Foundations and Practice of Security
Springer International Publishing (Verlag)
978-3-319-05301-1 (ISBN)
On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case.- On the Feasibility of a Censorship Resistant Decentralized Naming System.- A General Framework for Group Authentication and Key Exchange Protocols.- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange.- Model-Based Specification and Validation of Security and Dependability Patterns.- Enforcing Information Flow by Combining Static and Dynamic Analysis.- Fault Injection to Reverse Engineer DES-like Cryptosystems.- Software Camouflage.- Investigation of Parameters Influencing the Success of Optical Fault Attacks.- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework.- Quantitative Evaluation of Enforcement Strategies.- Collusion Resistant Inference Control for Cadastral Databases.- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model.- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations.- Computational Soundness of Symbolic Blind Signatures under Active Attacker.- Improved Davies-Murphys Attack on DES Revisited.- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts.- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs.- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks.- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs.- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.- Evaluation of Software-Oriented Block Ciphers on Smartphones.- Don t Push it: Breaking iButton Security.- Discovering Flaws in IDS through Analysis of their Inputs.- On the Reverse Engineering of the Citadel Botnet.- The Carna Botnet Through the Lens of a Network Telescope.
Erscheint lt. Verlag | 10.4.2014 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 444 p. 134 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 700 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • authentication • Block Ciphers • cipher attacks • cryptography • formal methods • formal security models • Intrusion Detection • Key Management • Networks • Physical Security • security protocols • security services |
ISBN-10 | 3-319-05301-9 / 3319053019 |
ISBN-13 | 978-3-319-05301-1 / 9783319053011 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich