Network and System Security (inbunden)
Format
Häftad (Paperback / softback)
Språk
Engelska
Antal sidor
793
Utgivningsdatum
2013-05-17
Upplaga
2013 ed.
Förlag
Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Medarbetare
Huang, Xinyi (ed.), Lopez, Javier (ed.), Sandhu, Ravi (ed.)
Illustrationer
207 Illustrations, black and white; XX, 793 p. 207 illus.
Dimensioner
234 x 156 x 41 mm
Vikt
1121 g
Antal komponenter
1
Komponenter
1 Paperback / softback
ISBN
9783642386305

Network and System Security

7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings

Häftad,  Engelska, 2013-05-17
557
  • Skickas från oss inom 10-15 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
Finns även som
Visa alla 1 format & utgåvor
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).
Visa hela texten

Passar bra ihop

  1. Network and System Security
  2. +
  3. The Trading Game

De som köpt den här boken har ofta också köpt The Trading Game av Gary Stevenson (häftad).

Köp båda 2 för 696 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av författarna

Innehållsförteckning

Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study.- A Technology Independent Security Gateway for Real-Time Multimedia Communication.- Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network.- Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.- Model the Influence of Sybil Nodes in P2P Botnets.- Network Security: Security Protocols and Practice A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture.- The OffPAD: Requirements and Usage.- Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks.- Using Trusted Platform Modules for Location Assurance in Cloud Networking.- Network Security: Network Attacks and Defense Tracing Sources of Anonymous Slow Suspicious Activities.- Static Analysis for Regular Expression Denial-of-Service Attacks.- Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding.- Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning.- System Security: Malware and Intrusions MADS: Malicious Android Applications Detection through String Analysis.- X-TIER: Kernel Module Injection.- Leveraging String Kernels for Malware Detection.- Insiders Trapped in the Mirror Reveal Themselves in Social Media.- System Security: Applications Security On Business Logic Vulnerabilities Hunting: The APP LogGIC Framework.- Using the Smart Card Web Server in Secure Branchless Banking.- Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach.- Efficient and Private Three-Party Publish/Subscribe.- System Security: Security Algorithms and Systems Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks.- Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform.- Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines.- JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms.- Forward Secure Certificateless Proxy Signature Scheme.- Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP.- On the Security of an Efficient Attribute-Based Signature.- Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method.- Performance Prediction Model for Block Ciphers on GPU Architectures.- Threshold-Oriented Optimistic Fair Exchange.- Secure Storage and Fuzzy Query over Encrypted Databases.- A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.- Privacy Preserving Context Aware Publish Subscribe Systems.- A New Unpredictability-Based RFID Privacy Model.- Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption.- Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.- Key Agreement and Distribution Light Weight Network Coding Based Key Distribution Scheme for MANETs.- Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network.- Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards.- An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks.- Human Identification with Electroencephalogram (EEG) for the Future Network Security.- Building Better Unsupervised Anomaly Detector with S-Transform.- Fault-Tolerant Topology Control Based on Artificial Immune in WMNs.- Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens.- On the Use of Key Assignment Schemes in Authentication Protocols.- On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems.- Security Authentication of AODV Protocols in MANETs.- Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach.- Towards a Privacy-Preserving Solution for OSNs.- Measuring and Comparing the Protection Quality in Different Operating Systems.- Collusion-Resistant Domain-Specific Pseudonymous Signatures.- On the Applicability of Time-Driven Cache Att