Information Security Theory and Practice
Springer International Publishing (Verlag)
978-3-319-24017-6 (ISBN)
Security and Privacy Services.- On Secrecy Amplification Protocols.- Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing.- Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols.- Private Minutia-based Fingerprint Matching.- Secure Resource Sharing and Access Control.- Secure Resource Sharing for Embedded Protected Module Architectures.- Secure Obfuscation of Authoring Style.- DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption.- WSACd - A Usable Access Control Framework for Smart Home Devices.-Secure Devices and Execution Environment.- Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques.- Practical and Privacy-Preserving TEE Migration.- Randomizing the Montgomery Powering Ladder.- Challenges of Security and Reliability.- How Current Android Malware Seeks to Evade Automated Code Analysis.- On linkability and malleability in self-blindable credentials.- Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality.- Short Papers.- Normalizing Security Events with a Hierarchical Knowledge Base.- Attack Tree Generation by Policy Invalidation.- Lightweight Password Hashing Scheme for Embedded Systems.- Secure and Authenticated Access to LLN Resources Through Policy Constraints.
Erscheinungsdatum | 08.10.2016 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 281 p. 65 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Software Entwicklung ► User Interfaces (HCI) |
Mathematik / Informatik ► Mathematik ► Finanz- / Wirtschaftsmathematik | |
Schlagworte | Access Control • anonymity • artificial intelligence (incl. robotics) • Computer Communication Networks • Computer Science • Countermeasures • cryptography • Database Management • data mining and knowledge discovery • Information storage and retrieval • information systems applications (incl. internet) • internet of things • Lightweight cryptography • Mobile and wireless security • Natural Language Processing • Network Security • password hashing • security in hardware • security protocols • security services • Side-Channel Analysis • Smart Home • Systems Security • trusted computing • ubiquitous computing • vulnerability • Web Services |
ISBN-10 | 3-319-24017-X / 331924017X |
ISBN-13 | 978-3-319-24017-6 / 9783319240176 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich