feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV049527121
    Format: 1 Online-Ressource (XII, 173 p. 48 illus., 42 illus. in color)
    Edition: 1st ed. 2024
    ISBN: 9783031513992
    Series Statement: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 523
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-51398-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-51400-5
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9947364469602882
    Format: XX, 793 p. 207 illus. , online resource.
    ISBN: 9783642386312
    Series Statement: Lecture Notes in Computer Science, 7873
    Content: This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).
    Note: Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study -- A Technology Independent Security Gateway for Real-Time Multimedia Communication -- Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network -- Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection -- Model the Influence of Sybil Nodes in P2P Botnets -- Network Security: Security Protocols and Practice A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture -- The OffPAD: Requirements and Usage -- Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks -- Using Trusted Platform Modules for Location Assurance in Cloud Networking -- Network Security: Network Attacks and Defense Tracing Sources of Anonymous Slow Suspicious Activities -- Static Analysis for Regular Expression Denial-of-Service Attacks -- Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding -- Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning -- System Security: Malware and Intrusions MADS: Malicious Android Applications Detection through String Analysis -- X-TIER: Kernel Module Injection -- Leveraging String Kernels for Malware Detection -- Insiders Trapped in the Mirror Reveal Themselves in Social Media -- System Security: Applications Security On Business Logic Vulnerabilities Hunting: The APP LogGIC Framework -- Using the Smart Card Web Server in Secure Branchless Banking -- Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach -- Efficient and Private Three-Party Publish/Subscribe -- System Security: Security Algorithms and Systems Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks -- Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform -- Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines -- JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms -- Forward Secure Certificateless Proxy Signature Scheme -- Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP -- On the Security of an Efficient Attribute-Based Signature -- Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method -- Performance Prediction Model for Block Ciphers on GPU Architectures -- Threshold-Oriented Optimistic Fair Exchange -- Secure Storage and Fuzzy Query over Encrypted Databases -- A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation -- Privacy Preserving Context Aware Publish Subscribe Systems -- A New Unpredictability-Based RFID Privacy Model -- Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption -- Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting -- Key Agreement and Distribution Light Weight Network Coding Based Key Distribution Scheme for MANETs -- Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network -- Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards -- An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks -- Human Identification with Electroencephalogram (EEG) for the Future Network Security -- Building Better Unsupervised Anomaly Detector with S-Transform -- Fault-Tolerant Topology Control Based on Artificial Immune in WMNs -- Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens -- On the Use of Key Assignment Schemes in Authentication Protocols -- On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems -- Security Authentication of AODV Protocols in MANETs -- Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach -- Towards a Privacy-Preserving Solution for OSNs -- Measuring and Comparing the Protection Quality in Different Operating Systems -- Collusion-Resistant Domain-Specific Pseudonymous Signatures -- On the Applicability of Time-Driven Cache Attacks on Mobile Devices -- Ancestor Excludable Hierarchical ID-Based Encryption Revisited -- Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks -- A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks -- Distributed and Anonymous Publish-Subscribe -- Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs -- Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments -- Filtering Trolling Comments through Collective Classification -- Security Analysis of Touch Inputted Passwords: A Preliminary Study Based on the Resistance against Brute Force Attacks -- A Pairing-Free Identity Based Authentication Framework for Cloud Computing -- Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols -- Towards a More Secure Apache Hadoop HDFS Infrastructure: Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based Countermeasures -- A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR -- A Comprehensive Access Control System for Scientific Applications -- Partial Fingerprint Reconstruction with Improved Smooth Extension -- Modeling and Analysis for Thwarting Worm Propagation in Email Networks -- On Secure and Power-Efficient RFID-Based Wireless Body Area Network -- Towards Authenticated Objects -- A Finger-Vein Based Cancellable Bio-cryptosystem.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783642386305
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9947363879002882
    Format: XIV, 578 p. 131 illus. , online resource.
    ISBN: 9783319063201
    Series Statement: Lecture Notes in Computer Science, 8434
    Content: This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.
