Information security theory and practice : security, privacy and trust in computing systems and ambient intelligent ecosystems ; 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings / Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 7322. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2012.Description: 1 online resourceContent type: - text
- computer
- online resource
- 9783642309557
- 3642309550
- WISTP 2012
- Computer security -- Congresses
- Data protection -- Congresses
- Computer networks -- Security measures -- Congresses
- Sécurité informatique -- Congrès
- Protection de l'information (Informatique) -- Congrès
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Informatique
- Computer networks -- Security measures
- Computer security
- Data protection
- Computer science
- Computer Communication Networks
- Data protection
- Data structures (Computer science)
- Data encryption (Computer science)
- Information Systems
- Management of Computing and Information Systems
- Data Structures, Cryptology and Information Theory
- Systems and Data Security
- 005.8 23
- QA76.9.A25 W57 2012
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Recent Developments in Low-Level Software Security / Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef and Frank Piessens -- Towards a C2I Platform for Combating the Cyber-Threat / Paul Kearney -- Veracity, Plausibility, and Reputation / Dieter Gollmann -- Another Fallen Hash-Based RFID Authentication Protocol / Julio Cesar Hernandez-Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri and Majid Naderi -- HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network / G. Kirubavathi Venkatesh and R. Anitha Nadarajan -- How to Break EAP-MD5 / Fanbao Liu and Tao Xie -- Privacy Preserving Social Network Publication on Bipartite Graphs / Jian Zhou, Jiwu Jing, Ji Xiang and Lei Wang -- Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications / Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick and Michaela Kauer -- Privacy Preservation of User History Graph / Shinsaku Kiyomoto, Kazuhide Fukushima and Yutaka Miyake -- HiPoLDS: A Security Policy Language for Distributed Systems / Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Olivera and Yves Roudier -- ROAC: A Role-Oriented Access Control Model / Nezar Nassr and Eric Steegmans -- Optimal Parameters for Efficient Two-Party Computation Protocols / Chaya Ganesh and C. Pandu Rangan -- Assisting Server for Secure Multi-Party Computation / Jens-Matthias Bohli, Wenting Li and Jan Seedorf -- An Efficient Lattice-Based Secret Sharing Construction / Rachid El Bansarkhani and Mohammed Meziani -- On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems / Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley and Ali Maalaoui, et al. -- Impossible Differential Cryptanalysis of Reduced-Round LBlock / Ferhat Karakoç, Hüseyin Demirci and A. Emre Harmancı -- Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices / Johann Großschädl, Dan Page and Stefan Tillich -- Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android / Daniel Schreckling, Joachim Posegga, Johannes Köstler and Matthias Schaff.
Includes bibliographical references and author index.
This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security.
English.