E-Voting and Identity [[electronic resource] ] : Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers / / edited by Aggelos Kiayias, Helger Lipmaa |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (X, 257 p. 26 illus.) |
Disciplina | 324.6/502854678 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Special purpose computers Application software Computers and civilization Cryptology Systems and Data Security Computer Communication Networks Special Purpose and Application-Based Systems Computer Appl. in Administrative Data Processing Computers and Society |
ISBN | 3-642-32747-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Norwegian Internet Voting Protocol -- Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting -- Internet Voting System with Cast as Intended Verification.- Linear Logical Voting Protocols.- Efficient Vote Authorization in Coercion-Resistant Internet Voting.- The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Voting -- An Efficient and Highly Sound Voter Verification Technique and Its Implementation.- Single Layer Optical-Scan Voting with Fully Distributed Trust.- Paperless Independently-Verifiable Voting.- Feasibility Analysis of Pret a Voter for German Federal Elections.- Pret a Voter with Write-Ins.- Trivitas: Voters Directly Verifying Votes.- The Application of I-Voting for Estonian Parliamentary Elections of 2011.- Towards Best Practice for E-election Systems: Lessons from Trial and Error in Australian Elections.- On the Side-Effects of Introducing E-Voting. Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting -- Internet Voting System with Cast as Intended Verification.- Linear Logical Voting Protocols.- Efficient Vote Authorization in Coercion-Resistant Internet Voting.- The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Voting -- An Efficient and Highly Sound Voter Verification Technique and Its Implementation.- Single Layer Optical-Scan Voting with Fully Distributed Trust.- Paperless Independently-Verifiable Voting.- Feasibility Analysis of Pret a Voter for German Federal Elections.- Pret a Voter with Write-Ins.- Trivitas: Voters Directly Verifying Votes.- The Application of I-Voting for Estonian Parliamentary Elections of 2011.- Towards Best Practice for E-election Systems: Lessons from Trial and Error in Australian Elections.- On the Side-Effects of Introducing E-Voting. |
Record Nr. | UNISA-996465499903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security and Cryptology [[electronic resource] ] : Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings / / edited by Helger Lipmaa, Moti Yung, Donghai Lin |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XII, 308 p.) |
Disciplina | 005.8/2 |
Collana | Security and Cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) Data protection Electronic data processing—Management Computers and civilization Computer networks Algorithms Cryptology Data and Information Security IT Operations Computers and Society Computer Communication Networks |
ISBN | 3-540-49610-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Digital Signature Schemes -- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05 -- Identity-Based Key-Insulated Signature with Secure Key-Updates -- Efficient Intrusion-Resilient Signatures Without Random Oracles -- Sequences and Stream Ciphers -- New Constructions of Large Binary Sequences Family with Low Correlation -- On the Rate of Coincidence of Two Clock-Controlled Combiners -- Symmetric-Key Cryptography -- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining -- OPMAC: One-Key Poly1305 MAC -- A General Construction of Tweakable Block Ciphers and Different Modes of Operations -- Cryptographic Schemes -- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme -- Efficient Short Signcryption Scheme with Public Verifiability -- A Revocation Scheme Preserving Privacy -- Network Security -- Deterministic Packet Marking with Link Signatures for IP Traceback -- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System -- A Network Security Policy Model and Its Realization Mechanism -- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic -- Access Control -- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty -- Design and Implementation of Fast Access Control That Supports the Separation of Duty -- Computer and Applications Security -- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models -- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks -- Application and Evaluation of Bayesian Filter for Chinese Spam -- Web and Media Security -- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes -- An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses -- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. |
