Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings /
This book constitutes the refereed proceedings of the 14th International Conference on Secure IT Systems, NordSec 2009, held in Oslo, Norway, October 14-16, 2009. The 20 revised full papers and 8 short papers presented were carefully reviewed and selected from 52 submissions. Under the theme Identit...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Edición: | 1st ed. 2009. |
Colección: | Security and Cryptology ;
5838 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Session 1: Anonymity and Privacy
- On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market
- Facilitating the Adoption of Tor by Focusing on a Promising Target Group
- A Parallelism-Based Approach to Network Anonymization
- Security Usability of Petname Systems
- Session 2: Modelling and Design
- An Analysis of Widget Security
- Trade-Offs in Cryptographic Implementations of Temporal Access Control
- Blunting Differential Attacks on PIN Processing APIs
- Session 3: Network Layer Security
- Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic
- An Improved Attack on TKIP
- Session 4: Security for Mobile Users
- ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
- A Mechanism for Identity Delegation at Authentication Level
- Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services
- Towards True Random Number Generation in Mobile Environments
- Session 5: Embedded Systems and Mechanisms
- Towards Modelling Information Security with Key-Challenge Petri Nets
- Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011
- Advanced SIM Capabilities Supporting Trust-Based Applications
- Towards Practical Enforcement Theories
- Session 6: Protocols and Protocol Analysis
- Security Analysis of AN.ON's Payment Scheme
- Formal Analysis of the Estonian Mobile-ID Protocol
- Generating In-Line Monitors for Rabin Automata.