LEADER 04921nam 22007815 450 001 9910484934003321 005 20251107172446.0 010 $a3-319-24018-8 024 7 $a10.1007/978-3-319-24018-3 035 $a(CKB)3890000000001391 035 $a(SSID)ssj0001558557 035 $a(PQKBManifestationID)16182741 035 $a(PQKBTitleCode)TC0001558557 035 $a(PQKBWorkID)14818784 035 $a(PQKB)11056974 035 $a(DE-He213)978-3-319-24018-3 035 $a(MiAaPQ)EBC6301843 035 $a(MiAaPQ)EBC5576463 035 $a(Au-PeEL)EBL5576463 035 $a(OCoLC)919255019 035 $a(PPN)188460977 035 $a(EXLCZ)993890000000001391 100 $a20150821d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security Theory and Practice $e9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings /$fedited by Raja Naeem Akram, Sushil Jajodia 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XII, 281 p. 65 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9311 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-24017-X 327 $aSecurity and Privacy Services -- On Secrecy Amplification Protocols -- Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing -- Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols -- Private Minutia-based Fingerprint Matching -- Secure Resource Sharing and Access Control -- Secure Resource Sharing for Embedded Protected Module Architectures -- Secure Obfuscation of Authoring Style -- DET-ABE: a Java API for data confidentiality and  fine-grained access control from Attribute Based Encryption -- WSACd - A Usable Access Control Framework for Smart Home Devices.-Secure Devices and Execution Environment -- Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques -- Practical and Privacy-Preserving TEE Migration -- Randomizing the Montgomery Powering Ladder -- Challenges of Security and Reliability -- How Current Android Malware Seeks to Evade Automated Code Analysis -- On linkability and malleability in self-blindable credentials -- Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality -- Short Papers -- Normalizing Security Events with a Hierarchical Knowledge Base -- Attack Tree Generation by Policy Invalidation -- Lightweight Password Hashing Scheme for Embedded Systems -- Secure and Authenticated Access to LLN Resources Through Policy Constraints. 330 $aThis volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory and Practices, WISTP 2015, held in Heraklion, Crete, Greece, in August 2015. The 14 revised full papers and 4 short papers presented together were carefully reviewed and selected from 52 submissions.  WISTP 2015 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of elded systems, the application of security technology, the implementation of systems, and lessons learned. We encouraged submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues. . 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9311 606 $aElectronic data processing$xManagement 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer engineering 606 $aComputer networks 606 $aApplication software 606 $aIT Operations 606 $aCryptology 606 $aComputer Engineering and Networks 606 $aComputer and Information Systems Applications 615 0$aElectronic data processing$xManagement. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aApplication software. 615 14$aIT Operations. 615 24$aCryptology. 615 24$aComputer Engineering and Networks. 615 24$aComputer and Information Systems Applications. 676 $a005.8 702 $aAkram$b Raja Naeem$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJajodia$b Sushil$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484934003321 996 $aInformation Security Theory and Practice$92073240 997 $aUNINA