TY - BOOK AU - Askoxylakis,Ioannis AU - Pöhls,Henrich C. AU - Posegga,Joachim ED - WISTP 2012 TI - Information security theory and practice: security, privacy and trust in computing systems and ambient intelligent ecosystems ; 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings T2 - Lecture notes in computer science, SN - 9783642309557 AV - QA76.9.A25 W57 2012 U1 - 005.8 23 PY - 2012/// CY - Berlin, New York PB - Springer KW - Computer security KW - Congresses KW - Data protection KW - Computer networks KW - Security measures KW - Sécurité informatique KW - Congrès KW - Protection de l'information (Informatique) KW - Réseaux d'ordinateurs KW - Sécurité KW - Mesures KW - Informatique KW - eclas KW - fast KW - Computer science KW - Computer Communication Networks KW - Data structures (Computer science) KW - Data encryption (Computer science) KW - Information Systems KW - Management of Computing and Information Systems KW - Data Structures, Cryptology and Information Theory KW - Systems and Data Security KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - Includes bibliographical references and author index; Recent Developments in Low-Level Software Security; Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef and Frank Piessens --; Towards a C2I Platform for Combating the Cyber-Threat; Paul Kearney --; Veracity, Plausibility, and Reputation; Dieter Gollmann --; Another Fallen Hash-Based RFID Authentication Protocol; Julio Cesar Hernandez-Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri and Majid Naderi --; HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network; G. Kirubavathi Venkatesh and R. Anitha Nadarajan --; How to Break EAP-MD5; Fanbao Liu and Tao Xie --; Privacy Preserving Social Network Publication on Bipartite Graphs; Jian Zhou, Jiwu Jing, Ji Xiang and Lei Wang --; Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications; Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick and Michaela Kauer --; Privacy Preservation of User History Graph; Shinsaku Kiyomoto, Kazuhide Fukushima and Yutaka Miyake --; HiPoLDS: A Security Policy Language for Distributed Systems; Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Olivera and Yves Roudier --; ROAC: A Role-Oriented Access Control Model; Nezar Nassr and Eric Steegmans --; Optimal Parameters for Efficient Two-Party Computation Protocols; Chaya Ganesh and C. Pandu Rangan --; Assisting Server for Secure Multi-Party Computation; Jens-Matthias Bohli, Wenting Li and Jan Seedorf --; An Efficient Lattice-Based Secret Sharing Construction; Rachid El Bansarkhani and Mohammed Meziani --; On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems; Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley and Ali Maalaoui, et al. --; Impossible Differential Cryptanalysis of Reduced-Round LBlock; Ferhat Karakoç, Hüseyin Demirci and A. Emre Harmancı --; Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices; Johann Großschädl, Dan Page and Stefan Tillich --; Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android; Daniel Schreckling, Joachim Posegga, Johannes Köstler and Matthias Schaff N2 - This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security UR - https://link.springer.com/10.1007/978-3-642-30955-7 ER -