LEADER 02997nam 22005175 450 001 9910483640603321 005 20251225173447.0 010 $a3-030-70881-0 024 7 $a10.1007/978-3-030-70881-8 035 $a(CKB)4100000011781498 035 $a(MiAaPQ)EBC6503853 035 $a(Au-PeEL)EBL6503853 035 $a(OCoLC)1241065746 035 $a(PPN)253858933 035 $a(BIP)79331158 035 $a(BIP)79056189 035 $a(DE-He213)978-3-030-70881-8 035 $a(EXLCZ)994100000011781498 100 $a20210226d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFoundations and Practice of Security $e13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1?3, 2020, Revised Selected Papers /$fedited by Gabriela Nicolescu, Assia Tria, José M. Fernandez, Jean-Yves Marion, Joaquin Garcia-Alfaro 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (213 pages) $cillustrations 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12637 311 08$a3-030-70880-2 327 $aNew Wrapper Feature Selection Algorithm for Anomaly-based Intrusion Detection Systems -- Network Security for Home IoT Devices Must Involve the User: a Position Paper -- A quantitative security risk analysis framework for modelling and analyzing advanced persistent threats -- An analysis of the use of CVEs by IoT malware -- A Priority-based Domain Type Enforcement for Exception Management -- Developer-Proof Prevention of SQL Injections -- A Survey of Advanced Encryption for Database Security: Primitives, Schemes, and Attacks -- Fast Short and Fast Linear Cramer-Shoup -- Anonymous proof-of-asset transactions using designated blind signatures -- Modeling Attacks and Efficient Countermeasures on Interpose PUF -- Error-Free Lattice-Based Key Encapsulation Mechanism Based on Ring-LWE -- Pisces: A New Zero-Knowledge Protocol for Blockchain Privacy. 330 $aThis book constitutes the revised selected papers of the 13th International Symposium on Foundations and Practice of Security, FPS 2020, held in Montréal, QC, Canada, in December 2020. The 11full papers and 1 short paper presented in this book were carefully reviewed and selected from 23 submissions. They cover a range of topics such as Analysis and Detection; Prevention and Efficiency; and Privacy by Design. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12637 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.82 702 $aNicolescu$b G$g(Gabriela), 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483640603321 996 $aFoundations and Practice of Security$94159644 997 $aUNINA