ICT systems security and privacy pro...
Hoepman, Jaap-Henk.

FindBook      Google Book      Amazon      博客來     
  • ICT systems security and privacy protection = 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: ICT systems security and privacy protection/ edited by Jaap-Henk Hoepman, Stefan Katzenbeisser.
    其他題名: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings /
    其他題名: SEC 2016
    其他作者: Hoepman, Jaap-Henk.
    出版者: Cham :Springer International Publishing : : 2016.,
    面頁冊數: xiii, 414 p. :ill., digital ;24 cm.
    內容註: Coercion-Resistant Proxy Voting -- A Posteriori Openable Public Key Encryption -- Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid -- Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research -- Evaluating CVSS Base Score Using Vulnerability Rewards Programs -- Defining Objectives For Preventing Cyberstalking -- Using Process Invariants to Detect Cyber Attacks on a Water Treatment System -- Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud -- Software Defined Networking Reactive Stateful Firewall -- Teaching Phishing-Security: Which Way is Best? -- On Gender Specific Perception of Data Sharing in Japan -- TORPEDO: TOoltip-poweRed Phishing Email DetectiOn -- SybilRadar: A Graph-Structure Based Framework for Sybil Detection in Online Social Networks -- Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence -- Automated Source Code Instrumentation for Verifying Potential Vulnerabilities -- An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities -- Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Scanners -- A Utility-Based Reputation Model for the Internet of Things -- Advanced Remote Firmware Upgrades Using TPM 2.0 -- RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks -- Uncertain? No, it's Very Certain! Recovering the Key from Guessing Entropy Enhanced CPA -- Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware -- NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries -- A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor -- Deducing User Presence from Inter-Message Intervals in Home Automation Systems -- Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies -- A Trustless Privacy-Preserving Reputation System.
    Contained By: Springer eBooks
    標題: Computer security - Fiction. -
    電子資源: http://dx.doi.org/10.1007/978-3-319-33630-5
    ISBN: 9783319336305
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9280658 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 I23 2016 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入