Security and Privacy in Communication Networks
Springer Berlin (Verlag)
978-3-642-16160-5 (ISBN)
Malware and Email Security.- SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection.- Analyzing and Exploiting Network Behaviors of Malware.- Inexpensive Email Addresses An Email Spam-Combating System.- Anonymity and Privacy.- Privacy Administration in Distributed Service Infrastructure.- On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.- Wireless Security.- A Study on False Channel Condition Reporting Attacks in Wireless Networks.- Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services.- Saving Energy on WiFi with Required IPsec.- Systems Security - I.- Transparent Protection of Commodity OS Kernels Using Hardware Virtualization.- A Generic Construction of Dynamic Single Sign-on with Strong Security.- DeCore: Detecting Content Repurposing Attacks on Clients' Systems.- Network Security - I.- Realizing a Source Authentic Internet.- Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks.- Attacking Beacon-Enabled 802.15.4 Networks.- Supporting Publication and Subscription Confidentiality in Pub/Sub Networks.- Security Protocols - I.- CED2: Communication Efficient Disjointness Decision.- Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes.- Context-Aware Usage Control for Android.- System Security - II.- Efficient Isolation of Trusted Subsystems in Embedded Systems.- Enhancing Host Security Using External Environment Sensors.- FADE: Secure Overlay Cloud Storage with File Assured Deletion.- Security Protocols - II.- A NewInformation Leakage Measure for Anonymity Protocols.- Hidden Markov Models for Automated Protocol Learning.- Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast.- Network Security - II.- Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly.- The Hitchhiker's Guide to DNS Cache Poisoning.- A Formal Definition of Online Abuse-Freeness.
Erscheint lt. Verlag | 3.9.2010 |
---|---|
Reihe/Serie | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Zusatzinfo | XIII, 500 p. 160 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 783 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Schlagworte | Algorithm analysis and problem complexity • anonoymity • broadcast • denial of service • email security • Embedded Systems • Host • Internet • Malware • Network Security • Online • overlay • privacy • protection • Quorum • Spam • Wireless Security |
ISBN-10 | 3-642-16160-X / 364216160X |
ISBN-13 | 978-3-642-16160-5 / 9783642161605 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich