Atjaunināt sīkdatņu piekrišanu

E-grāmata: ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings

Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2016, held in Ghent, Belgium, in May/June 2016. The 27 revised full papers presented were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on cryptographic protocols, human aspects of security, cyber infrastructure, social networks, software vulnerabilities, TPM and internet of things, sidechannel analysis, software security, and privacy.
Cryptographic Protocols
Coercion-Resistant Proxy Voting
3(14)
Oksana Kulyk
Stephan Neumann
Karola Marky
Jurlind Budurushi
Melanie Volkamer
A Posteriori Openable Public Key Encryption
17(15)
Xavier Bultel
Pascal Lafourcade
Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid
32(17)
Sergio Camara
Dhananjay Anand
Victoria Pillitteri
Luiz Carmo
Human Aspects of Security
Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research
49(13)
Gurpreet Dhillon
Spyridon Samonas
Ugo Etudo
Evaluating CVSS Base Score Using Vulnerability Rewards Programs
62(14)
Awad Younis
Yashwant K. Malaiya
Indrajit Ray
Defining Objectives for Preventing Cyberstalking
76(15)
Gurpreet Dhillon
Chandrashekar Challa
Kane Smith
Cyber Infrastructure
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System
91(14)
Sridhar Adepu
Aditya Mathur
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud
105(14)
Yanhuang Li
Nora Cuppens-Boulahia
Jean-Michel Crom
Frederic Cuppens
Vincent Frey
Software Defined Networking Reactive Stateful Firewall
119(16)
Salaheddine Zerkane
David Espes
Philippe Le Pare
Frederic Cuppens
Phishing and Data Sharing
Teaching Phishing-Security: Which Way is Best?
135(15)
Simon Stockhardt
Benjamin Reinheimer
Melanie Volkamer
Peter Mayer
Alexandra Kunz
Philipp Rack
Daniel Lehmann
On Gender Specific Perception of Data Sharing in Japan
150(11)
Markus Tschersich
Shinsaku Kiyomoto
Sebastian Pape
Toru Nakamura
Gokhan Bal
Haruo Takasaki
Kai Rannenberg
TORPEDO: TOoltip-poweRed Phishing Email Detection
161(18)
Melanie Volkamer
Karen Renaud
Benjamin Reinheimer
Social Networks
SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks
179(15)
Dieudonne Mulamba
Indrajit Ray
Indrakshi Ray
Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence
194(17)
Iraklis Symeonidis
Fatemeh Shirazi
Gergely Biczok
Cristina Perez-Sola
Bart Preneel
Software Vulnerabilities
Automated Source Code Instrumentation for Verifying Potential Vulnerabilities
211(16)
Hongzhe Li
Jaesang Oh
Hakjoo Oh
Heejo Lee
An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities
227(16)
Daniela Oliveira
Jedidiah Crandall
Harry Kalodner
Nicole Morin
Megan Maher
Jesus Navarro
Felix Emiliano
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners
243(18)
Enrico Bazzoli
Claudio Criscione
Federico Maggi
Stefano Zanero
TPM and Internet of Things
A Utility-Based Reputation Model for the Internet of Things
261(15)
Benjamin Aziz
Paul Fremantle
Rui Wei
Alvaro Arenas
Advanced Remote Firmware Upgrades Using TPM 2.0
276(17)
Andreas Fuchs
Christoph Krauß
Jurgen Repp
Sidechannel Analysis
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
293(15)
Yuan Zhao
Jingqiang Lin
Wuqiong Pan
Cong Xue
Fangyu Zheng
Ziqiang Ma
Uncertain? No, It's Very Certain!: Recovering the Key from Guessing Entropy Enhanced CPA
308(15)
Changhai Ou
Zhu Wang
Degang Sun
Xinping Zhou
Juan Ai
Software Security
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware
323(14)
Ping Chen
Christophe Huygens
Lieven Desmet
Wouter Joosen
NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries
337(15)
Yu-Yang Hong
Yu-Ping Wang
Jie Yin
A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor
352(17)
Andrew Bedford
Stephen Chong
Josee Desharnais
Nadia Tawbi
Privacy
Deducing User Presence from Inter-Message Intervals in Home Automation Systems
369(15)
Frederik Mollers
Christoph Sorge
Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies
384(14)
Ella Kolkowska
Annica Kristofferson
A Trustless Privacy-Preserving Reputation System
398(15)
Alexander Schaub
Remi Bazin
Omar Hasan
Lionel Brunie
Author Index 413