Cargando…

Identity and Privacy in the Internet Age 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings /

This book constitutes the refereed proceedings of the 14th International Conference on Secure IT Systems, NordSec 2009, held in Oslo, Norway, October 14-16, 2009. The 20 revised full papers and 8 short papers presented were carefully reviewed and selected from 52 submissions. Under the theme Identit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Jøsang, Audun (Editor ), Maseng, Torleiv (Editor ), Knapskog, Svein J. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Security and Cryptology ; 5838
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Session 1: Anonymity and Privacy
  • On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market
  • Facilitating the Adoption of Tor by Focusing on a Promising Target Group
  • A Parallelism-Based Approach to Network Anonymization
  • Security Usability of Petname Systems
  • Session 2: Modelling and Design
  • An Analysis of Widget Security
  • Trade-Offs in Cryptographic Implementations of Temporal Access Control
  • Blunting Differential Attacks on PIN Processing APIs
  • Session 3: Network Layer Security
  • Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic
  • An Improved Attack on TKIP
  • Session 4: Security for Mobile Users
  • ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
  • A Mechanism for Identity Delegation at Authentication Level
  • Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services
  • Towards True Random Number Generation in Mobile Environments
  • Session 5: Embedded Systems and Mechanisms
  • Towards Modelling Information Security with Key-Challenge Petri Nets
  • Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011
  • Advanced SIM Capabilities Supporting Trust-Based Applications
  • Towards Practical Enforcement Theories
  • Session 6: Protocols and Protocol Analysis
  • Security Analysis of AN.ON's Payment Scheme
  • Formal Analysis of the Estonian Mobile-ID Protocol
  • Generating In-Line Monitors for Rabin Automata.