Privacy and Identity Management. Sharing in a Digital World : 18th IFIP WG 9. 2, 9. 6/11. 7, 11. 6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers |
Autore | Bieker Felix |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2024 |
Descrizione fisica | 1 online resource (350 pages) |
Altri autori (Persone) |
de ConcaSilvia
GruschkaNils JensenMeiko SchieringIna |
Collana | IFIP Advances in Information and Communication Technology Series |
ISBN | 9783031579783 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910851998003321 |
Bieker Felix | ||
Cham : , : Springer International Publishing AG, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy technologies and policy : 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17-18, 2021, Proceedings. / / Nils Gruschka [and three others], editors |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (IX, 169 p. 33 illus., 22 illus. in color.) |
Disciplina | 303.4834 |
Collana | Security and Cryptology |
Soggetto topico | Computers and civilization |
ISBN | 3-030-76663-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Implementing Personal Data Processing Principles -- The Right to Customization: Conceptualizing the Right to Repair for Informational Privacy -- A case study on the implementation of the right of access in privacy dashboards -- Consent Management Platforms under the GDPR: processors and/or controllers? -- Improving the Transparency of Privacy Terms Updates -- Privacy Enhancing Technologies -- User-generated pseudonyms through Merkle trees -- Towards Improving Privacy of Synthetic DataSets -- Promoting Compliance with the GDPR -- Protection of Personal Data in High Performance Computing Platform for Scientific Research Purposes -- Representing Data Protection Aspects in Process Models by Coloring -- Trackers in Your Inbox: Criticizing Current Email Tracking Practices. |
Record Nr. | UNISA-996464419903316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Privacy technologies and policy : 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17-18, 2021, Proceedings. / / Nils Gruschka [and three others], editors |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (IX, 169 p. 33 illus., 22 illus. in color.) |
Disciplina | 303.4834 |
Collana | Security and Cryptology |
Soggetto topico | Computers and civilization |
ISBN | 3-030-76663-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Implementing Personal Data Processing Principles -- The Right to Customization: Conceptualizing the Right to Repair for Informational Privacy -- A case study on the implementation of the right of access in privacy dashboards -- Consent Management Platforms under the GDPR: processors and/or controllers? -- Improving the Transparency of Privacy Terms Updates -- Privacy Enhancing Technologies -- User-generated pseudonyms through Merkle trees -- Towards Improving Privacy of Synthetic DataSets -- Promoting Compliance with the GDPR -- Protection of Personal Data in High Performance Computing Platform for Scientific Research Purposes -- Representing Data Protection Aspects in Process Models by Coloring -- Trackers in Your Inbox: Criticizing Current Email Tracking Practices. |
Record Nr. | UNINA-9910484431503321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Secure IT Systems [[electronic resource] ] : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings / / edited by Nils Gruschka |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIII, 486 p. 165 illus., 68 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computers Law and legislation Computers and civilization Application software Computer communication systems Systems and Data Security Cryptology Legal Aspects of Computing Computers and Society Information Systems Applications (incl. Internet) Computer Communication Networks |
