LEADER 05199nam 22007095 450 001 996203275203316 005 20200701222745.0 010 $a3-319-05302-7 024 7 $a10.1007/978-3-319-05302-8 035 $a(CKB)3710000000095012 035 $a(DE-He213)978-3-319-05302-8 035 $a(SSID)ssj0001187184 035 $a(PQKBManifestationID)11795387 035 $a(PQKBTitleCode)TC0001187184 035 $a(PQKBWorkID)11263292 035 $a(PQKB)10264466 035 $a(MiAaPQ)EBC3101173 035 $a(PPN)177824484 035 $a(EXLCZ)993710000000095012 100 $a20140320d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFoundations and Practice of Security$b[electronic resource] $e6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers /$fedited by Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XIII, 444 p. 134 illus.) 225 1 $aSecurity and Cryptology ;$v8352 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-05301-9 327 $aOn the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange -- Model-Based Specification and Validation of Security and Dependability Patterns -- Enforcing Information Flow by Combining Static and Dynamic Analysis -- Fault Injection to Reverse Engineer DES-like Cryptosystems -- Software Camouflage -- Investigation of Parameters Influencing the Success of Optical Fault Attacks -- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework -- Quantitative Evaluation of Enforcement Strategies -- Collusion Resistant Inference Control for Cadastral Databases -- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model -- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations -- Computational Soundness of Symbolic Blind Signatures under Active Attacker -- Improved Davies-Murphys Attack on DES Revisited -- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts -- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs -- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks -- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs -- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation -- Evaluation of Software-Oriented Block Ciphers on Smartphones -- Don?t Push it: Breaking iButton Security -- Discovering Flaws in IDS through Analysis of their Inputs -- On the Reverse Engineering of the Citadel Botnet -- The Carna Botnet Through the Lens of a Network Telescope. 330 $aThis book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Rochelle, France, in October 2013. The 25 revised full papers presented together with a keynote address were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on security protocols, formal methods, physical security, attack classification and assessment, access control, cipher attacks, ad-hoc and sensor networks, resilience and intrusion detection. 410 0$aSecurity and Cryptology ;$v8352 606 $aData encryption (Computer science) 606 $aComputer security 606 $aCoding theory 606 $aInformation theory 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aCoding and Information Theory. 676 $a005.8 702 $aDanger$b Jean Luc$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDebbabi$b Mourad$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMarion$b Jean-Yves$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZincir Heywood$b Nur$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996203275203316 996 $aFoundations and practice of security$91904968 997 $aUNISA