000 06541cam a2200925 i 4500
001 on1076923087
003 OCoLC
005 20250707092204.0
006 m o d
007 cr cnu|||unuuu
008 181203s2018 sz a o 101 0 eng d
040 _aGW5XE
_beng
_erda
_epn
_cGW5XE
_dOCLCF
_dOCLCO
_dDKU
_dUAB
_dUKMGB
_dLEAUB
_dESU
_dCEF
_dOCLCQ
_dYDX
_dLEATE
_dEBLCP
_dUKAHL
_dOCLCQ
_dOCLCO
_dCOM
_dOCLCO
_dOCLCQ
_dOCLCO
015 _aGBB907490
_2bnb
015 _aGBB917453
_2bnb
016 7 _a019198542
_2Uk
019 _a1082334946
_a1086551772
_a1088954079
_a1105948577
_a1122815515
_a1125682399
_a1136253827
020 _a9783030036386
_q(electronic bk.)
020 _a3030036383
_q(electronic bk.)
020 _z9783030036379
_q(print)
020 _z3030036375
024 7 _a10.1007/978-3-030-03638-6
_2doi
029 1 _aAU@
_b000064513167
029 1 _aAU@
_b000065058213
029 1 _aUKMGB
_b019198542
035 _a(OCoLC)1076923087
_z(OCoLC)1082334946
_z(OCoLC)1086551772
_z(OCoLC)1088954079
_z(OCoLC)1105948577
_z(OCoLC)1122815515
_z(OCoLC)1125682399
_z(OCoLC)1136253827
037 _acom.springer.onix.9783030036386
_bSpringer Nature
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
049 _aMAIN
111 2 _aNordic Conference on Secure IT Systems
_n(23rd :
_d2018 :
_cOslo, Norway)
_966195
245 1 0 _aSecure IT systems :
_b23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings /
_cNils Gruschka (eds.).
246 3 _aNordSec 2018
264 1 _aCham :
_bSpringer,
_c2018.
300 _a1 online resource (xiii, 486 pages) :
_billustrations (some color)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
347 _bPDF
490 1 _aLecture notes in computer science ;
_v11252
490 1 _aLNCS sublibrary. SL 4, Security and cryptology
500 _aInternational conference proceedings.
500 _aIncludes author index.
588 0 _aOnline resource; title from PDF title page (SpringerLink, viewed December 3, 2018).
505 0 _aPrivacy -- Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid -- Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps -- MixMesh Zones -- Changing Pseudonyms Using Device-to-Device Communication in Mix-Zones -- AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications -- Cryptography -- Unifying Kleptographic Attacks -- Steady: A Simple End-to-End Secure Logging System -- Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation -- On Security Analysis of Generic Dynamic Authenticated Group Key Exchange -- A Blockchain-Assisted Hash-Based Signature Scheme -- The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants -- Verifiable Light-Weight Monitoring for Certificate Transparency Logs -- Network and Cloud Security -- CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs -- ^Detection of covert channels in TCP retransmissions -- What you can change and what you can't: human experience in computer network defenses -- Attack simulation for a realistic evaluation and comparison of network security techniques -- Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots using Virtual Machine Introspection -- Authorization Policies Specification and Consistency Management within Multi-Cloud Environments -- Cyber Security and Malware -- Cyber Hygiene: The Big Picture -- Estimating the Risk of Fraud against E-services -- PESTEL Analysis of Hacktivism Campaign Motivations -- Data Modelling for Predicting Exploits -- UpDroid : Updated Android Malware and Its Familial Classification -- Evaluation of Cyber Security Management of Critical Infrastructures: A Literature Review Guided by the NIST Cybersecurity Framework -- Next Generation Ransomware -- Security for Software and Software Development -- ^Hardware-Assisted Program Execution Integrity: HAPEI -- Protecting Instruction Set Randomization from Code Reuse Attacks -- A Uniform Information-Flow-Security Benchmark Suite for Source Code and Bytecode -- When Harry met Tinder: Security analysis of dating apps on Android -- Threat Poker: Solving Security and Privacy Threats in Agile Software Development.
520 _aThis book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018. The 29 full papers presented in this volume were carefully reviewed and selected from 81 submissions. They are organized in topical sections named: privacy; cryptography; network and cloud security; cyber security and malware; and security for software and software development.
650 0 _aComputer security
_vCongresses.
_914968
650 6 _aSécurité informatique
_vCongrès.
_917411
650 7 _aCoding theory & cryptology.
_2bicssc
_953461
650 7 _aLegal aspects of IT.
_2bicssc
_954905
650 7 _aEthical & social aspects of IT.
_2bicssc
_953388
650 7 _aInformation retrieval.
_2bicssc
650 7 _aNetwork hardware.
_2bicssc
_953462
650 7 _aComputer security.
_2bicssc
_92191
650 7 _aComputers
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aLaw
_xScience & Technology.
_2bisacsh
_954906
650 7 _aComputers
_xSocial Aspects
_xGeneral.
_2bisacsh
_917914
650 7 _aComputers
_xInformation Technology.
_2bisacsh
_914211
650 7 _aComputers
_xHardware
_xNetwork Hardware.
_2bisacsh
_953464
650 7 _aComputer security
_2fast
_92191
655 2 _aCongress
_911670
655 7 _aproceedings (reports)
_2aat
655 7 _aConference papers and proceedings
_2fast
_96065
655 7 _aConference papers and proceedings.
_2lcgft
_96065
655 7 _aActes de congrès.
_2rvmgf
_9609890
700 1 _aGruschka, Nils,
_eeditor.
_966198
776 0 8 _iPrinted edition:
_z9783030036379
776 0 8 _iPrinted edition:
_z9783030036393
830 0 _aLecture notes in computer science ;
_v11252.
830 0 _aLNCS sublibrary.
_nSL 4,
_pSecurity and cryptology.
_920708
856 4 0 _uhttps://link.springer.com/10.1007/978-3-030-03638-6
938 _aAskews and Holts Library Services
_bASKH
_nAH35790402
938 _aProQuest Ebook Central
_bEBLB
_nEBL6295743
938 _aYBP Library Services
_bYANK
_n16315201
994 _a92
_bATIST
999 _c646242
_d646242