Cargando…

Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings /

This book constitutes the refereed proceedings of the 14th International Conference on Secure IT Systems, NordSec 2009, held in Oslo, Norway, October 14-16, 2009. The 20 revised full papers and 8 short papers presented were carefully reviewed and selected from 52 submissions. Under the theme Identit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Jøsang, Audun (Editor ), Maseng, Torleiv (Editor ), Knapskog, Svein J. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Security and Cryptology ; 5838
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-04766-4
003 DE-He213
005 20220115052302.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642047664  |9 978-3-642-04766-4 
024 7 |a 10.1007/978-3-642-04766-4  |2 doi 
050 4 |a QA76.76.A65 
072 7 |a UB  |2 bicssc 
072 7 |a COM018000  |2 bisacsh 
072 7 |a UX  |2 thema 
082 0 4 |a 005.3  |2 23 
245 1 0 |a Identity and Privacy in the Internet Age  |h [electronic resource] :  |b 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings /  |c edited by Audun Jøsang, Torleiv Maseng, Svein J. Knapskog. 
250 |a 1st ed. 2009. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a X, 303 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 5838 
505 0 |a Session 1: Anonymity and Privacy -- On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market -- Facilitating the Adoption of Tor by Focusing on a Promising Target Group -- A Parallelism-Based Approach to Network Anonymization -- Security Usability of Petname Systems -- Session 2: Modelling and Design -- An Analysis of Widget Security -- Trade-Offs in Cryptographic Implementations of Temporal Access Control -- Blunting Differential Attacks on PIN Processing APIs -- Session 3: Network Layer Security -- Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic -- An Improved Attack on TKIP -- Session 4: Security for Mobile Users -- ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System -- A Mechanism for Identity Delegation at Authentication Level -- Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services -- Towards True Random Number Generation in Mobile Environments -- Session 5: Embedded Systems and Mechanisms -- Towards Modelling Information Security with Key-Challenge Petri Nets -- Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011 -- Advanced SIM Capabilities Supporting Trust-Based Applications -- Towards Practical Enforcement Theories -- Session 6: Protocols and Protocol Analysis -- Security Analysis of AN.ON's Payment Scheme -- Formal Analysis of the Estonian Mobile-ID Protocol -- Generating In-Line Monitors for Rabin Automata. 
520 |a This book constitutes the refereed proceedings of the 14th International Conference on Secure IT Systems, NordSec 2009, held in Oslo, Norway, October 14-16, 2009. The 20 revised full papers and 8 short papers presented were carefully reviewed and selected from 52 submissions. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile networks under an increasingly serious threat picture. Among the contemporary security issues discussed were Security Services Modeling, Petri Nets, Attack Graphs, Electronic Voting Schemes, Anonymous Payment Schemes, Mobile ID-Protocols, SIM Cards, Network Embedded Systems, Trust, Wireless Sensor Networks, Privacy, Privacy Disclosure Regulations, Financial Cryptography, PIN Verification, Temporal Access Control, Random Number Generators, and some more. 
650 0 |a Application software. 
650 0 |a Information storage and retrieval systems. 
650 0 |a Coding theory. 
650 0 |a Information theory. 
650 0 |a Data protection. 
650 0 |a Data structures (Computer science). 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Computer and Information Systems Applications. 
650 2 4 |a Information Storage and Retrieval. 
650 2 4 |a Coding and Information Theory. 
650 2 4 |a Data and Information Security. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Cryptology. 
700 1 |a Jøsang, Audun.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Maseng, Torleiv.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Knapskog, Svein J.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642047671 
776 0 8 |i Printed edition:  |z 9783642047657 
830 0 |a Security and Cryptology ;  |v 5838 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-04766-4  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)