My Account Log in

1 option

Security and Trust Management : 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings / edited by Sjouke Mauw, Mauro Conti.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Mauw, S., editor.
Conti, Mauro, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 11738.
Security and Cryptology ; 11738
Language:
English
Subjects (All):
Computer security.
Computers and civilization.
Electronic commerce.
Application software.
Systems and Data Security.
Computers and Society.
e-Commerce/e-business.
Information Systems Applications (incl. Internet).
Local Subjects:
Systems and Data Security.
Computers and Society.
e-Commerce/e-business.
Information Systems Applications (incl. Internet).
Physical Description:
1 online resource (IX, 169 pages) : 71 illustrations, 13 illustrations in color.
Edition:
First edition 2019.
Contained In:
Springer eBooks
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2019.
System Details:
text file PDF
Summary:
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.
Contents:
Improving Identity and Authentication Assurance in Research and Education Federations
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations
Is a Smarter Grid Also Riskier
BioID: a Privacy-Friendly Identity Document
On the Statistical Detection of Adversarial Instances over Encrypted Data
Understanding Attestation: Analyzing Protocols that use Quotes
Challenges of Using Trusted Computing for Collaborative Data Processing
Secure Trust Evaluation Using Multipath and Referral Chain Methods
Personal Cross-Platform Reputation
An OBDD-based Technique for the Efficient Synthesis of Garbled Circuits.
Other Format:
Printed edition:
ISBN:
978-3-030-31511-5
9783030315115
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account