Laud | Information Security Technology for Applications | Buch | 978-3-642-29614-7 | sack.de

Buch, Englisch, 273 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 434 g

Reihe: Security and Cryptology

Laud

Information Security Technology for Applications

16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers
1. Auflage 2012
ISBN: 978-3-642-29614-7
Verlag: Springer

16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers

Buch, Englisch, 273 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 434 g

Reihe: Security and Cryptology

ISBN: 978-3-642-29614-7
Verlag: Springer


This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware.

Laud Information Security Technology for Applications jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


Invited Papers.-Designing a Governmental Backbone.-Internet Voting in Estonia.-Contributed Papers.-A Ring Based Onion Circuit for Hidden Services.-User Tracking on the Web via Cross-Browser Fingerprinting.-Comparison of SRAM and FF PUF in 65nm Technology.-Modular Anomaly Detection for Smartphone Ad Hoc Communication.-Mental Voting Booths.-Methods for Privacy Protection Considering Status of Service Provider and User Community.-The Security and Memorability of Passwords Generated by Using an Association Element and a Personal Factor.-Increasing Service Users’ Privacy Awareness by Introducing On-Line Interactive Privacy Features.-Optimized Inlining of Runtime Monitors.-Identity-Based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Service.-Feature Reduction to Speed Up Malware Classification.-Rooting Android – Extending the ADB by an Auto-connecting WiFi-Accessible Service.-An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks.-Disjunction Category Labels.-Visualization Control for Event-Based Public Display Systems Used in a Hospital Setting.-Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations.-



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.