Information security theory and prac...
Akram, Raja Naeem.

FindBook      Google Book      Amazon      博客來     
  • Information security theory and practice = 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security theory and practice/ edited by Raja Naeem Akram, Sushil Jajodia.
    其他題名: 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings /
    其他題名: WISTP 2015
    其他作者: Akram, Raja Naeem.
    出版者: Cham :Springer International Publishing : : 2015.,
    面頁冊數: xii, 281 p. :ill., digital ;24 cm.
    內容註: Security and Privacy Services -- On Secrecy Amplification Protocols -- Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing -- Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols -- Private Minutia-based Fingerprint Matching -- Secure Resource Sharing and Access Control -- Secure Resource Sharing for Embedded Protected Module Architectures -- Secure Obfuscation of Authoring Style -- DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption -- WSACd - A Usable Access Control Framework for Smart Home Devices -- Secure Devices and Execution Environment -- Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques -- Practical and Privacy-Preserving TEE Migration -- Randomizing the Montgomery Powering Ladder -- Challenges of Security and Reliability -- How Current Android Malware Seeks to Evade Automated Code Analysis -- On linkability and malleability in self-blindable credentials -- Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality -- Short Papers -- Normalizing Security Events with a Hierarchical Knowledge Base -- Attack Tree Generation by Policy Invalidation -- Lightweight Password Hashing Scheme for Embedded Systems -- Secure and Authenticated Access to LLN Resources Through Policy Constraints.
    Contained By: Springer eBooks
    標題: Computer security - Fiction. -
    電子資源: http://dx.doi.org/10.1007/978-3-319-24018-3
    ISBN: 9783319240183
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入