| 000 | 06541cam a2200925 i 4500 | ||
|---|---|---|---|
| 001 | on1076923087 | ||
| 003 | OCoLC | ||
| 005 | 20250707092204.0 | ||
| 006 | m o d | ||
| 007 | cr cnu|||unuuu | ||
| 008 | 181203s2018 sz a o 101 0 eng d | ||
| 040 |
_aGW5XE _beng _erda _epn _cGW5XE _dOCLCF _dOCLCO _dDKU _dUAB _dUKMGB _dLEAUB _dESU _dCEF _dOCLCQ _dYDX _dLEATE _dEBLCP _dUKAHL _dOCLCQ _dOCLCO _dCOM _dOCLCO _dOCLCQ _dOCLCO |
||
| 015 |
_aGBB907490 _2bnb |
||
| 015 |
_aGBB917453 _2bnb |
||
| 016 | 7 |
_a019198542 _2Uk |
|
| 019 |
_a1082334946 _a1086551772 _a1088954079 _a1105948577 _a1122815515 _a1125682399 _a1136253827 |
||
| 020 |
_a9783030036386 _q(electronic bk.) |
||
| 020 |
_a3030036383 _q(electronic bk.) |
||
| 020 |
_z9783030036379 _q(print) |
||
| 020 | _z3030036375 | ||
| 024 | 7 |
_a10.1007/978-3-030-03638-6 _2doi |
|
| 029 | 1 |
_aAU@ _b000064513167 |
|
| 029 | 1 |
_aAU@ _b000065058213 |
|
| 029 | 1 |
_aUKMGB _b019198542 |
|
| 035 |
_a(OCoLC)1076923087 _z(OCoLC)1082334946 _z(OCoLC)1086551772 _z(OCoLC)1088954079 _z(OCoLC)1105948577 _z(OCoLC)1122815515 _z(OCoLC)1125682399 _z(OCoLC)1136253827 |
||
| 037 |
_acom.springer.onix.9783030036386 _bSpringer Nature |
||
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aUR _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 072 | 7 |
_aUR _2thema |
|
| 072 | 7 |
_aUTN _2thema |
|
| 082 | 0 | 4 |
_a005.8 _223 |
| 049 | _aMAIN | ||
| 111 | 2 |
_aNordic Conference on Secure IT Systems _n(23rd : _d2018 : _cOslo, Norway) _966195 |
|
| 245 | 1 | 0 |
_aSecure IT systems : _b23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings / _cNils Gruschka (eds.). |
| 246 | 3 | _aNordSec 2018 | |
| 264 | 1 |
_aCham : _bSpringer, _c2018. |
|
| 300 |
_a1 online resource (xiii, 486 pages) : _billustrations (some color) |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 | _atext file | ||
| 347 | _bPDF | ||
| 490 | 1 |
_aLecture notes in computer science ; _v11252 |
|
| 490 | 1 | _aLNCS sublibrary. SL 4, Security and cryptology | |
| 500 | _aInternational conference proceedings. | ||
| 500 | _aIncludes author index. | ||
| 588 | 0 | _aOnline resource; title from PDF title page (SpringerLink, viewed December 3, 2018). | |
| 505 | 0 | _aPrivacy -- Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid -- Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps -- MixMesh Zones -- Changing Pseudonyms Using Device-to-Device Communication in Mix-Zones -- AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications -- Cryptography -- Unifying Kleptographic Attacks -- Steady: A Simple End-to-End Secure Logging System -- Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation -- On Security Analysis of Generic Dynamic Authenticated Group Key Exchange -- A Blockchain-Assisted Hash-Based Signature Scheme -- The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants -- Verifiable Light-Weight Monitoring for Certificate Transparency Logs -- Network and Cloud Security -- CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs -- ^Detection of covert channels in TCP retransmissions -- What you can change and what you can't: human experience in computer network defenses -- Attack simulation for a realistic evaluation and comparison of network security techniques -- Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots using Virtual Machine Introspection -- Authorization Policies Specification and Consistency Management within Multi-Cloud Environments -- Cyber Security and Malware -- Cyber Hygiene: The Big Picture -- Estimating the Risk of Fraud against E-services -- PESTEL Analysis of Hacktivism Campaign Motivations -- Data Modelling for Predicting Exploits -- UpDroid : Updated Android Malware and Its Familial Classification -- Evaluation of Cyber Security Management of Critical Infrastructures: A Literature Review Guided by the NIST Cybersecurity Framework -- Next Generation Ransomware -- Security for Software and Software Development -- ^Hardware-Assisted Program Execution Integrity: HAPEI -- Protecting Instruction Set Randomization from Code Reuse Attacks -- A Uniform Information-Flow-Security Benchmark Suite for Source Code and Bytecode -- When Harry met Tinder: Security analysis of dating apps on Android -- Threat Poker: Solving Security and Privacy Threats in Agile Software Development. | |
| 520 | _aThis book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018. The 29 full papers presented in this volume were carefully reviewed and selected from 81 submissions. They are organized in topical sections named: privacy; cryptography; network and cloud security; cyber security and malware; and security for software and software development. | ||
| 650 | 0 |
_aComputer security _vCongresses. _914968 |
|
| 650 | 6 |
_aSécurité informatique _vCongrès. _917411 |
|
| 650 | 7 |
_aCoding theory & cryptology. _2bicssc _953461 |
|
| 650 | 7 |
_aLegal aspects of IT. _2bicssc _954905 |
|
| 650 | 7 |
_aEthical & social aspects of IT. _2bicssc _953388 |
|
| 650 | 7 |
_aInformation retrieval. _2bicssc |
|
| 650 | 7 |
_aNetwork hardware. _2bicssc _953462 |
|
| 650 | 7 |
_aComputer security. _2bicssc _92191 |
|
| 650 | 7 |
_aComputers _xSecurity _xGeneral. _2bisacsh |
|
| 650 | 7 |
_aLaw _xScience & Technology. _2bisacsh _954906 |
|
| 650 | 7 |
_aComputers _xSocial Aspects _xGeneral. _2bisacsh _917914 |
|
| 650 | 7 |
_aComputers _xInformation Technology. _2bisacsh _914211 |
|
| 650 | 7 |
_aComputers _xHardware _xNetwork Hardware. _2bisacsh _953464 |
|
| 650 | 7 |
_aComputer security _2fast _92191 |
|
| 655 | 2 |
_aCongress _911670 |
|
| 655 | 7 |
_aproceedings (reports) _2aat |
|
| 655 | 7 |
_aConference papers and proceedings _2fast _96065 |
|
| 655 | 7 |
_aConference papers and proceedings. _2lcgft _96065 |
|
| 655 | 7 |
_aActes de congrès. _2rvmgf _9609890 |
|
| 700 | 1 |
_aGruschka, Nils, _eeditor. _966198 |
|
| 776 | 0 | 8 |
_iPrinted edition: _z9783030036379 |
| 776 | 0 | 8 |
_iPrinted edition: _z9783030036393 |
| 830 | 0 |
_aLecture notes in computer science ; _v11252. |
|
| 830 | 0 |
_aLNCS sublibrary. _nSL 4, _pSecurity and cryptology. _920708 |
|
| 856 | 4 | 0 | _uhttps://link.springer.com/10.1007/978-3-030-03638-6 |
| 938 |
_aAskews and Holts Library Services _bASKH _nAH35790402 |
||
| 938 |
_aProQuest Ebook Central _bEBLB _nEBL6295743 |
||
| 938 |
_aYBP Library Services _bYANK _n16315201 |
||
| 994 |
_a92 _bATIST |
||
| 999 |
_c646242 _d646242 |
||