Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings / / edited by Sven Dietrich |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 277 p. 90 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
E-commerce Management information systems Computer science Systems and Data Security e-Commerce/e-business Management of Computing and Information Systems |
ISBN | 3-319-08509-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables).- Identifying Shared Software Components to Support Malware Forensics.- Instruction-Level Steganography for Covert Trigger-Based Malware -- AndRadar: Fast Discovery of Android Applications in Alternative Markets -- Attacks on Android Clipboard.- I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.- AV-Meter: An Evaluation of Antivirus Scans and Labels.- PExy: The Other Side of Exploit Kits.- Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware.- Parallelization of Network Intrusion Detection Systems under Attack Conditions.- Phoenix: DGA-Based Botnet Tracking and Intelligence -- Quantifiable Run-Time Kernel Attack Surface Reduction.- Bee Master: Detecting Host-Based Code Injection Attacks.- Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. |
Record Nr. | UNISA-996199993703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment : 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings / / edited by Sven Dietrich |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 277 p. 90 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
E-commerce Management information systems Computer science Systems and Data Security e-Commerce/e-business Management of Computing and Information Systems |
ISBN | 3-319-08509-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables).- Identifying Shared Software Components to Support Malware Forensics.- Instruction-Level Steganography for Covert Trigger-Based Malware -- AndRadar: Fast Discovery of Android Applications in Alternative Markets -- Attacks on Android Clipboard.- I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.- AV-Meter: An Evaluation of Antivirus Scans and Labels.- PExy: The Other Side of Exploit Kits.- Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware.- Parallelization of Network Intrusion Detection Systems under Attack Conditions.- Phoenix: DGA-Based Botnet Tracking and Intelligence -- Quantifiable Run-Time Kernel Attack Surface Reduction.- Bee Master: Detecting Host-Based Code Injection Attacks.- Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. |
Record Nr. | UNINA-9910484790803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Financial Cryptography and Data Security [[electronic resource] ] : FC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers / / edited by George Danezis, Sven Dietrich, Kazue Sako |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XII, 185 p. 15 illus.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
E-commerce Management information systems Computer science Data encryption (Computer science) Computers and civilization Application software Computer Communication Networks e-Commerce/e-business Management of Computing and Information Systems Cryptology Computers and Society Information Systems Applications (incl. Internet) |
Soggetto genere / forma | Conference proceedings. |
ISBN | 3-642-29889-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465775003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Financial Cryptography and Data Security [[electronic resource] ] : FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 256 p.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Computer engineering E-commerce Management information systems Computer science Computers and civilization Computer Communication Networks Cryptology Computer Engineering e-Commerce/e-business Management of Computing and Information Systems Computers and Society |
Soggetto genere / forma |
Conference proceedings.
Kongress |
ISBN | 3-642-14992-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | WLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: “Be Reasonable”. |
Record Nr. | UNISA-996466280603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Financial Cryptography and Data Security : FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 256 p.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Computer engineering E-commerce Management information systems Computer science Computers and civilization Computer Communication Networks Cryptology Computer Engineering e-Commerce/e-business Management of Computing and Information Systems Computers and Society |
Soggetto genere / forma |
Conference proceedings.
Kongress |
ISBN | 3-642-14992-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | WLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: “Be Reasonable”. |
Record Nr. | UNINA-9910483448603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Financial cryptography and data security : 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers / / Sven Dietrich, Rachna Dhamija (eds.) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer, , [2007] |
Descrizione fisica | 1 online resource (XII, 392 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer security |
ISBN | 3-540-77366-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Address -- Leaving Room for the Bad Guys -- Payment Systems -- Vulnerabilities in First-Generation RFID-enabled Credit Cards -- Conditional E-Cash -- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting -- Panel -- Panel: RFID Security and Privacy -- Position Statement in RFID S&P Panel: RFID and the Middleman -- Position Statement in RFID S&P Panel: Contactless Smart Cards -- Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure -- Anonymity -- A Model of Onion Routing with Provable Anonymity -- K-Anonymous Multi-party Secret Handshakes -- Authentication -- Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer -- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups -- On Authentication with HMAC and Non-random Properties -- Anonymity and Privacy -- Hidden Identity-Based Signatures -- Space-Efficient Private Search with Applications to Rateless Codes -- Cryptography and Commercial Transactions -- Cryptographic Securities Exchanges -- Improved Multi-party Contract Signing -- Informant: Detecting Sybils Using Incentives -- Financial Transactions and Web Services -- Dynamic Virtual Credit Card Numbers -- The Unbearable Lightness of PIN Cracking -- Panel -- Virtual Economies: Threats and Risks -- Invited Talk -- Usable SPACE: Security, Privacy, and Context for the Mobile User -- System Presentation -- Personal Digital Rights Management for Mobile Cellular Devices -- Cryptography -- Certificate Revocation Using Fine Grained Certificate Space Partitioning -- An Efficient Aggregate Shuffle Argument Scheme -- Usable Security Workshop -- Preface -- Full Papers -- An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks -- WSKE: Web Server Key Enabled Cookies -- Usability Analysis of Secure Pairing Methods -- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup -- Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers -- Short Papers -- What Instills Trust? A Qualitative Study of Phishing -- Phishing IQ Tests Measure Fear, Not Ability -- Mental Models of Security Risks -- Improving Usability by Adding Security to Video Conferencing Systems -- A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?. |
Record Nr. | UNINA-9910484281803321 |
Berlin ; ; Heidelberg : , : Springer, , [2007] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Financial cryptography and data security : 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers / / Sven Dietrich, Rachna Dhamija (eds.) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer, , [2007] |
Descrizione fisica | 1 online resource (XII, 392 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer security |
ISBN | 3-540-77366-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Address -- Leaving Room for the Bad Guys -- Payment Systems -- Vulnerabilities in First-Generation RFID-enabled Credit Cards -- Conditional E-Cash -- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting -- Panel -- Panel: RFID Security and Privacy -- Position Statement in RFID S&P Panel: RFID and the Middleman -- Position Statement in RFID S&P Panel: Contactless Smart Cards -- Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure -- Anonymity -- A Model of Onion Routing with Provable Anonymity -- K-Anonymous Multi-party Secret Handshakes -- Authentication -- Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer -- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups -- On Authentication with HMAC and Non-random Properties -- Anonymity and Privacy -- Hidden Identity-Based Signatures -- Space-Efficient Private Search with Applications to Rateless Codes -- Cryptography and Commercial Transactions -- Cryptographic Securities Exchanges -- Improved Multi-party Contract Signing -- Informant: Detecting Sybils Using Incentives -- Financial Transactions and Web Services -- Dynamic Virtual Credit Card Numbers -- The Unbearable Lightness of PIN Cracking -- Panel -- Virtual Economies: Threats and Risks -- Invited Talk -- Usable SPACE: Security, Privacy, and Context for the Mobile User -- System Presentation -- Personal Digital Rights Management for Mobile Cellular Devices -- Cryptography -- Certificate Revocation Using Fine Grained Certificate Space Partitioning -- An Efficient Aggregate Shuffle Argument Scheme -- Usable Security Workshop -- Preface -- Full Papers -- An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks -- WSKE: Web Server Key Enabled Cookies -- Usability Analysis of Secure Pairing Methods -- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup -- Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers -- Short Papers -- What Instills Trust? A Qualitative Study of Phishing -- Phishing IQ Tests Measure Fear, Not Ability -- Mental Models of Security Risks -- Improving Usability by Adding Security to Video Conferencing Systems -- A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?. |
Record Nr. | UNISA-996465951903316 |
Berlin ; ; Heidelberg : , : Springer, , [2007] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
SACMAT '22 : Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies : June 8-10, 2022 New York, NY, USA / / general chair, Sven Dietrich ; program chairs, Omar Chowdhury,Daniel Takabi |
Pubbl/distr/stampa | New York : , : Association for Computing Machinery, , 2022 |
Descrizione fisica | 1 online resource (282 pages) |
Disciplina | 005.8 |
Collana | ACM Conferences |
Soggetto topico |
Computers - Access control
Computer security Computer science |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910580191203321 |
New York : , : Association for Computing Machinery, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|