My Account Log in

1 option

Security and Privacy in Communication Networks : 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II / edited by Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Garcia-Alfaro, Joaquin, Editor.
Li, Shujun, Editor.
Poovendran, Radha, Editor.
Debar, Hervé., Editor.
Yung, Moti, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering 1867-822X ; 399
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1867-822X ; 399
Language:
English
Subjects (All):
Data protection.
Computer networks.
Cryptography.
Data encryption (Computer science).
Computer networks-Security measures.
Data and Information Security.
Computer Communication Networks.
Cryptology.
Mobile and Network Security.
Local Subjects:
Data and Information Security.
Computer Communication Networks.
Cryptology.
Mobile and Network Security.
Physical Description:
1 online resource (XVII, 527 pages) : 138 illustrations, 96 illustrations in color.
Edition:
1st ed. 2021.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2021.
System Details:
text file PDF
Summary:
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.
Contents:
Anonymous Short Communications over Social Networks
A Sybil detection method in OSN based on DistilBERT and Double-SN-LSTM for text analysis
ePayment Security 31 An Empirical Study on Mobile Payment Credential Leaks and Their Exploits
System-Wide Security for Offline Payment Terminals
Horus: A Security Assessment Framework for Android Crypto Wallets
Systems Security
Leakuidator: Leaky resource attacks and countermeasures
Jabbic lookups: a backend telemetry-based system for malware triage Octavian
Facilitating Parallel Fuzzing with Mutually-exclusive Task Distribution
Flowrider: Fast On-Demand Key Provisioning for CloudNetworks
Mobile Security and Privacy
Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google Douglas Leith
Who's Accessing My Data? Application-Level Access Control for Bluetooth Low Energy
HTPD: Secure and Flexible Message-Based Communication for Mobile Apps
Smartphone Location Spoofing Attack in Wireless Networks
IoT Security and Privacy 42 Compromised through Compression
iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-physical Systems.
Other Format:
Printed edition:
ISBN:
978-3-030-90022-9
9783030900229
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account