towards Internet Government Surveillance, Electronic Government: An International Journal, forthcoming
  • R.S. Behara, C.D. Huang, and Q. Hu , A System Dynamics Model of Information Security Investments, Journal of Information Systems Security, 6 (2): 30-46, 2010.
  • T. Eisenbarth, C. Paar, and B. Weghenkel: “Building a Side Channel Based Disassembler”, Springer Transactions on Computational Science X, Special Issue on "Security in Computing", pp. 78-99, 2010.
  • W. Geiselmann, K. Matheis and R. Steinwandt: "PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware", Transactions on Computational Science, vol. 10, pp. 298-328, 2010.
  • M. González Muñiz and R. Steinwandt: "Security of Signature Schemes in the Presence of Key-Dependent Messages", Tatra Mountains Mathematical Publications, vol. 47, pp. 15-29, 2010.
  • S. Hinduja, J. Schafer, “Cybercrime units on the world wide web”. Policing: An International Journal of Police Strategies & Management, (2), 278-296, 2010.
  • I. Ilić and S. S. Magliveras, “Weak discrete logarithms in non-abelian groups”, J. of Combin. Math. and Combin. Computing (JCMCC), vol. 74, pp 3-11, 2010.
  • J.W. Patchin, S. Hinduja , "Changes in Adolescent Online Social Networking Behaviors from 2006 to 2009". Computers and Human Behavior, 26, 1818–1821, 2010.
  • N.Singhi, N. Singhi, S.S. Magliveras: ”Minimal logarithmic signatures for finite groups of Lie type”, Designs, Codes and Cryptography (DCC), vol. 55, pp. 243-260, 2010.
  • R. Steinwandt: "A ciphertext-only attack on Polly Two", Applicable Algebra Engineering, Communication and Computing, vol. 21, no. 2, pp. 85-92, 2010.
  • R. Steinwandt and A. Suárez Corona: "Attribute-based group key establishmemt", Advances in Mathematics of Communications, vol. 4, no. 3, pp. 381-398, 2010.
  • P. Carrillo, H. Kalva, and S. S. Magliveras: “Compression independent reversible encryption for privacy in video surveillance”, EURASIP J. on Information Security, Article ID 429581, 2009.
  • T. Dinev, J. Goo, Q. Hu, and K. Nam. "User behavior towards protective information technologies: The role of cultural differences between the United States and South Korea", Information Systems Journal, 19, 391-412, 2009
  • M. Grassl and R. Steinwandt: "Cryptanalysis of an Authentication Scheme Using Truncated Polynomials", Information Processing Letters, vol. 109, pp. 861-863, 2009.
  • L. Klingler, S. S. Magliveras, F. Richman, and M. Sramka, ”Discrete logarithms for finite groups”. Computing, vol. 85, pp. 3-19, 2009.
  • W. Lempken, S. S. Magliveras, T. van Trung and W. Wei, “A public key cryptosystem based on non-abelian finite groups”, J. Cryptology, vol. 22, pp. 62-74, 2009.
  • F. Regazzoni, T. Eisenbarth, A. Poschmann, J. Großschädl, F. Gürkaynak, M. Macchetti, Z. Toprak, L. Pozzi, C. Paar, Y. Leblebici, P. Ienne, “Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology”, Transactions on Computational Science IV, Special Issue on Security in Computing, 2009.
  • T. Dinev, P. Hart, M. Mullen, "Internet privacy concerns and beliefs about government surveillance - an empirical investigation", Journal of Strategic Information Systems, 17, 3, 214-233, 2008.
  • S. Hinduja, J. Ingram, “Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft”. Western Criminology Review, 9 (2), 52-72, 2008.
  • S. Hinduja, “Deindividuation and Internet Software Piracy”. CyberPsychology and Behavior, 11 (4), 391-398, 2008.
  • C.D. Huang, Q. Hu, and R.S. Behara, "An Economic Analysis of the Optimal Information Security Investment in the Case of a Risk-Averse Firm ", International Journal of Production Economics, Vol. 114, No. 2, pp. 793-804, 2008.
  • C.D. Huang, R.S. Behara, Q. Hu, "Securing the Information Supply Chain: Managing Risk Propagation in Extended Enterprise Networks", IEEE IT Professional, 10 (4), p.14-19, 2008.
  • B. Kooi, S. Hinduja, “Teaching Security Courses Experientially”. Journal of Criminal Justice Education, 19 (2), 290-307, 2008.
  • S. S. Magliveras, P. Svaba, Tran van Trung and P. Zajac, “On the security of a realization of cryptosystem MST3”, Tatra Mt. Publ., vol. 41, pp 1-13, 2008.
  • R. Steinwandt and V. I. Villányi: "A one-time signature using run-length encoding", Information Processing Letters, vol. 108, no. 4, pp. 179-185, 2008.
  • J.-M. Bohli, M. I. González Vasco and R. Steinwandt: "Secure Group Key Establishment Revisited", International Journal of Information Security, vol. 6, no. 4, pp. 243-254, 2007.
  • T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, L. Uhsadel “A Survey of Lightweight Cryptography Implementations“ IEEE Design & Test of Computers -- Special Issue on Secure ICs for Secure Embedded Computing vol. 24, no. 6, pp. 522-533, November 2007.
  • W. Geiselmann and R. Steinwandt: "Special Purpose Hardware in Cryptanalysis: The Case of 1024 Bit RSA", IEEE Security & Privacy, vol. 5, no. 1, pp. 63-66, 2007.
  • S. Hinduja, “Computer Crime Investigations in the United States: Leveraging Knowledge from the Past to Address the Future”. International Journal of Cyber Criminology, 1 (1), 1-26, 2007.
  • S. Hinduja, J.W. Patchin, “Offline Consequences of Online Victimization: School Violence and Delinquency”. Journal of School Violence, 6 (3), 89-112, 2007.
  • D. Socek, H. Kalva, S. S. Magliveras, O. Marques, D. Culibrk and B. Furht: “New approaches to encryption and steganography for digital videos”, Multimedia Systems Journal, vol. 13, no. 3, Springer-Verlag, pp. 191-204, 2007.
  • D. Socek, H. Kalva, S. S. Magliveras, O. Marques, D. Culibrk and B. Furht: “Digital Video Encryption Algorithms Based on Correlation Preserving Permutations”, EURASIP Journal on Information Security, vol. 2007, Article ID 52965, 15 pages, 2007.
  • B. Wu, J. Wu, E. B. Fernandez, M. Ilyas, and S. S. Magliveras: “Secure and efficient key management in mobile ad hoc networks”, J. of Network and Computer Applications, Academic Press, issn 1084-8045, vol. 30, no. 3, pp. 937-954, 2007.

Conference or Workshop Article

  • K. Neupane, R. Steinwandt and A. Suárez Corona
    Group key establishment: adding perfect forward secrecy at the cost of one round, Proceedings of 11th International Conference on Cryptology and Network Security CANS 2012, Lecture Notes in Computer Science, pp. 158–168, Springer, 2012.
  • K. Neupane, R. Steinwandt and A. Suárez Corona
    Scalable Deniable Group Key Establishment (short paper), Proceedings of 5th International Symposium on Foundations & Practice of Security, Lecture Notes in Computer Science, pp. 365–373, Springer, 2013.
  • R.S. Behara and C.D. Huang (2011) “Securing Electronic Health Records in a Health Information Exchange Environment," Proceedings of the 42 nd Annual Meeting of the Decision Science Institute, November 19-22, Boston, Massachusetts, 4611-4616.
  • Ingrid Buckley, Eduardo Fernandez, Marco Anisetti, Claudio A. Ardagna, Masoud Sadjadi, and Ernesto Damiani, "Towards Pattern-based Reliability Certification of Services”, accepted for the 1st International Symposium on Secure Virtual Infrastructures (DOA-SVI'11) , 17-19 Oct. 2011, Crete, Greece.
  • Mihaela Cardei, E. B. Fernandez, Anupama Sahu, and Ionut Cardei, "A pattern for Wireless System Architectures", Asian PLoP 2011.
  • Eduardo B. Fernandez, Nobukazu Yoshioka, and Hironori Washizaki, "Two patterns for distributed systems: Enterprise Service Bus (ESB) and Distributed Publish/Subscribe" , accepted for the 18th Conference on Pattern Languages of Programs (PLoP 2011)
  • E. B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki, and Michael VanHilst, "An approach to model-based development of secure and reliable systems", Sixth International Conference on Availability, Reliability and Security (ARES 2011), August 22-26, Vienna, Austria
  • Keiko Hashizume, Eduardo B. Fernandez, and Nobukazu Yoshioka, "Misuse patterns for cloud computing", Twenty-Third International Conference on Software Engineering and Knowledge Engineering (SEKE 2011), Miami Beach, USA, July 7-9, 2011.
  • K. Hashizume, N. Yoshioka, and E.B.Fernandez, "Misuse Patterns for Cloud Computing", Asian PLoP 2011.
  • Carolina Marin, E.B.Fernandez, and Maria M. Larrondo-Petrie, "Secure location-based service for social networks", 9th Latin American and Caribbean Conference (LACCEI'2011).
  • Sergio Mujica, Francisca Valenzuela, and E.B. Fernandez, "Two security patterns: Least Privilege and Secure Logger/Auditor.", Asian PLoP 2011.
  • Jaime Muñoz-Arteaga, E.B. Fernandez, and Hector Caudel, "Misuse pattern: Spoofing web services", Asian PLoP 2011.
  • Jaime Muñoz-Arteaga, Eduardo B. Fernandez, René Santaolaya-Salgado, "Interaction Patterns for Designing Visual Feedback in Secure Websites", Fourth International Conference on Advances in Computer-Human Interactions (ACHI 2011), IARIA, February 23-28, 2011, Gosier, Guadeloupe, France, 95-100.
  • K. Neupane and R. Steinwandt: "Communication-efficient 2-round group key establishment from pairings", Proceedings of CT-RSA, vol. 6558 of Lecture Notes in Computer Science, pp. 65-76, Springer, 2011.
  • I. Ilić and S. S. Magliveras, “Crypto applications of combinatorial group theory”, Information Security, Coding Theory and Related Combinatorics, D. Crnković and V. Tonchev (eds), ASI-NATO volume, IOS Press, pp. 1-16, 2011.
  • K. Matheis and S. S. Magliveras, "Generating rooted trees of m nodes uniformly at random", Information Security, Coding Theory and Related Combinatorics, D. Crnković and V. Tonchev (eds), ASI-NATO volume, IOS Press, pp. 17-26, 2011.
  • S.S. Magliveras, Tran van Trung, Wandi Wei: “On Jacobsthal Binary Sequences”, Information Security, Coding Theory and Related Combinatorics, D. Crnković and V. Tonchev (eds), ASI-NATO volume, IOS Press, pp. 27-37, 2011.
  • Ola Ajaj and E.B. Fernandez, "A pattern for the WS-Policy standard", Procs.of the 8th Latin American Conference on Pattern Languages of Programs (SugarLoafPLoP 2010), Salvador, Bahia, Brazil, Sept 23-26, 2010.
  • Ola Ajaj and E.B. Fernandez, "A pattern for the  WS-Trust standard of web services", Procs. of the 1st Asian Conference on Pattern  Languages of Programs (AsianPLoP 2010) , Tokyo, Japan, March 16-17, 2010.
  • A. Bogdanov, T. Eisenbarth, C. Paar, M. Wienecke: “Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs”. Topics in Cryptology - CT-RSA 2010, Vol. 5985 of Lecture Notes in Computer Science,  pp. 235-251, Springer 2010.
  • T. Dinev, V. Albano, A. D’Atri, H. Xu, and P. Hart, (2010). Individual’s Attitudes Toward Electronic Health Records – A Privacy Calculus Perspective,” Proceedings of 70th Annual Meeting of the Academy of Management (AOM 2010), Montréal, Canada.
  • E.B.Fernandez and Sergio Mujica , "Building secure systems: From threats to security patterns", Procs. of the XXIX International Conference of the Chilean Computer Society, Antofagasta, Chile, November 2010.
  • E.B. Fernandez, D. LaRed Martines, and J. I. Pelaez, "A conceptual approach to voting based on patterns", Procs. of the 36th Latin American Conf. on Informatics (CLEI 2010), 18-22 October, Asuncion, Paraguay.
  • E.B. Fernandez and M.M. Larrondo-Petrie, "Designing secure SCADA systems using security patterns", Procs. of the 43rd Hawaii Conf. on Systems Science, Honolulu, HI, Jan. 2010, 1-8. ISI
  • E.B. Fernandez, N. Yoshioka, and H. Washizaki, "A Worm misuse pattern", Procs. of the 1st Asian Conference on Pattern  Languages of Programs(AsianPLoP 2010) , Tokyo, Japan, March 16-17, 2010.
  • E.B. Fernandez, N. Yoshioka, H. Washizaki, and M. VanHilst, "Measuring the level of security introduced by security patterns", Procs. of the 4th workshop on Secure systems methodologies using patterns (SPattern 2010), in conjunction with ARES 2010, Krakow, Poland, February 2010. ISI
  • Q. Hu, Z.C. Xu, T. Dinev, and H. Ling. (2010). Why Individuals Commit Computer Offences in Organizations: Investigating the Roles of Rational Choice, Self-Control, and Deterrence, Proceedings of the 14th Pacific Asia Conference on Information Systems (PACIS 2010), July 9-12, 2010, Taipei, ROC. 1378-1389.
  • Q. Hu, Z.C. Xu, T. Dinev, and H. Ling. (2010). The Centrality of Low Self-Control in Internal Computer Offenses, The Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/11.13, October 8-9, 2010, Bentley University, Waltham, MA. 316-345.
  • C.D. Huang (2010) “Optimal Investment in Information Security: A Business Value Approach,” Proceedings of the 14 th Pacific Asia Conference on Information Systems, July 9-12, Taipei, Taiwan; available electronically.
  • Ajoy Kumar and E.B.Fernandez, "Security patterns for Virtual Private Networks", Procs. of the 8th Latin American Conference on Pattern Languages of Programs (SugarLoafPLoP 2010), Salvador, Bahia, Brazil, Sept 23-26, 2010
  • Carolina Marin, E.B. Fernandez, and M.M. Larrondo-Petrie, "Patterns for social networks in Web 2.0", Procs. of the 8th Latin American and Caribbean Conf. for Eng. and Technology (LACCEI'2010), June 1-4, 2010, Arequipa, Peru
  • I. von Maurich, T. Poeppelmann, J. Rave, C. Reuber, A. Wild, T. Eisenbarth, S. Heyse:" Evaluation of SHA-3 Candidates for 8-bit Embedded Processors", presented at: The Second SHA-3 Candidate Conference, University of California, Santa Barbara, August 23-24, 2010.
  • Moradi, O. Mischke, T. Eisenbarth: “Correlation-Enhanced Power Analysis Collision Attack”, Cryptographic Hardware and Embedded Systems - CHES 2010, Vol. 6225 of Lecture Notes in Computer Science, pp. 125-139, Springer 2010.
  • M. Netter, E.B. Fernandez, and G. Pernul, "Refining the pattern-based reference model for electronic invoices by incorporating threats", Procs. of the 4th workshop on Secure systems methodologies using patterns (SPattern 2010). In conjunction with ARES 2010, Krakow, Poland, February 2010. ISI
  • K. Neupane and R. Steinwandt: "Server-assisted long-term secure 3-party key establishment" Proceedings of 5th International Conference on Security and Cryptography SECRYPT 2010, pp. 372-378, 2010.
  • Juan C. Pelaez and Eduardo B. Fernandez, "Network Forensics Models for Converged Architectures", Int. Journal on Advances in Security, IARIA, 2010, vol. 3 No 1 & 2, 2010.
  • Yuki Shiroma, Hironori Washizaki, Yoshiaki Fukazawa , Atsuto Kubo, Nobukazu Yoshioka, and E.B.Fernandez, "Model-driven application and validation of security patterns", 17th Conf. on Pattern Languages of Programs, PLoP 2010.
  • Miguel Solinas, Jairo Trad, Juan Abdala, Francisco Capdevila, E.B. Fernandez, Leandro Antonelli, "Caso de éxito de método que aplica patrones de seguridad en la Ingeniería en Computación", Congreso Argentino de Ciencias de la Computación 2010 - CACIC 2010.
  • T.Eisenbarth, T. Güneysu, S. Heyse, C. Paar, “MicroEliece: McEliece for Embedded Devices”, Cryptographic Hardware and Embedded Systems — CHES 2009, LNCS, Springer-Verlag, 2009.
  • M. González Muñiz and R. Steinwandt: "Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson", in International Conference on Information Security ICISC 2009, Lecture Notes in Computer Science, pp. 362-373, 2010.
  • I.A.Buckley and E.B. Fernandez, "Three patterns for fault tolerance", Procs. of the OOPSLA MiniPLoP, October 26, 2009.
  • I. Buckley, E.B. Fernandez, G.Rossi, and M. Sadjadi, "Web services reliability patterns", short paper in the 21st International Conference on Software Engineering and Knowledge Engineering (SEKE'2009), Boston, July 1-3, 2009, 4-9.
  • T. Dinev, H. Xu, and H.J. Smith, (2009). Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy, Proceedings of 42th Hawaii International Conference on System Sciences (HICSS), Hawaii, Hawaii.
  • T. Dinev, H. Xu, and H.J. Smith. (2009). Information Privacy and Correlates: An Attempt to Navigate in the Misty Conceptual Waters, Proceedings of 69th Academy of Management Meeting, August 7-11, Chicago, Illinois
  • E.B. Fernandez and M. M. Larrondo-Petrie, "A project on web services security and reliability", 7th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2009 ), June 2-5, San Cristobal, Venezuela.
  • E. B. Fernandez, J. Wu, M.M. Larrondo-Petrie and Y. Shao, "On building secure SCADA Systems using Security Patterns", Procs. of the Cyber security and information intelligence challenges and strategies (CSIIR 2009). Oak Ridge, TN, April 13-15, 2009.
  • E.B. Fernandez and J.Munoz-Arteaga, "Extending a secure software methodology with usability aspects" , position paper for the 3rd Workshop on Software Patterns and Quality (SPAQu'09), in conjunction with OOPSLA 2009.
  • E. B. Fernandez and J. L. Ortega-Arjona, "Securing the Adapter pattern" , Procs. of the OOPSLA MiniPLoP, October 26, 2009.
  • E.B. Fernandez and J. L. Ortega-Arjona, "The secure Pipes and Filters pattern", Procs.of the Third Int Workshop on Secure System Methodologies using Patterns (SPattern 2009).
  • E.B. Fernandez, M. VanHilst, D. laRed M., and S. Mujica, "An extended reference monitor for security and safety", Procs. of the 5th Iberoamerican Conference on Information Security (CIBSI 2009). Montevideo, Uruguay, November 2009.
  • E.B. Fernandez, N. Yoshioka, and H. Washizaki, "Security patterns and quality", position paper for the 3rd Workshop on Software Patterns and Quality (SPAQu'09), in conjunction with OOPSLA 2009. Proceedings of the Third International Workshop on Software Patterns and Quality (pp. 46-47).
  • E.B. Fernandez, N. Yoshioka and H. Washizaki, "Modeling misuse patterns", Procs. of the 4th Int. Workshop on Dependability Aspects of Data Warehousing and Mining Applications (DAWAM 2009), in conjunction with the 4th Int.Conf. on Availability, Reliability, and Security (ARES 2009). March 16-19, 2009, Fukuoka, Japan.
  • E.B. Fernandez and X. Yuan, "An Analysis Pattern for Invoice Processing", Procs. of the 16th Conf. on Pattern Languages of Programs (PLoP 2009).
  • Keiko Hashizume, E.B.Fernandez, and Shihong Huang, "The WS-Security pattern", First IEEE Int. Workshop on Security Eng. Environments, Dec. 17-19, 2009, Shanghai, China.
  • K. Hashizume and E.B. Fernandez, "Symmetric Encryption and XML Encryption Patterns", Procs. of the 16th Conf. on Pattern Languages of Programs (PLoP 2009).
  • K. Hashizume, E.B. Fernandez, and S. Huang, "Digital Signature with Hashing and XML Signature patterns", Procs. of the 14th European Conf. on Pattern Languages of Programs, EuroPLoP 2009.
  • Q. Hu, T. Dinev, Z.C. Xu, and H. Ling. (2009). Why Individuals Abuse Computer Systems in Organizations: Perspectives from Multiple Theories, IFIP WG 8.11/11.13International Working Conference on Information Systems Security Research, May 29-30, 2009, University of Cape Town, Graduate School of Business, Cape Town, South Africa.
  • C.D. Huang and J. Goo (2009) “Investment Decision on Information System Security: A Scenario Approach,” Proceedings of the 2009 Americas Conference on Information Systems, August 6-9, San Francisco, California, USA.
  • L. L. Lobato and E.B. Fernandez, "Patterns to support the development of privacy  policies", Procs. of the First Int. Wokshop on Organizational Security Aspects  (OSA 2009). In conjuction with ARES 2009. March 16-19, 2009, Fukuoka, Japan.
  • A. Moradi, T. Eisenbarth, A. Poschmann, C. Paar, “Power Analysis of Single-Rail Storage Elements as used in MDPL”, 12th International Conference on Information Security and Cryptology - ICISC 2009, Seoul, Korea, December 2-4, 2009.
  • D. Naccache, R. Steinwandt and M. Yung: "Reverse Public Key Encryption", BIOSIG 2009 Proceedings, vol. 155 of Lecture Notes in Informatics, GI, pp. 155-169, 2009.
  • C. Paar, T. Eisenbarth, M. Kasper, T. Kasper, A. Moradi, “KeeLoq and Side-Channel Analysis — Evolution of an Attack”, 6th IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2009.Lausanne, Switzerland, September 6, 2009.
  • J.C. Pelaez and E.B. Fernandez. “VoIP Network Forensic Patterns”, Procs. of the Fourth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2009), Cannes, France, August 23-29.
  • M. Solinas and E.B. Fernandez, Procs. of the 3rd Int. Workshop on Secure Systems Methodologies using Patterns (SPattern'09). In conjunction with the 6th International Conference onTrust, Privacy & Security in Digital Busines(TrustBus'09), 176-180.
  • M. VanHilst, E.B. Fernandez, and F. Braz, "Building a Concept Grid to Classify Security Patterns", Procs. of the 3rd Workshop on Software Patterns and Quality (SPAQu'09), in conjuction with OOPSLA 2009.
  • M. VanHilst, E.B. Fernandez, and F. Braz, "Building a Concept Grid to Classify Security Patterns", short paper for the 21st International Conference on Software Engineering and Knowledge Engineering (SEKE'2009), Boston, July 1-3, 2009.
  • H. Xu, T. Dinev, H. Wang, and R. Parks, (2009). “Trust in the Social Computing:  The Case of Peer-to-Peer (P2P) File Sharing Networks,” Proceedings of 15th Annual Americas Conference on Information Systems (AMCIS 2009), San Francisco, CA.
  • H. Washizaki, E.B.Fernandez, K. Maruyama, A. Kubo, and N. Yoshioka, “Improving the classification of security patterns”, Procs. of the Third Int. Workshop on Secure System Methodologies using Patterns (SPattern 2009).
  • A. Bogdanov, T. Eisenbarth, A. Rupp, C. Wolf “Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?” Workshop on Cryptographic Hardware and Embedded Systems (CHES 2008), LNCS, Springer-Verlag, 2008 (Best Paper Award).
  • F. Braz, E.B. Fernandez, and M. VanHilst, "Eliciting security requirements through misuse activities”, Procs. of the 2nd Int. Workshop on Secure Systems Methodologies using Patterns (SPattern'08). In conjunction with the 4th International Conference onTrust, Privacy & Security in Digital Busines(TrustBus'08), Turin, Italy, September 1-5, 2008. 328-333.
  • N. Delessy and E. B. Fernandez, “A pattern-driven security process for SOA applications", Procs. of the ACM Symposium on Applied Computing, Fortaleza, Ceara, Brazil, March 16-20, 2008. Short paper.
  • N. Delessy and E. B. Fernandez, “A pattern-driven security process for SOA applications", Procs. of the 3rd Int. Conf. on Availability, Reliability, and Security (ARES 2008). Barcelona, Spain, March 4-7, 2008, 416-421.
  • T. Dinev, (2008). Internet Users’ Beliefs about Government Surveillance – The Role of Social Awareness and Internet Literacy, Hawaii International Conference on System Sciences (HICSS), Hawaii, January 7-10. Nominated for Best Paper Award.
  • T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, M. Shalmani “On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme” Advances in Cryptology - CRYPTO 2008, LNCS, Springer-Verlag, 2008.