ISBN | 3-030-03638-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy -- Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid -- Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps -- MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix-Zones -- AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications -- Cryptography -- Unifying Kleptographic Attacks -- Steady: A Simple End-to-End Secure Logging System -- Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation -- On Security Analysis of Generic Dynamic Authenticated Group Key Exchange -- A Blockchain-Assisted Hash-Based Signature Scheme -- The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants -- Verifiable Light-Weight Monitoring for Certificate Transparency Logs -- Network and Cloud Security -- CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs -- Detection of covert channels in TCP retransmissions -- What you can change and what you can’t: human experience in computer network defenses -- Attack simulation for a realistic evaluation and comparison of network security techniques -- Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots using Virtual Machine Introspection -- Authorization Policies Specification and Consistency Management within Multi-Cloud Environments -- Cyber Security and Malware -- Cyber Hygiene: The Big Picture -- Estimating the Risk of Fraud against E-services -- PESTEL Analysis of Hacktivism Campaign Motivations -- Data Modelling for Predicting Exploits -- UpDroid : Updated Android Malware and Its Familial Classification -- Evaluation of Cyber Security Management of Critical Infrastructures: A Literature Review Guided by the NIST Cybersecurity Framework -- Next Generation Ransomware -- Security for Software and Software Development -- Hardware-Assisted Program Execution Integrity: HAPEI -- Protecting Instruction Set Randomization from Code Reuse Attacks -- A Uniform Information-Flow-Security Benchmark Suite for Source Code and Bytecode -- When Harry met Tinder: Security analysis of dating apps on Android -- Threat Poker: Solving Security and Privacy Threats in Agile Software Development. . |
Record Nr. | UNISA-996466197503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Secure IT Systems : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings / / edited by Nils Gruschka |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIII, 486 p. 165 illus., 68 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computers Law and legislation Computers and civilization Application software Computer communication systems Systems and Data Security Cryptology Legal Aspects of Computing Computers and Society Information Systems Applications (incl. Internet) Computer Communication Networks |
ISBN | 3-030-03638-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy -- Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid -- Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps -- MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix-Zones -- AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications -- Cryptography -- Unifying Kleptographic Attacks -- Steady: A Simple End-to-End Secure Logging System -- Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation -- On Security Analysis of Generic Dynamic Authenticated Group Key Exchange -- A Blockchain-Assisted Hash-Based Signature Scheme -- The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants -- Verifiable Light-Weight Monitoring for Certificate Transparency Logs -- Network and Cloud Security -- CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs -- Detection of covert channels in TCP retransmissions -- What you can change and what you can’t: human experience in computer network defenses -- Attack simulation for a realistic evaluation and comparison of network security techniques -- Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots using Virtual Machine Introspection -- Authorization Policies Specification and Consistency Management within Multi-Cloud Environments -- Cyber Security and Malware -- Cyber Hygiene: The Big Picture -- Estimating the Risk of Fraud against E-services -- PESTEL Analysis of Hacktivism Campaign Motivations -- Data Modelling for Predicting Exploits -- UpDroid : Updated Android Malware and Its Familial Classification -- Evaluation of Cyber Security Management of Critical Infrastructures: A Literature Review Guided by the NIST Cybersecurity Framework -- Next Generation Ransomware -- Security for Software and Software Development -- Hardware-Assisted Program Execution Integrity: HAPEI -- Protecting Instruction Set Randomization from Code Reuse Attacks -- A Uniform Information-Flow-Security Benchmark Suite for Source Code and Bytecode -- When Harry met Tinder: Security analysis of dating apps on Android -- Threat Poker: Solving Security and Privacy Threats in Agile Software Development. . |
Record Nr. | UNINA-9910349390403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Sicherheit in kommunikationsnetzen / / von Jun.-Prof. Dr. Christoph Sorge, Prof. Dr. Nils Gruschka, Prof. Dr. Luigi Lo Iacono ; Johannes Breimeier, lektorat ; Tina Bonertz, herstellung |
Autore | Sorge Christoph |
Pubbl/distr/stampa | Munich, Germany : , : Oldenbourg Wissenschaftsverlag, , 2013 |
Descrizione fisica | 1 online resource (273 p.) |
Disciplina | 004.6 |
Altri autori (Persone) |
GruschkaNils
IaconoLuigi Lo BreimeierJohannes BonertzTina |
Soggetto topico |
Network performance (Telecommunication)
Computer security |
Soggetto genere / forma | Electronic books. |
ISBN | 3-486-72017-1 |
Classificazione | ST 276 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Nota di contenuto | Frontmatter -- Inhaltsverzeichnis -- 1 Einleitung -- Teil I: Grundlagen -- 2 Kommunikation in Netzen -- 3 Informations- und Kommunikationssicherheit -- 4 Kryptographie -- 5 Public-Key-Infrastrukturen -- Teil II: Absicherung lokaler Netze -- 6 Netzwerkinfrastrukturen -- 7 Authentifizierung im Netzwerk -- 8 WLAN-Sicherheit -- 9 Kerberos -- Teil III: Internet-Sicherheit -- 10 IPsec -- 11 Sicherheit der Transportschicht -- 12 DNS-Sicherheit -- Teil IV: Mobilfunk- und Web-Sicherheit -- 13 GSM und UMTS -- 14 Web-Sicherheit -- Teil V: Szenarien -- 15 Der Blickwinkel des Penetrationstesters -- 16 Der Blickwinkel des Sicherheitsbeauftragten -- Abkürzungsverzeichnis -- Literaturverzeichnis -- Index |
Record Nr. | UNINA-9910453801703321 |
Sorge Christoph | ||
Munich, Germany : , : Oldenbourg Wissenschaftsverlag, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Sicherheit in kommunikationsnetzen / / von Jun.-Prof. Dr. Christoph Sorge, Prof. Dr. Nils Gruschka, Prof. Dr. Luigi Lo Iacono ; Johannes Breimeier, lektorat ; Tina Bonertz, herstellung |
Autore | Sorge Christoph |
Pubbl/distr/stampa | Munich, Germany : , : Oldenbourg Wissenschaftsverlag, , 2013 |
Descrizione fisica | 1 online resource (273 p.) |
Disciplina | 004.6 |
Altri autori (Persone) |
GruschkaNils
IaconoLuigi Lo BreimeierJohannes BonertzTina |
Soggetto topico |
Network performance (Telecommunication)
Computer security |
ISBN | 3-486-72017-1 |
Classificazione | ST 276 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Nota di contenuto | Frontmatter -- Inhaltsverzeichnis -- 1 Einleitung -- Teil I: Grundlagen -- 2 Kommunikation in Netzen -- 3 Informations- und Kommunikationssicherheit -- 4 Kryptographie -- 5 Public-Key-Infrastrukturen -- Teil II: Absicherung lokaler Netze -- 6 Netzwerkinfrastrukturen -- 7 Authentifizierung im Netzwerk -- 8 WLAN-Sicherheit -- 9 Kerberos -- Teil III: Internet-Sicherheit -- 10 IPsec -- 11 Sicherheit der Transportschicht -- 12 DNS-Sicherheit -- Teil IV: Mobilfunk- und Web-Sicherheit -- 13 GSM und UMTS -- 14 Web-Sicherheit -- Teil V: Szenarien -- 15 Der Blickwinkel des Penetrationstesters -- 16 Der Blickwinkel des Sicherheitsbeauftragten -- Abkürzungsverzeichnis -- Literaturverzeichnis -- Index |
Record Nr. | UNINA-9910790820503321 |
Sorge Christoph | ||
Munich, Germany : , : Oldenbourg Wissenschaftsverlag, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Sicherheit in kommunikationsnetzen / / von Jun.-Prof. Dr. Christoph Sorge, Prof. Dr. Nils Gruschka, Prof. Dr. Luigi Lo Iacono ; Johannes Breimeier, lektorat ; Tina Bonertz, herstellung |
Autore | Sorge Christoph |
Pubbl/distr/stampa | Munich, Germany : , : Oldenbourg Wissenschaftsverlag, , 2013 |
Descrizione fisica | 1 online resource (273 p.) |
Disciplina | 004.6 |
Altri autori (Persone) |
GruschkaNils
IaconoLuigi Lo BreimeierJohannes BonertzTina |
Soggetto topico |
Network performance (Telecommunication)
Computer security |
ISBN | 3-486-72017-1 |
Classificazione | ST 276 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Nota di contenuto | Frontmatter -- Inhaltsverzeichnis -- 1 Einleitung -- Teil I: Grundlagen -- 2 Kommunikation in Netzen -- 3 Informations- und Kommunikationssicherheit -- 4 Kryptographie -- 5 Public-Key-Infrastrukturen -- Teil II: Absicherung lokaler Netze -- 6 Netzwerkinfrastrukturen -- 7 Authentifizierung im Netzwerk -- 8 WLAN-Sicherheit -- 9 Kerberos -- Teil III: Internet-Sicherheit -- 10 IPsec -- 11 Sicherheit der Transportschicht -- 12 DNS-Sicherheit -- Teil IV: Mobilfunk- und Web-Sicherheit -- 13 GSM und UMTS -- 14 Web-Sicherheit -- Teil V: Szenarien -- 15 Der Blickwinkel des Penetrationstesters -- 16 Der Blickwinkel des Sicherheitsbeauftragten -- Abkürzungsverzeichnis -- Literaturverzeichnis -- Index |
Record Nr. | UNINA-9910810457003321 |
Sorge Christoph | ||
Munich, Germany : , : Oldenbourg Wissenschaftsverlag, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|