語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Secure IT systems = 25th Nordic Conf...
~
Nordic Conference on Secure IT Systems (2020 :)
FindBook
Google Book
Amazon
博客來
Secure IT systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Secure IT systems/ edited by Mikael Asplund, Simin Nadjm-Tehrani.
其他題名:
25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020 : proceedings /
其他題名:
NordSec 2020
其他作者:
Asplund, Mikael.
團體作者:
Nordic Conference on Secure IT Systems
出版者:
Cham :Springer International Publishing : : 2021.,
面頁冊數:
xii, 263 p. :ill., digital ;24 cm.
內容註:
Malware and attacks -- Persistence in Linux-Based IoT Malware -- Real-time triggering of Android memory dumps for stealthy attack investigation -- Using Features of Encrypted Network Traffic to Detect Malware -- Formal analysis -- Machine-checking the universal verifiability of ElectionGuard -- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures -- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme -- Applied cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms and training -- HoneyHash: Honeyword Generation Based on Transformed Hashes -- Agent-based File Extraction Using Virtual Machine Introspection -- Cyber range automation overview with a case study of CRATE -- Applications and privacy -- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU -- OnLITE: On-line Label for IoT Transparency Enhancement -- An Investigation of Comic-Based Permission Requests.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-030-70852-8
ISBN:
9783030708528
Secure IT systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020 : proceedings /
Secure IT systems
25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020 : proceedings /[electronic resource] :NordSec 2020edited by Mikael Asplund, Simin Nadjm-Tehrani. - Cham :Springer International Publishing :2021. - xii, 263 p. :ill., digital ;24 cm. - Lecture notes in computer science,125560302-9743 ;. - Lecture notes in computer science ;12556..
Malware and attacks -- Persistence in Linux-Based IoT Malware -- Real-time triggering of Android memory dumps for stealthy attack investigation -- Using Features of Encrypted Network Traffic to Detect Malware -- Formal analysis -- Machine-checking the universal verifiability of ElectionGuard -- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures -- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme -- Applied cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms and training -- HoneyHash: Honeyword Generation Based on Transformed Hashes -- Agent-based File Extraction Using Virtual Machine Introspection -- Cyber range automation overview with a case study of CRATE -- Applications and privacy -- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU -- OnLITE: On-line Label for IoT Transparency Enhancement -- An Investigation of Comic-Based Permission Requests.
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linkoping University, Sweden, and held online during November 23-24, 2020. The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
ISBN: 9783030708528
Standard No.: 10.1007/978-3-030-70852-8doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Secure IT systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020 : proceedings /
LDR
:02866nmm a2200373 a 4500
001
2238066
003
DE-He213
005
20210306090712.0
006
m d
007
cr nn 008maaau
008
211111s2021 sz s 0 eng d
020
$a
9783030708528
$q
(electronic bk.)
020
$a
9783030708511
$q
(paper)
024
7
$a
10.1007/978-3-030-70852-8
$2
doi
035
$a
978-3-030-70852-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
N832 2020
111
2
$a
Nordic Conference on Secure IT Systems
$n
(25th :
$d
2020 :
$c
Online)
$3
3490850
245
1 0
$a
Secure IT systems
$h
[electronic resource] :
$b
25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020 : proceedings /
$c
edited by Mikael Asplund, Simin Nadjm-Tehrani.
246
3
$a
NordSec 2020
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xii, 263 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12556
490
1
$a
Security and cryptology
505
0
$a
Malware and attacks -- Persistence in Linux-Based IoT Malware -- Real-time triggering of Android memory dumps for stealthy attack investigation -- Using Features of Encrypted Network Traffic to Detect Malware -- Formal analysis -- Machine-checking the universal verifiability of ElectionGuard -- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures -- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme -- Applied cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms and training -- HoneyHash: Honeyword Generation Based on Transformed Hashes -- Agent-based File Extraction Using Virtual Machine Introspection -- Cyber range automation overview with a case study of CRATE -- Applications and privacy -- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU -- OnLITE: On-line Label for IoT Transparency Enhancement -- An Investigation of Comic-Based Permission Requests.
520
$a
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linkoping University, Sweden, and held online during November 23-24, 2020. The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
1565452
650
2 4
$a
Legal Aspects of Computing.
$3
892641
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Asplund, Mikael.
$3
3490851
700
1
$a
Nadjm-Tehrani, Simin.
$3
3446142
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
12556.
$3
3490852
830
0
$a
Security and cryptology.
$3
3382517
856
4 0
$u
https://doi.org/10.1007/978-3-030-70852-8
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9399951
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入