Cargando…

Foundations and Practice of Security 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers /

This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 22 full papers, accompanied by 3 short papers. The pape...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Garcia-Alfaro, Joaquin (Editor ), Cuppens, Frederic (Editor ), Cuppens-Boulahia, Nora (Editor ), Miri, Ali (Editor ), Tawbi, Nadia (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Edición:1st ed. 2013.
Colección:Security and Cryptology ; 7743
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-37119-6
003 DE-He213
005 20220115093901.0
007 cr nn 008mamaa
008 130327s2013 gw | s |||| 0|eng d
020 |a 9783642371196  |9 978-3-642-37119-6 
024 7 |a 10.1007/978-3-642-37119-6  |2 doi 
050 4 |a QA76.758 
072 7 |a UMZ  |2 bicssc 
072 7 |a COM051230  |2 bisacsh 
072 7 |a UMZ  |2 thema 
082 0 4 |a 005.1  |2 23 
245 1 0 |a Foundations and Practice of Security  |h [electronic resource] :  |b 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers /  |c edited by Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi. 
250 |a 1st ed. 2013. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2013. 
300 |a XIV, 383 p. 90 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 7743 
505 0 |a Cryptography and Information Theory -- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic Protocols -- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities -- COMPASS: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network Users through the Social Graph -- A Formal Derivation of Composite Trust -- Policies and Applications Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy in the Java Security Manager -- A Novel Obfuscation: Class Hierarchy Flattening -- RESource: A Framework for Online Matching of Assembly with Open Source Code -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone -- Network and Adaptive Security -- Short-Term Linkable Group Signatures with Categorized Batch Verification -- GHUMVEE: Efficient, Effective, and Flexible Replication -- Extracting Attack Scenarios Using Intrusion Semantics -- On Securely Manipulating XML Data -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC -- Short Papers -- Towards Modelling Adaptive Attacker's Behaviour -- Scalable Deniable Group Key Establishment -- Information-Theoretic Foundations of Differential Privacy. 
520 |a This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security. 
650 0 |a Software engineering. 
650 0 |a Application software. 
650 0 |a Business information services. 
650 0 |a Information technology-Management. 
650 0 |a Electronic data processing-Management. 
650 0 |a Image processing-Digital techniques. 
650 0 |a Computer vision. 
650 1 4 |a Software Engineering. 
650 2 4 |a Computer and Information Systems Applications. 
650 2 4 |a IT in Business. 
650 2 4 |a Computer Application in Administrative Data Processing. 
650 2 4 |a IT Operations. 
650 2 4 |a Computer Imaging, Vision, Pattern Recognition and Graphics. 
700 1 |a Garcia-Alfaro, Joaquin.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Cuppens, Frederic.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Cuppens-Boulahia, Nora.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Miri, Ali.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Tawbi, Nadia.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642371202 
776 0 8 |i Printed edition:  |z 9783642371189 
830 0 |a Security and Cryptology ;  |v 7743 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-37119-6  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)