Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Duplicate Items
Add to My List

Print
Sorts and Limits


Title: Foundations and Practice of Security 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers / edited by Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi.
Lecture Notes in Computer Science,
Lecture notes in computer science,

Main Entry: Garcia-Alfaro, Joaquin. editor.
Cuppens, Frédéric. editor.
Cuppens-Boulahia, Nora. editor.
Miri, Ali. editor.
Tawbi, Nadia. editor.
SpringerLink (Online service)

Publisher: Springer Berlin Heidelberg : Imprint: Springer,
Publication Date: 2013.
Publication Place: Berlin, Heidelberg :
ISBN: 9783642371196
Subject: Computer science.
Software engineering.
Computer vision.
Information systems.
Information systems.
Management information systems.
Computer science.
Software engineering.
Information Systems Applications (incl.Internet).
Business information systems.
Computer Appl. in Administrative Data Processing.
Management of Computing and Information Systems.
Computer Imaging, Vision, Pattern Recognition and Graphics.

Series: Lecture Notes in Computer Science, 7743
Lecture notes in computer science, 7743

Contents: Cryptography and Information Theory -- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic Protocols -- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities -- COMPASS: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network Users through the Social Graph -- A Formal Derivation of Composite Trust -- Policies and Applications Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy in the Java Security Manager -- A Novel Obfuscation: Class Hierarchy Flattening -- RESource: A Framework for Online Matching of Assembly with Open Source Code -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone -- Network and Adaptive Security -- Short-Term Linkable Group Signatures with Categorized Batch Verification -- GHUMVEE: Efficient, Effective, and Flexible Replication -- Extracting Attack Scenarios Using Intrusion Semantics -- On Securely Manipulating XML Data -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC -- Short Papers -- Towards Modelling Adaptive Attacker’s Behaviour -- Scalable Deniable Group Key Establishment -- Information-Theoretic Foundations of Differential Privacy.
Related Records: Springer eBooks
Printed edition: 9783642371189

Cover Image: http://images.amazon.com/images/P/9783642371196.jpg

Results 1 - 1 of 1
  Agency: Collection: Item Type: Status: Barcode: Media Type:
JUST Main Library Electronic Resources No Circulation Available Online -637991 Book