ICT Systems Security and Privacy Protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings / / edited by Jaap-Henk Hoepman, Stefan Katzenbeisser |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIII, 414 p. 82 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computers and civilization Computer communication systems Application software Systems and Data Security Cryptology Computers and Society Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-319-33630-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Coercion-Resistant Proxy Voting -- A Posteriori Openable Public Key Encryption.-Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid -- Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research -- Evaluating CVSS Base Score Using Vulnerability Rewards Programs -- Defining Objectives For Preventing Cyberstalking -- Using Process Invariants to Detect Cyber Attacks on a Water Treatment System -- Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud -- Software Defined Networking Reactive Stateful Firewall -- Teaching Phishing-Security: Which Way is Best? -- On Gender Specific Perception of Data Sharing in Japan -- TORPEDO: TOoltip-poweRed Phishing Email DetectiOn -- SybilRadar: A Graph-Structure Based Framework for Sybil Detection in Online Social Networks -- Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence -- Automated Source Code Instrumentation for Verifying Potential Vulnerabilities -- An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities -- Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Scanners -- A Utility-Based Reputation Model for the Internet of Things -- Advanced Remote Firmware Upgrades Using TPM 2.0 -- RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks -- Uncertain? No, it's Very Certain! Recovering the Key from Guessing Entropy Enhanced CPA -- Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware -- NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries -- A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor -- Deducing User Presence from Inter-Message Intervals in Home Automation Systems -- Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies -- A Trustless Privacy-Preserving Reputation System. |
Record Nr. | UNINA-9910254994703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks [[electronic resource] ] : Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings / / edited by Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XII, 167 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer security Data structures (Computer science) Coding theory Information theory Computer science—Mathematics Cryptology Computer Communication Networks Systems and Data Security Data Structures and Information Theory Coding and Information Theory Symbolic and Algebraic Manipulation |
ISBN | 3-642-03944-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Mobility -- On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks -- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems -- Privacy-Aware Location Database Service for Granular Queries -- Attacks and Secure Implementations -- Algebraic Attacks on RFID Protocols -- Anti-counterfeiting Using Memory Spots -- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations -- Performance and Security -- Measurement Analysis When Benchmarking Java Card Platforms -- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card -- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks -- Cryptography -- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks -- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure -- PKIX Certificate Status in Hybrid MANETs. |
Record Nr. | UNISA-996465288903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers / / edited by Marit Hansen, Jaap-Henk Hoepman, Ronald Leenes, Diane Whitehouse |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 249 p. 41 illus.) |
Disciplina | 005.8 |
Soggetto topico |
Data protection
Electronic data processing - Management Computers and civilization Data and Information Security IT Operations Computers and Society |
ISBN | 3-642-55137-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Two of the Grand Changes through Computer and Network Technology -- The Draft Data Protection Regulation and the Development of Data Processing Applications -- Privacy Management and Accountability in Global Organisations -- Concepts Around Privacy-Preserving Attribute-Based Credentials: Making Authentication with Anonymous Credentials Practical -- Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond -- How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used? -- Privacy Versus Collective Security: Drivers and Barriers Behind a Trade-off -- Privacy in the Life-Cycle of IT Services – An Investigation of Process Reference Models -- Forgetting Bits and Pieces: An Exploration of the ”Right to Be Forgotten” as Implementation of ”Forgetting” in Online Memory Processes -- An Advanced, Privacy-Friendly Loyalty System -- Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions -- Problem-Based Consideration of Privacy-Relevant Domain Knowledge -- Extending Signatures of Reputation -- Preserving Privacy in Production -- User Search with Knowledge Thresholds in Decentralized Online Social Networks -- An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information -- Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case -- Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools -- Mobile Devices to the Identity Rescue. |
Record Nr. | UNINA-9910298567203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Radio Frequency Identification: Security and Privacy Issues [[electronic resource] ] : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers / / edited by Jaap-Henk Hoepman, Ingrid Verbauwhede |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 181 p. 37 illus.) |
Disciplina | 621.384192 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Application software E-commerce Computer communication systems Special purpose computers Systems and Data Security Cryptology Computer Appl. in Administrative Data Processing e-Commerce/e-business Computer Communication Networks Special Purpose and Application-Based Systems |
ISBN | 3-642-36139-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On the Security of Tan et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.- Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.- Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. |
Record Nr. | UNISA-996466270503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Radio Frequency Identification: Security and Privacy Issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers / / edited by Jaap-Henk Hoepman, Ingrid Verbauwhede |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 181 p. 37 illus.) |
Disciplina | 621.384192 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Application software E-commerce Computer communication systems Special purpose computers Systems and Data Security Cryptology Computer Appl. in Administrative Data Processing e-Commerce/e-business Computer Communication Networks Special Purpose and Application-Based Systems |
ISBN | 3-642-36139-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On the Security of Tan et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.- Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.- Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. |
Record Nr. | UNINA-9910739463403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|