03808nam 22007455 450 991042771410332120251113192750.03-030-59817-910.1007/978-3-030-59817-4(CKB)4100000011457883(DE-He213)978-3-030-59817-4(MiAaPQ)EBC6350767(PPN)255277814(EXLCZ)99410000001145788320200915d2020 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierSecurity and Trust Management 16th International Workshop, STM 2020, Guildford, UK, September 17–18, 2020, Proceedings /edited by Kostantinos Markantonakis, Marinella Petrocchi1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (IX, 139 p. 80 illus., 13 illus. in color.) Security and Cryptology,2946-1863 ;123863-030-59816-0 Security Properties and Attacks -- Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties -- Reducing the Forensic Footprint with Android Accessibility Attacks -- A Novel Machine Learning Methodology for Detecting /Phishing Attacks in Real Time -- Confidentiality Schema -- Revocable access to encrypted message boards -- Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0 -- Security Processes -- Improved Feature Engineering for Free-Text Keystroke Dynamics -- Subversion-Resistant Commitment Schemes: Definitions and Constructions -- Challenges in IT Security Processes and Solution Approaches with Process Mining.This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located with the 25th European Symposium on Research in Computer Security, ESORICS 2020. The conference was planned to take place in Guildford, UK, but had to be moved to an online format due to the COVID-19 pandemic. The workshop took place during September 17-18, 2020. The 8 papers presented in this volume were carefully reviewed and selected from 20 submissions. They were organized in topical sections on security properties and attacks; confidentiality schema and security processes. .Security and Cryptology,2946-1863 ;12386Data protectionApplication softwareComputers and civilizationCryptographyData encryption (Computer science)Computer networksSecurity measuresComputer networksData and Information SecurityComputer and Information Systems ApplicationsComputers and SocietyCryptologyMobile and Network SecurityComputer Communication NetworksData protection.Application software.Computers and civilization.Cryptography.Data encryption (Computer science).Computer networksSecurity measures.Computer networks.Data and Information Security.Computer and Information Systems Applications.Computers and Society.Cryptology.Mobile and Network Security.Computer Communication Networks.005.8Markantonakis KonstantinosPetrocchi MarinellaMiAaPQMiAaPQMiAaPQBOOK9910427714103321Security and Trust Management3590338UNINA