Record Nr. | UNISA-996466142703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information security and cryptology : second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29-December 1, 2006 : proceedings / / Helger Lipmaa, Moti Yung, Dongdai Lin (eds.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2006 |
Descrizione fisica | 1 online resource (XII, 308 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) |
LipmaaHelger
YungMoti LinDongdai |
Collana |
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science |
Soggetto topico |
Computer security
Cryptography |
ISBN | 3-540-49610-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Digital Signature Schemes -- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05 -- Identity-Based Key-Insulated Signature with Secure Key-Updates -- Efficient Intrusion-Resilient Signatures Without Random Oracles -- Sequences and Stream Ciphers -- New Constructions of Large Binary Sequences Family with Low Correlation -- On the Rate of Coincidence of Two Clock-Controlled Combiners -- Symmetric-Key Cryptography -- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining -- OPMAC: One-Key Poly1305 MAC -- A General Construction of Tweakable Block Ciphers and Different Modes of Operations -- Cryptographic Schemes -- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme -- Efficient Short Signcryption Scheme with Public Verifiability -- A Revocation Scheme Preserving Privacy -- Network Security -- Deterministic Packet Marking with Link Signatures for IP Traceback -- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System -- A Network Security Policy Model and Its Realization Mechanism -- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic -- Access Control -- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty -- Design and Implementation of Fast Access Control That Supports the Separation of Duty -- Computer and Applications Security -- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models -- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks -- Application and Evaluation of Bayesian Filter for Chinese Spam -- Web and Media Security -- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes -- An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses -- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. |
Altri titoli varianti | Inscript 2006 |
Record Nr. | UNINA-9910483083703321 |
Berlin ; ; New York, : Springer, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Secure IT Systems [[electronic resource] ] : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVIII, 313 p. 77 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Application software Data mining Computers and civilization Computer organization Systems and Data Security Cryptology Information Systems Applications (incl. Internet) Data Mining and Knowledge Discovery Computers and Society Computer Systems Organization and Communication Networks |
ISBN | 3-319-70290-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Abstracts of Invited Talks -- Homomorphic Authentication for Computing Securely on Untrusted Machines -- Security and Privacy Challenges in Machine Learning -- Proof of Stake Blockchain Protocols -- Contents -- Outsourcing Computations -- A Server-Assisted Hash-Based Signature Scheme -- 1 Introduction -- 2 Related Work -- 3 Our Contribution -- 4 Preliminaries -- 5 Description of the Scheme -- 6 Security Proof -- 7 Practical Considerations -- 8 Conclusions and Outlook -- References -- Outsourcing of Verifiable Attribute-Based Keyword Search -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 3 System Model -- 4 ABKS Outsourcing Scheme -- 4.1 Model of ABKS Outsourcing Scheme -- 4.2 Security Definition of ABKS Outsourcing Scheme -- 4.3 Our ABKS Outsourcing Scheme -- 5 VABKS Outsourcing Scheme -- 5.1 Model of VABKS Outsourcing Scheme -- 5.2 Security Definition of VABKS Outsourcing Scheme -- 5.3 Our VABKS Outsourcing Scheme -- 6 Comparison -- 7 Conclusion -- References -- Privacy Preservation -- Is RCB a Leakage Resilient Authenticated Encryption Scheme? -- 1 Introduction -- 2 Preliminaries and Notions -- 3 General Overview of RCB -- 4 Attacks on RCB -- 4.1 Forgery Attack -- 4.2 Attacks on Misuse Resistance -- 4.3 A Denial-of-Service (DoS) Attack -- 4.4 Attack on Full-Duplex Communication -- 5 Privacy by RCB -- 6 Conclusion -- References -- Practical and Secure Searchable Symmetric Encryption with a Small Index -- 1 Introduction -- 1.1 Backgrounds -- 1.2 Our Contributions -- 1.3 Related Works -- 2 Preliminaries -- 3 Bloom Filter -- 4 Proposed Scheme -- 4.1 Constructing an Encrypted Index -- 4.2 Search Protocol -- 5 Security Analysis -- 6 Experimental Results -- References -- Anonymous Certification for an e-Assessment Framework -- 1 Introduction -- 2 Related Work.
3 Anonymous Certification (AC) Construction -- 3.1 Background -- 3.2 Our Construction -- 4 E-learning Use Case for PCS -- 4.1 TeSLA Architecture -- 4.2 Pseudonymity -- 4.3 Integrating Anonymous Certification to TeSLA -- 5 Implementation and Security Details of PCS -- 5.1 Implementation Details -- 5.2 Security Level Sketch of Our Proposal -- 6 Conclusion -- References -- PARTS -- Privacy-Aware Routing with Transportation Subgraphs -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure -- 2 Related Work -- 3 System Model -- 3.1 Road Network -- 3.2 Users -- 3.3 LBS Provider -- 3.4 Adversary -- 4 Strategies for Privacy-Enhanced Routing -- 4.1 Route Parts -- 4.2 Dummy Traffic -- 4.3 Time Shift Requests -- 5 Adversary's Inference Model -- 5.1 Background Knowledge -- 5.2 Empirically Improved Guessing -- 5.3 Privacy Measurement -- 6 Evaluation -- 6.1 Dataset and Simulator -- 6.2 Experimental Setup -- 6.3 Overhead of Segmented Routes -- 6.4 Privacy Related Results -- 6.5 Performance Analysis -- 7 Discussion -- 8 Conclusion -- References -- Security and Privacy in Machine Learning -- Bayesian Network Models in Cyber Security: A Systematic Review -- 1 Introduction -- 2 Review Methodology -- 3 Analysis of Standard Bayesian Network Models in Cyber Security -- 3.1 Citation Details -- 3.2 Data Sources Used to Construct DAGs and Populate CPTs -- 3.3 The Number of Nodes Used in the Model -- 3.4 Type of Threat Actor -- 3.5 Application and Application Sector -- 3.6 Scope of Variables -- 3.7 The Approach(es) Used to Validate Models -- 3.8 Model Purpose and Type of Purpose -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Improving and Measuring Learning Effectiveness at Cyber Defense Exercises -- 1 Introduction -- 2 Learning Measurement Dimensions in CDX's -- 2.1 5-Timestamp Methodology -- 2.2 Data Collection and Sources -- 3 LS17---Learning Measurement. 3.1 5-Timestamp Methodology Experience -- 3.2 Discussion and Findings from LS17 Learning Measurement -- 4 Related Work in Learning Measurement Context -- 5 Conclusion -- References -- Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data -- 1 Introduction -- 2 Preliminaries -- 2.1 Secure Multiparty Computation -- 2.2 Notation -- 2.3 General FIM Algorithms -- 3 Privacy-Preserving FIM -- 3.1 Algorithms for Privacy Preserving FIM -- 3.2 Comparing Bit Matrix and Set Based Approaches -- 3.3 Combining Dense and Sparse Representations -- 4 Benchmarks -- 5 Conclusion -- References -- Applications -- Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets -- 1 Introduction -- 2 Ceremony Description -- 2.1 Description of Mobilpendlerkort -- 2.2 Building the Inspection Ceremony -- 3 Attack Demonstration -- 3.1 Barcode Analysis -- 3.2 Primary Screen Forgery -- 3.3 Extra Zone Ticket Forgery -- 4 Principles -- 5 Alternative Inspection Ceremony -- 6 Related Work -- 7 Conclusions -- References -- Using the Estonian Electronic Identity Card for Authentication to a Machine -- 1 Introduction -- 2 Card Authentication -- 2.1 Document Expiration and Revocation Checks -- 2.2 Card Impersonation -- 3 Attacks by Malicious Terminals -- 3.1 Compromising the Cardholder's Privacy -- 3.2 Denial-of-Service Attacks -- 3.3 Unauthorized Use of Private Keys -- 4 Design of ID Card Emulator -- 4.1 Card ATR Adjustment -- 4.2 APDU Logging Functionality -- 4.3 Visual Imitation of ID Card -- 5 Card Authentication in Practice -- 6 Discussion: Improvements -- 6.1 Cloning Prevention -- 6.2 Cardholder Verification -- 6.3 Contactless Interface -- 7 Conclusion -- References -- Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure -- 1 Introduction -- 2 Related Work -- 3 Statistical Tests for Ransomware Attacks Detection. 4 Towards a Generic and Practical Ransomware Countermeasure -- 4.1 File System Activity Monitoring -- 4.2 Implementation Design -- 4.3 A Single Indicator of Compromise -- 5 Experiments: Performance Evaluation -- 5.1 Disk Performance -- 5.2 CPU Performance -- 5.3 Discussion -- 6 Experiments: Ransomware Detection -- 6.1 Malware - O - Matic -- 6.2 Experimental Setup -- 6.3 Detection Results -- 6.4 Ransomware-Like Applications -- 7 Conclusions -- References -- A Large-Scale Analysis of Download Portals and Freeware Installers -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Analysis System Overview -- 3.2 Installer Crawling -- 4 Results -- 4.1 Static Properties of the Installers -- 4.2 Dynamic Analysis of Installers -- 4.3 App Managers and Software Updates -- 5 Discussion and Future Work -- 6 Conclusion -- References -- Access Control -- GPASS: A Password Manager with Group-Based Access Control -- 1 Introduction -- 2 Related Work -- 3 Models and Assumptions -- 3.1 System Model -- 3.2 Threat Model -- 3.3 System Goals -- 3.4 Security Goals -- 4 GPASS -- 4.1 Overview -- 4.2 Fundamental Operations -- 5 Security Analysis -- 6 Extended GPASS -- 7 Implementation -- 8 Discussion -- 9 Conclusion -- References -- Towards Accelerated Usage Control Based on Access Correlations -- 1 Introduction -- 2 The Problem -- 3 Our Approach: SPEEDAC -- 3.1 Speculative Pre-computation of Decisions -- 3.2 Utilization of Access Correlations -- 3.3 Perceivable Overhead -- 4 Case Study -- 5 Enforcement Mechanism -- 5.1 Design Space -- 5.2 Design for Effectiveness -- 5.3 Implementation -- 6 Performance Evaluation -- 6.1 Experimental Setup -- 6.2 Perceivable Overhead -- 6.3 File-Correlation Effects -- 7 Related Work -- 8 Conclusion -- References -- Emerging Security Areas -- Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs. 1 Introduction -- 2 Control Flow Graph Transcompilation -- 2.1 Prerequisites -- 2.2 Overview of Our Approach -- 2.3 Contexts -- 2.4 Node Passivation -- 2.5 Jumps and Internal Calls -- 2.6 Routing -- 3 Control Flow Graph Obfuscation -- 3.1 Forcing Execution -- 3.2 Node Hiding -- 3.3 Route Hiding -- 4 Security -- 4.1 Security Against Dynamic Analysis -- 5 Implementation -- 6 Conclusion -- References -- Proof of a Shuffle for Lattice-Based Cryptography -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 2 Preliminaries -- 2.1 Ideal Lattices -- 2.2 RLWE Encryption Scheme -- 2.3 Zero Knowledge Proofs -- 2.4 Pedersen Commitments -- 3 Shuffling Ring-LWE Encryptions -- 3.1 Protocol Overview -- 3.2 Proof of Knowledge of Permutation Matrix -- 3.3 Proof of Knowledge of Small Exponents -- 3.4 Opening the Commitments -- 4 Conclusions -- References -- An Analysis of Bitcoin Laundry Services -- 1 Introduction to Tumblers -- 2 Results -- 2.1 DarkLaunder, Bitlaunder and CoinMixer -- 2.2 Helix -- 2.3 Alphabay -- 3 Conclusions -- References -- Author Index. |
Record Nr. | UNISA-996466460503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVIII, 313 p. 77 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Application software Data mining Computers and civilization Computer organization Systems and Data Security Cryptology Information Systems Applications (incl. Internet) Data Mining and Knowledge Discovery Computers and Society Computer Systems Organization and Communication Networks |
ISBN | 3-319-70290-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Abstracts of Invited Talks -- Homomorphic Authentication for Computing Securely on Untrusted Machines -- Security and Privacy Challenges in Machine Learning -- Proof of Stake Blockchain Protocols -- Contents -- Outsourcing Computations -- A Server-Assisted Hash-Based Signature Scheme -- 1 Introduction -- 2 Related Work -- 3 Our Contribution -- 4 Preliminaries -- 5 Description of the Scheme -- 6 Security Proof -- 7 Practical Considerations -- 8 Conclusions and Outlook -- References -- Outsourcing of Verifiable Attribute-Based Keyword Search -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 3 System Model -- 4 ABKS Outsourcing Scheme -- 4.1 Model of ABKS Outsourcing Scheme -- 4.2 Security Definition of ABKS Outsourcing Scheme -- 4.3 Our ABKS Outsourcing Scheme -- 5 VABKS Outsourcing Scheme -- 5.1 Model of VABKS Outsourcing Scheme -- 5.2 Security Definition of VABKS Outsourcing Scheme -- 5.3 Our VABKS Outsourcing Scheme -- 6 Comparison -- 7 Conclusion -- References -- Privacy Preservation -- Is RCB a Leakage Resilient Authenticated Encryption Scheme? -- 1 Introduction -- 2 Preliminaries and Notions -- 3 General Overview of RCB -- 4 Attacks on RCB -- 4.1 Forgery Attack -- 4.2 Attacks on Misuse Resistance -- 4.3 A Denial-of-Service (DoS) Attack -- 4.4 Attack on Full-Duplex Communication -- 5 Privacy by RCB -- 6 Conclusion -- References -- Practical and Secure Searchable Symmetric Encryption with a Small Index -- 1 Introduction -- 1.1 Backgrounds -- 1.2 Our Contributions -- 1.3 Related Works -- 2 Preliminaries -- 3 Bloom Filter -- 4 Proposed Scheme -- 4.1 Constructing an Encrypted Index -- 4.2 Search Protocol -- 5 Security Analysis -- 6 Experimental Results -- References -- Anonymous Certification for an e-Assessment Framework -- 1 Introduction -- 2 Related Work.
