LEADER 06114nam 22008535 450 001 996465615903316 005 20200705211136.0 010 $a3-642-37119-1 024 7 $a10.1007/978-3-642-37119-6 035 $a(CKB)3280000000007573 035 $a(DE-He213)978-3-642-37119-6 035 $a(SSID)ssj0000880007 035 $a(PQKBManifestationID)11475279 035 $a(PQKBTitleCode)TC0000880007 035 $a(PQKBWorkID)10871655 035 $a(PQKB)10025333 035 $a(MiAaPQ)EBC3093258 035 $a(PPN)169139964 035 $a(EXLCZ)993280000000007573 100 $a20130327d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFoundations and Practice of Security$b[electronic resource] $e5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers /$fedited by Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XIV, 383 p. 90 illus.) 225 1 $aSecurity and Cryptology ;$v7743 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-37118-3 327 $aCryptography and Information Theory -- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic Protocols -- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities -- COMPASS: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network Users through the Social Graph -- A Formal Derivation of Composite Trust -- Policies and Applications Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy in the Java Security Manager -- A Novel Obfuscation: Class Hierarchy Flattening -- RESource: A Framework for Online Matching of Assembly with Open Source Code -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone -- Network and Adaptive Security -- Short-Term Linkable Group Signatures with Categorized Batch Verification -- GHUMVEE: Efficient, Effective, and Flexible Replication -- Extracting Attack Scenarios Using Intrusion Semantics -- On Securely Manipulating XML Data -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC -- Short Papers -- Towards Modelling Adaptive Attacker?s Behaviour -- Scalable Deniable Group Key Establishment -- Information-Theoretic Foundations of Differential Privacy. 330 $aThis book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security. 410 0$aSecurity and Cryptology ;$v7743 606 $aSoftware engineering 606 $aApplication software 606 $aInformation technology 606 $aBusiness?Data processing 606 $aManagement information systems 606 $aComputer science 606 $aOptical data processing 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aIT in Business$3https://scigraph.springernature.com/ontologies/product-market-codes/522000 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22005 615 0$aSoftware engineering. 615 0$aApplication software. 615 0$aInformation technology. 615 0$aBusiness?Data processing. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aOptical data processing. 615 14$aSoftware Engineering. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aIT in Business. 615 24$aComputer Appl. in Administrative Data Processing. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 676 $a005.8 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens$b Frederic$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens-Boulahia$b Nora$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMiri$b Ali$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTawbi$b Nadia$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465615903316 996 $aFoundations and practice of security$91904968 997 $aUNISA