ICT systems security and privacy pro...
IFIP TC11 International Information Security Conference (2022 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • ICT systems security and privacy protection = 37th IFIP TC11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: ICT systems security and privacy protection/ edited by Weizhi Meng, Simone Fischer-Hubner, Christian D. Jensen.
    Reminder of title: 37th IFIP TC11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022 : proceedings /
    other author: Meng, Weizhi.
    corporate name: IFIP TC11 International Information Security Conference
    Published: Cham :Springer International Publishing : : 2022.,
    Description: xiv, 526 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Privacy Models and Preferences: -- A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App -- Deriving and Using Synthetic Consequences for Privacy Risk Modeling -- Stuart Shapiro Enhanced Privacy in Smart Workplaces: Employees' Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches -- Network Security and IDS -- DAEMON: Dynamic Auto-Encoders for contextualised anomaly detection applied to security MONitoring -- FOCUS: Frequency based detection of Covert Ultrasonic Signals -- Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring -- Network Security and Privacy -- A study on the use of 3rd party DNS resolvers for malware filtering or censorship circumvention -- RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features -- Evaluation of Circuit Lifetimes in Tor -- Forensics -- D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage -- Robust PDF Files Forensics Using Coding Style -- Light-Weight File Fragments Classification using Depthwise Separable Convolution -- Trust and PETs -- Novel Approaches for the Development of Trusted IoT Entities -- Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials -- Crypto-based solutions -- UP-MLE: Effcient and Practical Updatable Block-Level MessageLocked Encryption Scheme Based on Update Properties -- CryptKSP: A Kernel Stack Protection Model based on AES-NI Hardware Feature -- Usable Security -- Usability Insights from Establishing TLS Connections -- Usability of Antivirus Tools in a Threat Detection Scenario -- Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations -- Blockchain -- Greedy Networking in Cryptocurrency Blockchain -- Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain -- Mobile Security and Privacy -- AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps -- One Light, One App: Tackling A Common Misperception Causing Breach of User Privacy -- Double-X: Towards Double-Cross-based Unlock Mechanism on Smartphones -- PETs and Crypto -- Post-Quantum Cheating Detectable Private Information Retrieval -- Anonymous Trusted Data Relocation for TEEs -- Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries -- Vulnerabilities -- Upside Down: Exploring the Ecosystem of Dark Web Data Markets -- An Effcient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-06975-8
    ISBN: 9783031069758
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login