3 Anonymous Certification (AC) Construction -- 3.1 Background -- 3.2 Our Construction -- 4 E-learning Use Case for PCS -- 4.1 TeSLA Architecture -- 4.2 Pseudonymity -- 4.3 Integrating Anonymous Certification to TeSLA -- 5 Implementation and Security Details of PCS -- 5.1 Implementation Details -- 5.2 Security Level Sketch of Our Proposal -- 6 Conclusion -- References -- PARTS -- Privacy-Aware Routing with Transportation Subgraphs -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure -- 2 Related Work -- 3 System Model -- 3.1 Road Network -- 3.2 Users -- 3.3 LBS Provider -- 3.4 Adversary -- 4 Strategies for Privacy-Enhanced Routing -- 4.1 Route Parts -- 4.2 Dummy Traffic -- 4.3 Time Shift Requests -- 5 Adversary's Inference Model -- 5.1 Background Knowledge -- 5.2 Empirically Improved Guessing -- 5.3 Privacy Measurement -- 6 Evaluation -- 6.1 Dataset and Simulator -- 6.2 Experimental Setup -- 6.3 Overhead of Segmented Routes -- 6.4 Privacy Related Results -- 6.5 Performance Analysis -- 7 Discussion -- 8 Conclusion -- References -- Security and Privacy in Machine Learning -- Bayesian Network Models in Cyber Security: A Systematic Review -- 1 Introduction -- 2 Review Methodology -- 3 Analysis of Standard Bayesian Network Models in Cyber Security -- 3.1 Citation Details -- 3.2 Data Sources Used to Construct DAGs and Populate CPTs -- 3.3 The Number of Nodes Used in the Model -- 3.4 Type of Threat Actor -- 3.5 Application and Application Sector -- 3.6 Scope of Variables -- 3.7 The Approach(es) Used to Validate Models -- 3.8 Model Purpose and Type of Purpose -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Improving and Measuring Learning Effectiveness at Cyber Defense Exercises -- 1 Introduction -- 2 Learning Measurement Dimensions in CDX's -- 2.1 5-Timestamp Methodology -- 2.2 Data Collection and Sources -- 3 LS17---Learning Measurement. 3.1 5-Timestamp Methodology Experience -- 3.2 Discussion and Findings from LS17 Learning Measurement -- 4 Related Work in Learning Measurement Context -- 5 Conclusion -- References -- Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data -- 1 Introduction -- 2 Preliminaries -- 2.1 Secure Multiparty Computation -- 2.2 Notation -- 2.3 General FIM Algorithms -- 3 Privacy-Preserving FIM -- 3.1 Algorithms for Privacy Preserving FIM -- 3.2 Comparing Bit Matrix and Set Based Approaches -- 3.3 Combining Dense and Sparse Representations -- 4 Benchmarks -- 5 Conclusion -- References -- Applications -- Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets -- 1 Introduction -- 2 Ceremony Description -- 2.1 Description of Mobilpendlerkort -- 2.2 Building the Inspection Ceremony -- 3 Attack Demonstration -- 3.1 Barcode Analysis -- 3.2 Primary Screen Forgery -- 3.3 Extra Zone Ticket Forgery -- 4 Principles -- 5 Alternative Inspection Ceremony -- 6 Related Work -- 7 Conclusions -- References -- Using the Estonian Electronic Identity Card for Authentication to a Machine -- 1 Introduction -- 2 Card Authentication -- 2.1 Document Expiration and Revocation Checks -- 2.2 Card Impersonation -- 3 Attacks by Malicious Terminals -- 3.1 Compromising the Cardholder's Privacy -- 3.2 Denial-of-Service Attacks -- 3.3 Unauthorized Use of Private Keys -- 4 Design of ID Card Emulator -- 4.1 Card ATR Adjustment -- 4.2 APDU Logging Functionality -- 4.3 Visual Imitation of ID Card -- 5 Card Authentication in Practice -- 6 Discussion: Improvements -- 6.1 Cloning Prevention -- 6.2 Cardholder Verification -- 6.3 Contactless Interface -- 7 Conclusion -- References -- Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure -- 1 Introduction -- 2 Related Work -- 3 Statistical Tests for Ransomware Attacks Detection. 4 Towards a Generic and Practical Ransomware Countermeasure -- 4.1 File System Activity Monitoring -- 4.2 Implementation Design -- 4.3 A Single Indicator of Compromise -- 5 Experiments: Performance Evaluation -- 5.1 Disk Performance -- 5.2 CPU Performance -- 5.3 Discussion -- 6 Experiments: Ransomware Detection -- 6.1 Malware - O - Matic -- 6.2 Experimental Setup -- 6.3 Detection Results -- 6.4 Ransomware-Like Applications -- 7 Conclusions -- References -- A Large-Scale Analysis of Download Portals and Freeware Installers -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Analysis System Overview -- 3.2 Installer Crawling -- 4 Results -- 4.1 Static Properties of the Installers -- 4.2 Dynamic Analysis of Installers -- 4.3 App Managers and Software Updates -- 5 Discussion and Future Work -- 6 Conclusion -- References -- Access Control -- GPASS: A Password Manager with Group-Based Access Control -- 1 Introduction -- 2 Related Work -- 3 Models and Assumptions -- 3.1 System Model -- 3.2 Threat Model -- 3.3 System Goals -- 3.4 Security Goals -- 4 GPASS -- 4.1 Overview -- 4.2 Fundamental Operations -- 5 Security Analysis -- 6 Extended GPASS -- 7 Implementation -- 8 Discussion -- 9 Conclusion -- References -- Towards Accelerated Usage Control Based on Access Correlations -- 1 Introduction -- 2 The Problem -- 3 Our Approach: SPEEDAC -- 3.1 Speculative Pre-computation of Decisions -- 3.2 Utilization of Access Correlations -- 3.3 Perceivable Overhead -- 4 Case Study -- 5 Enforcement Mechanism -- 5.1 Design Space -- 5.2 Design for Effectiveness -- 5.3 Implementation -- 6 Performance Evaluation -- 6.1 Experimental Setup -- 6.2 Perceivable Overhead -- 6.3 File-Correlation Effects -- 7 Related Work -- 8 Conclusion -- References -- Emerging Security Areas -- Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs. 1 Introduction -- 2 Control Flow Graph Transcompilation -- 2.1 Prerequisites -- 2.2 Overview of Our Approach -- 2.3 Contexts -- 2.4 Node Passivation -- 2.5 Jumps and Internal Calls -- 2.6 Routing -- 3 Control Flow Graph Obfuscation -- 3.1 Forcing Execution -- 3.2 Node Hiding -- 3.3 Route Hiding -- 4 Security -- 4.1 Security Against Dynamic Analysis -- 5 Implementation -- 6 Conclusion -- References -- Proof of a Shuffle for Lattice-Based Cryptography -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 2 Preliminaries -- 2.1 Ideal Lattices -- 2.2 RLWE Encryption Scheme -- 2.3 Zero Knowledge Proofs -- 2.4 Pedersen Commitments -- 3 Shuffling Ring-LWE Encryptions -- 3.1 Protocol Overview -- 3.2 Proof of Knowledge of Permutation Matrix -- 3.3 Proof of Knowledge of Small Exponents -- 3.4 Opening the Commitments -- 4 Conclusions -- References -- An Analysis of Bitcoin Laundry Services -- 1 Introduction to Tumblers -- 2 Results -- 2.1 DarkLaunder, Bitlaunder and CoinMixer -- 2.2 Helix -- 2.3 Alphabay -- 3 Conclusions -- References -- Author Index. |
Record Nr. | UNINA-9910483725903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|