LEADER 04211nam 22006615 450 001 9910508473503321 005 20230810174210.0 010 $a3-030-90022-3 024 7 $a10.1007/978-3-030-90022-9 035 $a(CKB)4940000000615739 035 $a(MiAaPQ)EBC6798609 035 $a(Au-PeEL)EBL6798609 035 $a(OCoLC)1284986043 035 $a(DE-He213)978-3-030-90022-9 035 $a(PPN)258840242 035 $a(EXLCZ)994940000000615739 100 $a20211103d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in Communication Networks $e17th EAI International Conference, SecureComm 2021, Virtual Event, September 6?9, 2021, Proceedings, Part II /$fedited by Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (531 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v399 311 $a3-030-90021-5 327 $aAnonymous Short Communications over Social Networks -- A Sybil detection method in OSN based on DistilBERT and Double-SN-LSTM for text analysis -- ePayment Security 31 An Empirical Study on Mobile Payment Credential Leaks and Their Exploits -- System-Wide Security for Offline Payment Terminals -- Horus: A Security Assessment Framework for Android Crypto Wallets -- Systems Security -- Leakuidator: Leaky resource attacks and countermeasures -- Jabbic lookups: a backend telemetry-based system for malware triage Octavian -- Facilitating Parallel Fuzzing with Mutually-exclusive Task Distribution -- Flowrider: Fast On-Demand Key Provisioning for CloudNetworks -- Mobile Security & Privacy -- Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google Douglas Leith -- Who?s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy -- HTPD: Secure and Flexible Message-Based Communication for Mobile Apps -- Smartphone Location Spoofing Attack in Wireless Networks -- IoT Security & Privacy 42 Compromised through Compression -- iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-physical Systems. 330 $aThis two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v399 606 $aData protection 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aCryptology 606 $aMobile and Network Security 615 0$aData protection. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks$xSecurity measures. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aMobile and Network Security. 676 $a621.3821 702 $aGarcia-Alfaro$b Joaquin 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910508473503321 996 $aSecurity and Privacy in Communication Networks$93012314 997 $aUNINA