Amazon cover image
Image from Amazon.com

Information security theory and practice : security, privacy and trust in computing systems and ambient intelligent ecosystems ; 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings / Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 7322. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2012.Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642309557
  • 3642309550
Other title:
  • WISTP 2012
Subject(s): Genre/Form: Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 W57 2012
Online resources:
Contents:
Recent Developments in Low-Level Software Security / Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef and Frank Piessens -- Towards a C2I Platform for Combating the Cyber-Threat / Paul Kearney -- Veracity, Plausibility, and Reputation / Dieter Gollmann -- Another Fallen Hash-Based RFID Authentication Protocol / Julio Cesar Hernandez-Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri and Majid Naderi -- HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network / G. Kirubavathi Venkatesh and R. Anitha Nadarajan -- How to Break EAP-MD5 / Fanbao Liu and Tao Xie -- Privacy Preserving Social Network Publication on Bipartite Graphs / Jian Zhou, Jiwu Jing, Ji Xiang and Lei Wang -- Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications / Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick and Michaela Kauer -- Privacy Preservation of User History Graph / Shinsaku Kiyomoto, Kazuhide Fukushima and Yutaka Miyake -- HiPoLDS: A Security Policy Language for Distributed Systems / Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Olivera and Yves Roudier -- ROAC: A Role-Oriented Access Control Model / Nezar Nassr and Eric Steegmans -- Optimal Parameters for Efficient Two-Party Computation Protocols / Chaya Ganesh and C. Pandu Rangan -- Assisting Server for Secure Multi-Party Computation / Jens-Matthias Bohli, Wenting Li and Jan Seedorf -- An Efficient Lattice-Based Secret Sharing Construction / Rachid El Bansarkhani and Mohammed Meziani -- On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems / Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley and Ali Maalaoui, et al. -- Impossible Differential Cryptanalysis of Reduced-Round LBlock / Ferhat Karakoç, Hüseyin Demirci and A. Emre Harmancı -- Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices / Johann Großschädl, Dan Page and Stefan Tillich -- Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android / Daniel Schreckling, Joachim Posegga, Johannes Köstler and Matthias Schaff.
Summary: This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Recent Developments in Low-Level Software Security / Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef and Frank Piessens -- Towards a C2I Platform for Combating the Cyber-Threat / Paul Kearney -- Veracity, Plausibility, and Reputation / Dieter Gollmann -- Another Fallen Hash-Based RFID Authentication Protocol / Julio Cesar Hernandez-Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri and Majid Naderi -- HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network / G. Kirubavathi Venkatesh and R. Anitha Nadarajan -- How to Break EAP-MD5 / Fanbao Liu and Tao Xie -- Privacy Preserving Social Network Publication on Bipartite Graphs / Jian Zhou, Jiwu Jing, Ji Xiang and Lei Wang -- Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications / Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick and Michaela Kauer -- Privacy Preservation of User History Graph / Shinsaku Kiyomoto, Kazuhide Fukushima and Yutaka Miyake -- HiPoLDS: A Security Policy Language for Distributed Systems / Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Olivera and Yves Roudier -- ROAC: A Role-Oriented Access Control Model / Nezar Nassr and Eric Steegmans -- Optimal Parameters for Efficient Two-Party Computation Protocols / Chaya Ganesh and C. Pandu Rangan -- Assisting Server for Secure Multi-Party Computation / Jens-Matthias Bohli, Wenting Li and Jan Seedorf -- An Efficient Lattice-Based Secret Sharing Construction / Rachid El Bansarkhani and Mohammed Meziani -- On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems / Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley and Ali Maalaoui, et al. -- Impossible Differential Cryptanalysis of Reduced-Round LBlock / Ferhat Karakoç, Hüseyin Demirci and A. Emre Harmancı -- Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices / Johann Großschädl, Dan Page and Stefan Tillich -- Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android / Daniel Schreckling, Joachim Posegga, Johannes Köstler and Matthias Schaff.

Includes bibliographical references and author index.

This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security.

English.

Powered by Koha