    Note: Access Control in and Around the Browser -- Improving Thomlinson-Walker’s Software Patching Scheme Using Standard Cryptographic and Statistical Tools -- Preserving Receiver-Location Privacy in Wireless Sensor Networks -- Data Security and Privacy in the Cloud -- Forbidden City Model – Towards a Practice Relevant Framework for Designing Cryptographic Protocols -- A CAPTCHA Scheme Based on the Identification of Character Locations -- A Multi process Mechanism of Evading Behavior-Based Bot Detection Approaches -- Obfuscating Encrypted Web Traffic with Combined Objects -- A Website Credibility Assessment Scheme Based on Page Association -- A Methodology for Hook-Based Kernel Level Rootkits -- Precise Instruction-Level Side Channel Profiling of Embedded Processors -- Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model -- SBE – A Precise Shell code Detection Engine Based on Emulation and Support Vector Machine -- HDROP: Detecting ROP Attacks Using Performance Monitoring Counters -- Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs -- High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit -- A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm -- Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis -- Implementing a Covert Timing Channel Based on Mimic Function -- Detecting Frame Deletion in H.264 Video -- Efficient Adaptive Oblivious Transfer in UC Framework -- Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes -- Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing -- Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups -- Proofs of Retrievability Based on MRD Codes -- TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing -- Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures -- Distributed Pseudo-Random Number Generation and Its Application to Cloud Database -- A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience -- Two-Party (Blind) Ring Signatures and Their Applications -- Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model -- Attribute-Based Signature with Message Recovery -- Encryption and Key Agreement An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing -- Multi-recipient Encryption in Heterogeneous Setting -- ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage -- Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement -- New Variants of Lattice Problems and Their NP-Hardness -- Improved Preimage Attacks against Reduced HAS-160 -- Modular Inversion Hidden Number Problem Revisited -- On the Recursive Construction of MDS Matrices for Lightweight Cryptography -- On Constructions of Circulant MDS Matrices for Lightweight Cryptography.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319063195
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV045537818
    Format: 1 Online-Ressource (xiv, 674 Seiten) , Illustrationen, Diagramme
    ISBN: 9783030142346
    Series Statement: Lecture notes in computer science 11449
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-14233-9
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-14235-3
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Informatik ; Datenschutz ; Chiffrierung ; Codierung ; Kryptologie ; Kryptosystem ; Kryptoanalyse ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV043579486
    Format: 1 Online-Ressource XII, 317 Seiten , Illustrationen, Diagramme
    ISBN: 9783319390772 , 9783319390765
    Series Statement: Lecture Notes in Computer Science Volume 9663
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    b3kat_BV047420703
    Format: 1 Online-Ressource (XII, 211 p. 53 illus., 28 illus. in color)
    Edition: 1st ed. 2021
    ISBN: 9783030808518
    Series Statement: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 386
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-80850-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-80852-5
    Language: English
    Keywords: Kryptologie ; Netzwerk ; Sicherheit
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    b3kat_BV045336257
    Format: 1 Online-Ressource (XII, 183 Seiten, 19 illus., 14 illus. in color)
    ISBN: 9783030011505
    Series Statement: Wireless networks
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-01149-9
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-01151-2
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    b3kat_BV046189996
    Format: 1 Online-Ressource (xiii, 398 Seiten) , 201 Illustrationen, 90 in Farbe
    ISBN: 9783030306199
    Series Statement: Lecture notes in computer science 11806
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-30618-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-30620-5
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    b3kat_BV046229857
    Format: 1 Online-Ressource (xiii, 540 Seiten) , 388 Illustrationen, 61 in Farbe
    ISBN: 9783030315788
    Series Statement: Lecture notes in computer science 11829
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-31577-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-31579-5
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Computersicherheit ; Datensicherung ; Kryptoanalyse ; Kryptosystem ; Sicherheitsprotokoll ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    b3kat_BV046325160
    Format: 1 Online-Ressource (xiii, 731 Seiten) , 264 Illustrationen, 143 in Farbe
    ISBN: 9783030369385
    Series Statement: Lecture notes in computer science 11928
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-36937-8
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-36939-2
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Computersicherheit ; Sicherheitsprotokoll ; Malware ; Kryptoanalyse ; Kryptosystem ; Schlüsselverteilung ; Automatische Identifikation ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages