Decision and game theory for security : first International Conference, Gamesec 2010, Berlin, Germany, November 22-23, 2010, proceedings / / Tansu Alpcan, Levente Buttyan, John S. Baras (eds.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2010 |
Descrizione fisica | 1 online resource (X, 281 p. 60 illus.) |
Disciplina | 005.82 |
Altri autori (Persone) |
AlpcanTansu <1975->
ButtyanLevente BarasJohn S |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Game theory |
ISBN |
1-280-39042-5
9786613568342 3-642-17197-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security Investments and Planning -- Design of Network Topology in an Adversarial Environment -- Optimal Information Security Investment with Penetration Testing -- Privacy and Anonymity -- Tracking Games in Mobile Networks -- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity -- When Do Firms Invest in Privacy-Preserving Technologies? -- Adversarial and Robust Control -- Adversarial Control in a Delay Tolerant Network -- Security Interdependencies for Networked Control Systems with Identical Agents -- Robust Control in Sparse Mobile Ad-Hoc Networks -- Network Security and Botnets -- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model -- ISPs and Ad Networks Against Botnet Ad Fraud -- A Localization Game in Wireless Sensor Networks -- Effective Multimodel Anomaly Detection Using Cooperative Negotiation -- Authorization and Authentication -- The Password Game: Negative Externalities from Weak Password Practices -- Towards a Game Theoretic Authorisation Model -- Theory and Algorithms for Security -- Disperse or Unite? A Mathematical Model of Coordinated Attack -- Uncertainty in Interdependent Security Games -- Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent -- Methods and Algorithms for Infinite Bayesian Stackelberg Security Games. |
Record Nr. | UNINA-9910484710103321 |
Berlin ; ; New York, : Springer, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Privacy in Ad-Hoc and Sensor Networks [[electronic resource] ] : Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers / / edited by Levente Buttyan, Virgil Gligor, Dirk Westhoff |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (X, 198 p.) |
Disciplina | 681/.2 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer security Algorithms Management information systems Computer science Application software Cryptology Computer Communication Networks Systems and Data Security Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Information Systems Applications (incl. Internet) |
ISBN | 3-540-69173-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Abstracts of Invited Talks -- Security and Cooperation in Wireless Networks -- Grey-Box Cryptography: Physical Unclonable Functions -- Regular Papers -- Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks -- Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks -- Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks -- Impact of Pseudonym Changes on Geographic Routing in VANETs -- Identification in Infrastructureless Networks -- Two’s Company, Three Is a Crowd: A Group-Admission Protocol for WSNs -- So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks -- Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol -- On the Wiretap Channel Induced by Noisy Tags -- On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks -- Cryptographic Protocol to Establish Trusted History of Interactions -- Ad Hoc Security Associations for Groups -- Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks -- Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. |
Record Nr. | UNISA-996466117503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and privacy in ad-hoc and sensor networks : third European Workshop, ESAS 2006, Hamburg, Germany, Setpember 20-21, 2006 : revised selected papers / / Levente Buttyan, Virgil Gligor, Dirk Westhoff (eds.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2006 |
Descrizione fisica | 1 online resource (X, 198 p.) |
Disciplina | 681/.2 |
Altri autori (Persone) |
ButtyanLevente
GligorVirgil D WesthoffDirk |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 5, Computer communication networks and telecommunications |
Soggetto topico |
Sensor networks - Security measures
Wireless communication systems - Security measures Computer networks - Security measures Computer security |
ISBN | 3-540-69173-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Abstracts of Invited Talks -- Security and Cooperation in Wireless Networks -- Grey-Box Cryptography: Physical Unclonable Functions -- Regular Papers -- Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks -- Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks -- Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks -- Impact of Pseudonym Changes on Geographic Routing in VANETs -- Identification in Infrastructureless Networks -- Two’s Company, Three Is a Crowd: A Group-Admission Protocol for WSNs -- So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks -- Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol -- On the Wiretap Channel Induced by Noisy Tags -- On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks -- Cryptographic Protocol to Establish Trusted History of Interactions -- Ad Hoc Security Associations for Groups -- Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks -- Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks. |
Altri titoli varianti | ESAS 2006 |
Record Nr. | UNINA-9910483115203321 |
Berlin ; ; New York, : Springer, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|