Information security theory and prac...
Akram, Raja Naeem.

Linked to FindBook      Google Book      Amazon      博客來     
  • Information security theory and practice = 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information security theory and practice/ edited by Raja Naeem Akram, Sushil Jajodia.
    Reminder of title: 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings /
    remainder title: WISTP 2015
    other author: Akram, Raja Naeem.
    Published: Cham :Springer International Publishing : : 2015.,
    Description: xii, 281 p. :ill., digital ;24 cm.
    [NT 15003449]: Security and Privacy Services -- On Secrecy Amplification Protocols -- Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing -- Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols -- Private Minutia-based Fingerprint Matching -- Secure Resource Sharing and Access Control -- Secure Resource Sharing for Embedded Protected Module Architectures -- Secure Obfuscation of Authoring Style -- DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption -- WSACd - A Usable Access Control Framework for Smart Home Devices -- Secure Devices and Execution Environment -- Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques -- Practical and Privacy-Preserving TEE Migration -- Randomizing the Montgomery Powering Ladder -- Challenges of Security and Reliability -- How Current Android Malware Seeks to Evade Automated Code Analysis -- On linkability and malleability in self-blindable credentials -- Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality -- Short Papers -- Normalizing Security Events with a Hierarchical Knowledge Base -- Attack Tree Generation by Policy Invalidation -- Lightweight Password Hashing Scheme for Embedded Systems -- Secure and Authenticated Access to LLN Resources Through Policy Constraints.
    Contained By: Springer eBooks
    Subject: Computer security - Fiction. -
    Online resource: http://dx.doi.org/10.1007/978-3-319-24018-3
    ISBN: 9783319240183
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login