  • E.B. Fernandez, M. Fonoage, M. VanHilst, and M. Marta, "The secure three-tier architecture", Procs. of the Second Workshop on Engineering Complex Distributed Systems (ECDS 2008), Barcelona, Spain, March 4-7, 2008. 555-560.
  • E.B. Fernandez, J. Jurjens, N. Yoshioka, and H. Washizaki, "Incorporating database systems into a secure software development methodology", Procs. of the 2nd Int. Workshop on Secure Systems Methodologies using Patterns (Spattern'07). In conjunction with the 4th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'07), Turin, Italy, September 1-5, 2008. 310-314.
  • E.B. Fernandez and D. LaRed M., "Patterns for the secure and reliable execution of processes". Procs. of the 15th Int.Conference on Pattern Languages of Programs (PLoP 2008), collocated with OOPSLA, Nashville, TN, Oct. 2008.
  • E.B.Fernandez and M.M. Larrondo-Petrie, "A Course on security for critical infrastructure systems", Procs. of the 6th Latin American and CaribbeanConference for Engineering and Technology, June 4-6, 2008, Tegucigalpa, Honduras.
  • E.B. Fernandez, M. M Larrondo-Petrie, and M. VanHilst, "A methodology to build secure systems using patterns", short paper in the 23rd Annual Computer Security Applications Conference (ACSAC), Miami Beach, December 10-14.
  • E.B.Fernandez, G. Pernul, and M. M. Larrondo-Petrie, “Patterns and pattern diagrams for access control”, Procs. of the 5th Int. Conf. on Trust, Privacy, and Security in Digital Systems (Trustbus'08), Turin, Italy, Sept. 1-5, 2008. Springer LNCS 5185, 38-47.
  • E. B. Fernandez, H. Washizaki, and N. Yoshioka, "Abstract security patterns", Position paper in Procs. of the 2nd Workshop on Software Patterns and Quality (SPAQu'08), in conjunction with the 15th Conf. on Pattern Languages of Programs (PLoP 2008), October 18-20, Nashville, TN.
  • B. Gierlichs, L. Batina, C. Clavier, T. Eisenbarth, A. Gouget, H. Handschuh, T. Kasper, K. Lemke-Rust, S. Mangard, A. Moradi, E. Oswald:“Susceptibility of eSTREAM Candidates towards Side Channel Analysis”, SASC workshop 2008.
  • Q. Hu, T. Dinev, P. Hart, and D. Cooke. (2008). Top Management Championship and Individual Behavior Towards Information Security: An Integrative Model, 16th European Conference on Information Systems (ECIS), Galway, Ireland, June 8-11.
  • S. S. Magliveras, W. Wei and X. Zou , ”Notes on the CRTDH Group Key Agreement Protocol”, 28th International Conference on Distributed Computing Systems Workshops, IEEE Computer Society, DOI 10.1109/ICDCS.Workshops.2008.36, pp. 406-411, 2008.
  • G. Meiser, T. Eisenbarth, K. Lemke-Rust, C. Paar: “Efficient Implementation of eSTREAM Ciphers on 8-bit AVR Microcontrollers” , SIES 2008, IEEE, 2008.
  • J. L. Ortega-Arjona and E.B. Fernandez, "The Secure Blackboard pattern". Procs. of the 15th Int. Conference on Pattern Languages of Programs (PLoP 2008), co-located with OOPSLA, Nashville, TN, Oct. 2008.
  • F. Regazzoni, T. Eisenbarth, L. Breveglieri, P. Ienne, I. Koren: “Can Knowledge Regarding the Presence of Countermeasures against Fault Attacks Simplify Power Attacks on Cryptographic Devices?” 21st IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT’08), 2008.
  • S. Rohde, T. Eisenbarth, E. Dahmen, J. Buchmann, C. Paar: “Fast Hash-Based Signature Verification on Constrained Devices”, CARDIS 2008, London, UK
  • M. VanHilst, E.B. Fernandez, and F. Braz, "A multidimensional classification for users of security patterns", Procs. of the 6th Int. Workshop on Security in Information Systems (WOSIS 2008), Barcelona, Spain, June 12-13, 2008, in conjunction with ICEIS 2008, 89-98.
  • H. Xu, T. Dinev, H.J. Smith, P. Hart. (2008). Examining the Formation of Individual’s Privacy Concerns: Toward An Integrative View, Proceedings of 29th International Conference of Information Systems (ICIS), December 11-14, 2008, Paris.
  • M. Abdalla, J.-M. Bohli, M. I. González Vasco, and R. Steinwandt: "(Password) Authenticated Key Establishment: From 2-Party to Group", in Fourth Theory of Cryptography Conference, TCC 2007, S. P. Vadhan, ed., vol. 4392 of Lecture Notes in Computer Science, pp. 499-514, Springer, 2007.
  • R.S. Behara, C.D. Huang, and Q. Hu (2007) “A System Dynamics Model of Information Security Investments,” Proceedings of the 15th European Conference on Information Systems, June 7-9, St. Galon, Switzerland, 1572-1583.
  • R.S. Behara, C.D. Huang, and Q. Hu (2007) “Extended-Enterprise Information Security: A Risk Propagation Framework for Information Supply Chains,” Proceedings of the 2007 Americas Conference on Information Systems, August 9-12, Keystone, Colorado, USA; available online at http://aisel.aisnet.org/amcis2007/270.
  • A. Bogdanov, T. Eisenbarth, A. Rupp: "A Hardware-Assisted Realtime Attack on A5/2 without Precomputations" Cryptographic Hardware and Embedded Systems - CHES 2007, LNCS, Springer-Verlag, September 10 - 13, 2007.
  • A. Bogdanov, T. Eisenbarth, M. Wolf, T. Wollinger: “Trusted Computing for Automotive Systems: New Approaches to Enforce Security for Electronic Systems in Vehicles”, VDI-Kongress "Automotive Security", Wolfsburg, 2007.
  • J.-M. Bohli, M. I. González Vasco, and R. Steinwandt: "A Subliminal-free Variant of ECDSA", 8th Information Hiding IH 2006, vol. 4437 of Lecture Notes In Computer Science, pp. 375-387, Springer, 2007.
  • N. Delessy and E.B. Fernandez, "Adapting web services security standards for mobile and wireless environments", in “Advances in Web and Network Technologies, and Information Management”, K. Chen-Chuan Chang, W. Wang, L. Chen, C.A.Ellis, C-H Hsu, A.C.Tsoi, and H. Wang (Eds.), Springer LNCS 4537, 624-633.
  • N. Delessy. E.B. Fernandez, M.M. Larrondo-Petrie, and J. Wu, "Patterns for access control in distributed systems", Procs. of the 14th Pattern Languages  of Programs Conference (PLoP2007), Monticello, Illinois, USA, September 5-8, 2007.
  • N. Delessy, E.B. Fernandez, and M.M. Larrondo-Petrie, "A pattern language for identity management", Procs. of the 2nd IEEE Int. Multiconference on Computing in the Global Information Technology (ICCGI 2007), March 4-9, Guadeloupe, French Caribbean.
  • T. Dinev and Q. Hu. 2007. The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8, 7, 386-408.
  • T. Dinev and P. Hart. 2007. Privacy concerns and levels of information exchange: An empirical investigation of intended e-services use. E-Service Journal, 4, 3, 25-61.
  • T. Eisenbarth, T. Güneysu, C. Paar, A.-R. Sadeghi, D. Schellekens, M. Wolf: “Reconfigurable Trusted Computing in Hardware“, Scalable Trusted Computing, ACM STC 2007, Alexandria, Virginia, USA. Proceedings, ACM Press. November 2, 2007.
  • T. Eisenbarth, T. Güneysu, C. Paar, A.-R. Sadeghi, M. Wolf, R. Tessier: “Establishing Chain of Trust in Reconfigurable Hardware“, 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines. IEEE, 2007, pp. 287-288, Napa, California, April 23-25, 2007.
  • E.B.Fernandez, J. Ballesteros, A. C. Desouza-Doucet, and M.M. Larrondo-Petrie, “Security Patterns for Physical Access Control Systems”, in S. Barker and G.J. Ahn (Eds.), Data and Applications Security XXI, LNCS 4602, 259-274, Springer 2007.
  • E.B. Fernandez, P. Cholmondeley, and O. Zimmermann, "Extending a secure system development methodology to SOA", Procs. of the 1st Int. Workshop on Secure Systems Methodologies Using Patterns (SPattern'07). in conjunction with the 4th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'07), Regensburg, Germany, September 03-07, 2007, 749-754.
  • E. B. Fernandez, D. L. LaRed M., J. Forneron, V. E. Uribe, and G. Rodriguez G., “A secure analysis pattern for handling legal cases”, Procs. of the 6th Latin American Conference on Pattern Languages of Programming ( SugarLoafPLoP’2007), 178-187.
  • E.B. Fernandez, M.M. Larrondo-Petrie, and A. Escobar, "Contexts and context-based access control", Procs. of the 3rd IEEE Int. Conf. on Wireless and Mobile Communications (ICWMC 2007), March 4-9, Guadeloupe, French Caribbean.
  • E.B.Fernandez, J.C. Pelaez, and M.M. Larrondo-Petrie, "Security patterns for voice over IP networks", Journal of Software, Vol. 2, No 2, August 2007, 19-29.
  • E.B. Fernandez, J.C. Pelaez, and M.M. Larrondo-Petrie, "Security patterns for voice over IP networks", Procs. of the 2nd IEEE Int. Multiconference on Computing in the Global Information Technology (ICCGI 2007), March 4-9, Guadeloupe, French Caribbean.
  • E.B. Fernandez, J.C. Pelaez, and M.M. Larrondo-Petrie, "Attack patterns: A new forensic and design tool", Procs. of the Third Annual IFIP WG 11.9 Int. Conf. on Digital Forensics, Orlando, FL, Jan. 29-31, 2007. Chapter 24 in Advances in Digital Forensics III, P. Craiger and S. Shenoi (Eds.), Springer/IFIP, 2007, 345-357.
  • E.B. Fernandez, C. Pertuz, and M.M. Larrondo-Petrie, “A security pattern for Pipes and Filters”, Procs. of the 5th Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2007). Tampico, MX, May 29-June 1st, 2007.
