Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Duplicate Items
Add to My List

Print
Sorts and Limits


Title: Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers / edited by Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood.
Lecture Notes in Computer Science,
Lecture notes in computer science,

Main Entry: Danger, Jean Luc. editor.
Debbabi, Mourad. editor.
Marion, Jean-Yves. editor.
Garcia-Alfaro, Joaquin. editor.
Zincir Heywood, Nur. editor.
SpringerLink (Online service)

Publisher: Springer International Publishing : Imprint: Springer,
Publication Date: 2014.
Publication Place: Cham :
ISBN: 9783319053028
Subject: Computer science.
Computer security.
Data encryption (Computer science).
Coding theory.
Computer science.
Data encryption.
Systems and Data Security.
Coding and Information Theory.

Series: Lecture Notes in Computer Science, 8352
Lecture notes in computer science, 8352

Contents: On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange -- Model-Based Specification and Validation of Security and Dependability Patterns -- Enforcing Information Flow by Combining Static and Dynamic Analysis -- Fault Injection to Reverse Engineer DES-like Cryptosystems -- Software Camouflage -- Investigation of Parameters Influencing the Success of Optical Fault Attacks -- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework -- Quantitative Evaluation of Enforcement Strategies -- Collusion Resistant Inference Control for Cadastral Databases -- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model -- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations -- Computational Soundness of Symbolic Blind Signatures under Active Attacker -- Improved Davies-Murphys Attack on DES Revisited -- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts -- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs -- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks -- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs -- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation -- Evaluation of Software-Oriented Block Ciphers on Smartphones -- Don’t Push it: Breaking iButton Security -- Discovering Flaws in IDS through Analysis of their Inputs -- On the Reverse Engineering of the Citadel Botnet -- The Carna Botnet Through the Lens of a Network Telescope.
Related Records: Springer eBooks
Printed edition: 9783319053011

Cover Image: http://images.amazon.com/images/P/9783319053028.jpg

Results 1 - 1 of 1
  Agency: Collection: Item Type: Status: Barcode: Media Type:
JUST Main Library Electronic Resources No Circulation Available Online -707064 Book