Information Security Theory and Practice. Securing the Internet of Things
Sweet Dreams and Nightmares: Security in the Internet of Things.- A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations.- Towards More Practical Time-Driven Cache Attacks.- Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Built in Protection against Side-Channel and Fault Attacks.- New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards.- A Pre-processing Composition for Secret Key Recovery on Android Smartphone.- Usable Privacy for Mobile Sensing Applications.- A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.- End-to-End Secure and Privacy Preserving Mobile Chat Application.- S-box, SET, Match: A Toolbox for S-box Analysis.- Policy-Based Access Control for Body Sensor Networks.- Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider.- CAN Bus Risk Analysis Revisit.- AU2EU: Privacy-Preserving Matching of DNA Sequences.- Early DDoS Detection Based on Data Mining Techniques.
| Erscheint lt. Verlag | 11.7.2014 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XVIII, 201 p. 47 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 343 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | Ambient Intelligence • authentication • cryptanalysis and other attacks • cryptography • Cyber-Physical Systems • embedded devices • Information Security • internet of things • Internet of Things (IoT) • Mobile Devices • Mobile Security • Network Security • privacy • security services • Smart cards • Systems Security |
| ISBN-13 | 9783662438251 / 9783662438251 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich