Muutke küpsiste eelistusi

E-raamat: Information Security Theory and Practice: 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings

Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 10741
  • Ilmumisaeg: 20-Jun-2018
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319935249
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 10741
  • Ilmumisaeg: 20-Jun-2018
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319935249

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. 

The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.

Security in Emerging Systems
A Secure and Trusted Channel Protocol for UAVs Fleets
3(22)
Raja Naeem Akram
Konstantinos Markantonakis
Keith Mayes
Pierre-Francois Bonnefoi
Amino Cherif
Damien Sauveron
Serge Chaumette
Philanthropy on the Blockchain
25(16)
Danushka Jayasinghe
Sheila Cobourne
Konstantinos Markantonakis
Raja Naeem Akram
Keith Mayes
Security of Data
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database
41(15)
Shujie Cui
Ming Zhang
Muhammad Rizwan Asghar
Giovanni Russello
JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language
56(19)
Hao Jiang
Ahmed Bouabdallah
Trusted Execution
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
75(18)
Carlton Shepherd
Raja Naeem Akram
Konstantinos Markantonakis
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip
93(20)
Sebanjila Kevin Bukasa
Ronan Lashermes
Helene Le Bouder
Jean-Louis Lanet
Axel Legay
Defences and Evaluation
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications
113(17)
Madeline Cheah
Hoang Nga Nguyen
Jeremy Bryans
Siraj A. Shaikh
Examination of a New Defense Mechanism: Honey words
130(10)
Ziya Alper Gene
Siileyman Kardas
Mehmet Sabir Kiraz
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics
140(15)
Yonas Leguesse
Mark Vella
Joshua Ellul
Protocols and Algorithms
A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps
155(10)
Oznur Kalkar
Mehmet Sabir Kiraz
Isa Sertkaya
Osmanbey Uzunkol
A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons
165(12)
Pau Conejero-Alberola
M. Francisca Hinarejos
Josep-Lluis Ferrer-Gomila
Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough?
177(12)
Nektaria Kaloudi
Aikaterini Mitrokotsa
Author Index 189