My Account Log in

1 option

Foundations and Practice of Security : 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers / edited by Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Garcia-Alfaro, Joaquin, editor.
Cuppens, Frédéric, editor.
Cuppens-Boulahia, Nora, editor.
Miri, Ali, editor.
Tawbi, Nadia, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 7743.
Security and Cryptology ; 7743
Language:
English
Subjects (All):
Software engineering.
Application software.
Information technology.
Business--Data processing.
Business.
Management information systems.
Computer science.
Optical data processing.
Software Engineering.
Information Systems Applications (incl. Internet).
IT in Business.
Computer Appl. in Administrative Data Processing.
Management of Computing and Information Systems.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Local Subjects:
Software Engineering.
Information Systems Applications (incl. Internet).
IT in Business.
Computer Appl. in Administrative Data Processing.
Management of Computing and Information Systems.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Physical Description:
1 online resource (XIV, 383 pages) : 90 illustrations.
Edition:
First edition 2013.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
System Details:
text file PDF
Summary:
This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security.
Contents:
Cryptography and Information Theory
MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption
Proofs of Retrievability via Fountain Code
MARC: Modified ARC4
Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements
Key Management and Cryptographic Protocols
A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes
Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities
COMPASS: Authenticated Group Key Agreement from Signcryption
Privacy and Trust
Classifying Online Social Network Users through the Social Graph
A Formal Derivation of Composite Trust
Policies and Applications Security
Policy Administration in Tag-Based Authorization
Enabling Dynamic Security Policy in the Java Security Manager
A Novel Obfuscation: Class Hierarchy Flattening
RESource: A Framework for Online Matching of Assembly with Open Source Code
Touchjacking Attacks on Web in Android, iOS, and Windows Phone
Network and Adaptive Security
Short-Term Linkable Group Signatures with Categorized Batch Verification
GHUMVEE: Efficient, Effective, and Flexible Replication
Extracting Attack Scenarios Using Intrusion Semantics
On Securely Manipulating XML Data
Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks
QoS Aware Adaptive Security Scheme for Video Streaming in MANETs
A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC
Short Papers
Towards Modelling Adaptive Attacker's Behaviour
Scalable Deniable Group Key Establishment
Information-Theoretic Foundations of Differential Privacy.
Other Format:
Printed edition:
ISBN:
978-3-642-37119-6
9783642371196
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account