Atjaunināt sīkdatņu piekrišanu

E-grāmata: ICT Systems Security and Privacy Protection: 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings

  • Formāts - EPUB+DRM
  • Cena: 118,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. 
The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.

Privacy Models and Preferences:.- A Privacy Calculus Model for Contact
Tracing Apps: Analyzing the German Corona-Warn-App.- Deriving and Using
Synthetic Consequences for Privacy Risk Modeling.- Stuart Shapiro Enhanced
Privacy in Smart Workplaces: Employees Preferences for Transparency
Indicators and Control Interactions in the Case of Data Collection with Smart
Watches.-  Network Security and IDS.- DAEMON: Dynamic Auto-Encoders for
contextualised anomaly detection applied to security MONitoring.- FOCUS:
Frequency based detection of Covert Ultrasonic Signals.- Passive,
Transparent, and Selective TLS Decryption for Network Security Monitoring.-
Network Security and Privacy.- A study on the use of 3rd party DNS resolvers
for malware filtering or censorship circumvention.- RAAM: A Restricted
Adversarial Attack Model with Adding Perturbations to Traffic Features.-
Evaluation of Circuit Lifetimes in Tor.- Forensics.- D-Cloud-Collector:
Admissible Forensic Evidence from Mobile Cloud Storage.- Robust PDF Files
Forensics Using Coding Style.- Light-Weight File Fragments Classification
using Depthwise Separable Convolution.- Trust and PETs.- Novel Approaches for
the Development of Trusted IoT Entities.- Requirements and Secure
Serialization for Selective Disclosure Verifiable Credentials.- Crypto-based
solutions.- UP-MLE: Effcient and Practical Updatable Block-Level
MessageLocked Encryption Scheme Based on Update Properties.- CryptKSP: A
Kernel Stack Protection Model based on AES-NI Hardware Feature.- Usable
Security.- Usability Insights from Establishing TLS Connections.- Usability
of Antivirus Tools in a Threat Detection Scenario.- Data Minimisation
Potential for Timestamps in Git: An Empirical Analysis of User
Configurations.- Blockchain.- Greedy Networking in Cryptocurrency
Blockchain.- Towards Supporting Attribute-Based Access Control in Hyperledger
Fabric Blockchain.- Mobile Security and Privacy.- AndroClonium:
Bytecode-Level Code Clone Detection for Obfuscated Android Apps.- One Light,
One App: Tackling A Common Misperception Causing Breach of User Privacy.-
Double-X: Towards Double-Cross-based Unlock Mechanism on Smartphones.- PETs
and Crypto.- Post-Quantum Cheating Detectable Private Information Retrieval.-
Anonymous Trusted Data Relocation for TEEs.- Efficient Volume-Hiding
Encrypted Multi-Maps with Support for Conjunctive Queries.- Vulnerabilities.-
Upside Down: Exploring the Ecosystem of Dark Web Data Markets.- An Effcient
Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification.