LEADER 05269nam 22007575 450 001 9910254994703321 005 20251226200423.0 010 $a3-319-33630-4 024 7 $a10.1007/978-3-319-33630-5 035 $a(CKB)3710000000718299 035 $a(DE-He213)978-3-319-33630-5 035 $a(MiAaPQ)EBC6286468 035 $a(MiAaPQ)EBC5578794 035 $a(Au-PeEL)EBL5578794 035 $a(OCoLC)949904331 035 $z(PPN)258850604 035 $a(PPN)194076695 035 $a(EXLCZ)993710000000718299 100 $a20160510d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aICT Systems Security and Privacy Protection $e31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings /$fedited by Jaap-Henk Hoepman, Stefan Katzenbeisser 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XIII, 414 p. 82 illus.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v471 311 08$a3-319-33629-0 320 $aIncludes bibliographical references and index. 327 $aCoercion-Resistant Proxy Voting -- A Posteriori Openable Public Key Encryption.-Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid -- Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research -- Evaluating CVSS Base Score Using Vulnerability Rewards Programs -- Defining Objectives For Preventing Cyberstalking -- Using Process Invariants to Detect Cyber Attacks on a Water Treatment System -- Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud -- Software Defined Networking Reactive Stateful Firewall -- Teaching Phishing-Security: Which Way is Best? -- On Gender Specific Perception of Data Sharing in Japan -- TORPEDO: TOoltip-poweRed Phishing Email DetectiOn -- SybilRadar: A Graph-Structure Based Framework for Sybil Detection in Online Social Networks -- Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence -- Automated Source Code Instrumentation for Verifying Potential Vulnerabilities -- An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities -- Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Scanners -- A Utility-Based Reputation Model for the Internet of Things -- Advanced Remote Firmware Upgrades Using TPM 2.0 -- RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks -- Uncertain? No, it's Very Certain! Recovering the Key from Guessing Entropy Enhanced CPA -- Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware -- NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries -- A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor -- Deducing User Presence from Inter-Message Intervals in Home Automation Systems -- Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies -- A Trustless Privacy-Preserving Reputation System. 330 $aThis book constitutes the refereed proceedings of the 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2016, held in Ghent, Belgium, in May/June 2016. The 27 revised full papers presented were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on cryptographic protocols, human aspects of security, cyber infrastructure, social networks, software vulnerabilities, TPM and internet of things, sidechannel analysis, software security, and privacy. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v471 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aComputer networks 606 $aApplication software 606 $aData and Information Security 606 $aCryptology 606 $aComputers and Society 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 676 $a005.8 702 $aHoepman$b Jaap-Henk$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKatzenbeisser$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254994703321 996 $aICT Systems Security and Privacy Protection$92034030 997 $aUNINA