  • E. B. Fernandez, M. VanHilst, and J.C. Pelaez, "Patterns for WiMax security", Procs. EuroPLoP 2007.
  • E.B. Fernandez, N. Yoshioka, H. Washizaki, and J. Jurjens, "Using security patterns to build secure systems", position paper in the 1st Int. Workshop on Software Patterns and Quality (SPAQu'07), Nagoya, Japan, December 3, 2007, collocated with the 14th  Asia-Pacific Software Engineering Conference (APSEC).
  • E.B. Fernandez and X.Y. Yuan, "Securing analysis patterns", Procs. of the 45th ACM Southeast Conference (ACMSE 2007), March 23-24, 2007,  Winston-Salem, North Carolina.
  • W. Geiselmann and R. Steinwandt: "Cryptanalysis of a Hash Function Proposed at ICISC 2006" in International Conference on Information Security ICISC 2007, K.-H. Nam and G. Rhee, eds., vol. 4817 of Lecture Notes in Computer Science, pp. 1-10, Springer 2007.
  • W. Geiselmann and R. Steinwandt: "Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit", in Advances in Cryptology - EUROCRYPT 2007, M. Naor, ed., vol. 4515 of Lecture Notes in Computer Science, pp. 466-481, Springer, 2007.
  • G. Meiser, T. Eisenbarth, K. Lemke-Rust, C. Paar “Software Implementation of eSTREAM Profile I Ciphers on embedded 8-bit AVR Microcontrollers“, The State of the Art of Stream Ciphers - SASC 2007, Bochum, Deutschland, Januar 31- Februar 1, 2007.
  • J. C. Pelaez, E.B. Fernandez, M.M. Larrondo-Petrie, and C. Wieser, "Attack patterns in VoIP", Procs. of the 14th Pattern Languages of Programs Conference (PLoP2007), Monticello, Illinois, USA, September 5-8, 2007.
  • J. C. Pelaez, E.B. Fernandez, and C. Wieser, "Patterns for VoIP signaling protocol architectures", Procs. EuroPLoP 2007.
  • F. Regazzoni, S. Badel, T. Eisenbarth, J. Großschädl, A. Poschmann, Z. Toprak, M. Macchetti, L. Pozzi, C. Paar, Y. Leblebici, P. Ienne “A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies”, International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS IC 07), Samos, Greece, July 16-19 , 2007.
  • F. Regazzoni, T. Eisenbarth, J. Großschädl, L. Breveglieri, P. Ienne, I. Koren, C. Paar: “Power Attacks Resistance of Cryptographic S-boxes with added Error Detection Circuits“, In Proceedings of the 21st IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT’07), Rome, Italy, September 26-28, 2007.
  • S. Rinne, T. Eisenbarth, C. Paar “Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers”, Software Performance Enhancement for Encryption and Decryption (SPEED 2007), Amsterdam, NL, June 11-12, 2007.
  • M. VanHilst and E.B. Fernandez, "Reverse engineering and the verification of security patterns in code", Procs. of the 1st Int. Workshop on Software Patterns and Quality (SPAQu'07), Nagoya, Japan, December 3, 2007, collocated with the 14th Asia-Pacific Software Engineering Conference (APSEC).

Miscellaneous

  • L. Batina, T. Eisenbarth, B. Gierlichs, F. Koeune, E. Oswald, F.-X. Standaert, S. Tillich, “Theoretical Models for Side-Channel Attacks”, ECRYPT NOE Deliverable, D.VAM.15, June 2008 http://www.ecrypt.eu.org/ecrypt1/documents/D.VAM.15.pdf
  • E.B. Fernandez, "Security patterns and secure systems design using UML", 2011 version (265 slides). Given at ISSADS, Guadalajara, MX., Jan. 2006, WCC Chile August 2006, IEEE WICSA 2008,FAMAF, Cordoba (Argentina) 2008, ACM OOPSLA 2008 and 2009.
  • E.B. Fernandez, "Internet and web services (distributed systems) security", Tutorial notes (387 slides). Given at INFORMS 98, COMPSAC'98, IFIP'98, BOCA2000 (Fifth INFORMS Telecomm. Conf.), March 5-8,2000, Boca Raton, FL, SANS2000, March 25, 2000, Orlando, FL,  Software Development East 2000, West 2001, and East 2001, Escuela de Ciencias Informaticas, Buenos Aires, July 2003, Univ. Tec. F. Santa Maria, Valparaiso, Chile, ISSADS, Guadalajara, MX.Jan. 2005, Pilar, Paraguay, May 2006, Ciudad del Este, Paraguay, May 2007, Aguascalientes, MX, 2009, Ciudad del Este, PY, 2011.
  • M. I. González Vasco, F. Hess and R. Steinwandt: "Combined (identity-based) public key schemes", Cryptology ePrint Archive: Report 2008/466, 2009.
  • R. Canetti, S. Goldwasser, G. Müller and R. Steinwandt (eds.): “Theoretical Foundations of Practical Information Security”, Dagstuhl Seminar Proceedings 08491, 2008