Foundations and Practice of Security
Springer International Publishing (Verlag)
9783319053011 (ISBN)
On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case.- On the Feasibility of a Censorship Resistant Decentralized Naming System.- A General Framework for Group Authentication and Key Exchange Protocols.- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange.- Model-Based Specification and Validation of Security and Dependability Patterns.- Enforcing Information Flow by Combining Static and Dynamic Analysis.- Fault Injection to Reverse Engineer DES-like Cryptosystems.- Software Camouflage.- Investigation of Parameters Influencing the Success of Optical Fault Attacks.- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework.- Quantitative Evaluation of Enforcement Strategies.- Collusion Resistant Inference Control for Cadastral Databases.- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model.- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations.- Computational Soundness of Symbolic Blind Signatures under Active Attacker.- Improved Davies-Murphys Attack on DES Revisited.- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts.- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs.- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks.- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs.- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.- Evaluation of Software-Oriented Block Ciphers on Smartphones.- Don t Push it: Breaking iButton Security.- Discovering Flaws in IDS through Analysis of their Inputs.- On the Reverse Engineering of the Citadel Botnet.- The Carna Botnet Through the Lens of a Network Telescope.
| Erscheint lt. Verlag | 10.4.2014 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XIII, 444 p. 134 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 700 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Access Control • authentication • Block Ciphers • cipher attacks • cryptography • formal methods • formal security models • Intrusion Detection • Key Management • Networks • Physical Security • security protocols • security services |
| ISBN-13 | 9783319053011 / 9783319053011 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich