My Account Log in

1 option

Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings / edited by Raja Naeem Akram, Sushil Jajodia.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Akram, Raja Naeem, editor.
Jajodia, Sushil, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 9311.
Security and Cryptology ; 9311
Language:
English
Subjects (All):
Management information systems.
Computer science.
Data encryption (Computer science).
Computer organization.
Application software.
Management of Computing and Information Systems.
Cryptology.
Computer Systems Organization and Communication Networks.
Information Systems Applications (incl. Internet).
Local Subjects:
Management of Computing and Information Systems.
Cryptology.
Computer Systems Organization and Communication Networks.
Information Systems Applications (incl. Internet).
Physical Description:
1 online resource (XII, 281 pages) : 65 illustrations in color.
Edition:
First edition 2015.
Contained In:
Springer eBooks
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2015.
System Details:
text file PDF
Summary:
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory and Practices, WISTP 2015, held in Heraklion, Crete, Greece, in August 2015. The 14 revised full papers and 4 short papers presented together were carefully reviewed and selected from 52 submissions. WISTP 2015 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of elded systems, the application of security technology, the implementation of systems, and lessons learned. We encouraged submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues. .
Contents:
Security and Privacy Services
On Secrecy Amplification Protocols
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols
Private Minutia-based Fingerprint Matching
Secure Resource Sharing and Access Control
Secure Resource Sharing for Embedded Protected Module Architectures
Secure Obfuscation of Authoring Style
DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption
WSACd - A Usable Access Control Framework for Smart Home Devices.-Secure Devices and Execution Environment
Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques
Practical and Privacy-Preserving TEE Migration
Randomizing the Montgomery Powering Ladder
Challenges of Security and Reliability
How Current Android Malware Seeks to Evade Automated Code Analysis
On linkability and malleability in self-blindable credentials
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality
Short Papers
Normalizing Security Events with a Hierarchical Knowledge Base
Attack Tree Generation by Policy Invalidation
Lightweight Password Hashing Scheme for Embedded Systems
Secure and Authenticated Access to LLN Resources Through Policy Constraints.
Other Format:
Printed edition:
ISBN:
978-3-319-24018-3
9783319240183
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account