Information Security Theory and Practice. Securing the Internet of Things
Springer Berlin (Verlag)
978-3-662-43825-1 (ISBN)
Sweet Dreams and Nightmares: Security in the Internet of Things.- A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations.- Towards More Practical Time-Driven Cache Attacks.- Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Built in Protection against Side-Channel and Fault Attacks.- New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards.- A Pre-processing Composition for Secret Key Recovery on Android Smartphone.- Usable Privacy for Mobile Sensing Applications.- A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.- End-to-End Secure and Privacy Preserving Mobile Chat Application.- S-box, SET, Match: A Toolbox for S-box Analysis.- Policy-Based Access Control for Body Sensor Networks.- Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider.- CAN Bus Risk Analysis Revisit.- AU2EU: Privacy-Preserving Matching of DNA Sequences.- Early DDoS Detection Based on Data Mining Techniques.
Erscheint lt. Verlag | 11.7.2014 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XVIII, 201 p. 47 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 343 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Ambient Intelligence • authentication • cryptanalysis and other attacks • cryptography • Cyber-Physical Systems • embedded devices • Information Security • internet of things • Internet of Things (IoT) • Mobile Devices • Mobile Security • Network Security • privacy • security services • Smart cards • Systems Security |
ISBN-10 | 3-662-43825-9 / 3662438259 |
ISBN-13 | 978-3-662-43825-1 / 9783662438251 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich