top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings / Jan Camenisch [and others] (Eds.).
Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings / Jan Camenisch [and others] (Eds.).
Creatore [IFIP TC11 International Conference on Information Security (26th : 2011 : Lucerne, Switzerland)]
Estensione 1 online resource (xiii, 328 pages).
Accesso persona Camenisch, Jan.
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783642214240
364221424X
3642214231
9783642214233
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UCHICAGO-11075798
[IFIP TC11 International Conference on Information Security (26th : 2011 : Lucerne, Switzerland)]  
Materiale a stampa
Lo trovi qui: University of Chicago
Information security and privacy research : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings / Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.).
Information security and privacy research : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings / Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.).
Creatore [IFIP TC11 International Conference on Information Security (27th : 2012 : Ērakleion, Greece)]
Estensione 1 online resource.
Disciplina 005.8
Accesso persona Gritzalis, Dimitris
Furnell, Steven, 1970-
Theoharidou, Marianthi
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Data Encryption
Computers and Society
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
ISBN 9783642304361
3642304362
3642304354
9783642304354
Classificazione 54.62
54.32
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Relay Attacks on Secure Element-Enabled Mobile Devices / Virtual Pickpocketing Revisited / Michael Roland, Josef Langer and Josef Scharinger -- Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) / Alessandro Armando, Alessio Merlo, Mauro Migliardi and Luca Verderame -- An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling / Bernhard J. Berger and Karsten Sohr -- Embedded Eavesdropping on Java Card / Guillaume Barbu, Christophe Giraud and Vincent Guerin -- Authenticated Key Exchange (AKE) in Delay Tolerant Networks / Sofia Anna Menesidou and Vasilios Katos -- OFELIA -- A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management / Alexandre B. Augusto and Manuel Eduardo Correia -- Smart OpenID: A Smart Card Based OpenID Protocol / Andreas Leicher, Andreas U. Schmidt and Yogendra Shah -- Peer to Peer Botnet Detection Based on Flow Intervals / David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed and Sherif Saad, et al. -- Towards a Universal Data Provenance Framework Using Dynamic Instrumentation / Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis and Sotiris Ioannidis -- Improving Flask Implementation Using Hardware Assisted In-VM Isolation / Baozeng Ding, Fufeng Yao, Yanjun Wu and Yeping He.
HyperForce: Hypervisor-enForced Execution of Security-Critical Code / Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg and Wouter Joosen -- RandHyp: Preventing Attacks via Xen Hypercall Interface / Feifei Wang, Ping Chen, Bing Mao and Li Xie -- Role Mining under Role-Usage Cardinality Constraint / John C. John, Shamik Sural, Vijayalakshmi Atluri and Jaideep S. Vaidya -- HIDE_DHCP: Covert Communications through Network Configuration Messages / Ruben Rios, Jose A. Onieva and Javier Lopez -- Handling Stateful Firewall Anomalies / Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Tarik Moataz and Xavier Rimasson -- A Framework for Threat Assessment in Access Control Systems / Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi and Luigi Logrippo -- Support for Write Privileges on Outsourced Data / Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati -- Malicious Users' Transactions: Tackling Insider Threat / Weihan Li, Brajendra Panda and Qussai Yaseen -- Privacy-Preserving Television Audience Measurement Using Smart TVs / George Drosatos, Aimilia Tasidou and Pavlos S. Efraimidis -- Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility / Christian Banse, Dominik Herrmann and Hannes Federrath.
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition / Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou and Dimitris Gritzalis -- Modeling Social Engineering Botnet Dynamics across Multiple Social Networks / Shuhao Li, Xiaochun Yun, Zhiyu Hao, Yongzheng Zhang and Xiang Cui, et al. -- Layered Analysis of Security Ceremonies / Giampaolo Bella and Lizzie Coles-Kemp -- A Small Depth-16 Circuit for the AES S-Box / Joan Boyar and René Peralta -- Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol / Maria Christofi and Aline Gouget -- My Authentication Album: Adaptive Images-Based Login Mechanism / Amir Herzberg and Ronen Margulies -- Balancing Security and Usability of Local Security Mechanisms for Mobile Devices / Shuzhe Yang and Gökhan Bal -- Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation / Ella Kolkowska and Bart De Decker -- When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems / Gurpreet Dhillon, Tiago Oliveira, Santa Susarapu and Mário Caldeira -- Security-by-Contract for the OSGi Platform / Olga Gadyatskaya, Fabio Massacci and Anton Philippov -- Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis / Hyundo Park, Sung-Oh David Jung, Heejo Lee and Hoh Peter In.
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds / Yulong Zhang, Min Li, Kun Bai, Meng Yu and Wanyu Zang -- Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework / Han Jiao, Jixue Liu, Jiuyong Li and Chengfei Liu -- A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation / Giuseppe D'Acquisto, Marta Flamini and Maurizio Naldi -- Optimizing Network Patching Policy Decisions / Yolanta Beres and Jonathan Griffin -- A Risk Assessment Method for Smartphones / Marianthi Theoharidou, Alexios Mylonas and Dimitris Gritzalis -- Empirical Benefits of Training to Phishing Susceptibility / Ronald Dodge, Kathryn Coronges and Ericka Rovira -- Multi-modal Behavioural Biometric Authentication for Mobile Devices / Hataichanok Saevanee, Nathan L. Clarke and Steven M. Furnell -- Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks / Christoforos Ntantogian, Christos Xenakis and Ioannis Stavrakakis -- Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks / Yongge Wang -- Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains / Shaoying Cai, Yingjiu Li and Yunlei Zhao -- Enhanced Dictionary Based Rainbow Table / Vrizlynn L.L. Thing and Hwei-Ming Ying.
Authorization Policies for Materialized Views / Sarah Nait-Bahloul, Emmanuel Coquery and Mohand-Saïd Hacid -- Enhancing the Security of On-line Transactions with CAPTCHA Keyboard / Yongdong Wu and Zhigang Zhao -- Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach / Xin Kang and Yongdong Wu -- A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network / Ioannis Psaroudakis, Vasilios Katos and Pavlos S. Efraimidis -- A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages / Marco Prandini and Marco Ramilli -- Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System / Milica Milutinovic, Vincent Naessens and Bart De Decker -- Web Services Security Assessment: An Authentication-Focused Approach / Yannis Soupionis and Miltiadis Kandias -- Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case / Nineta Polemi and Theodoros Ntouskas -- A Response Strategy Model for Intrusion Response Systems / Nor Badrul Anuar, Maria Papadaki, Steven Furnell and Nathan Clarke -- Intrusion Tolerance of Stealth DoS Attacks to Web Services / Massimo Ficco and Massimiliano Rak -- Towards Use-Based Usage Control / Christos Grompanopoulos and Ioannis Mavridis.
Record Nr. NYU-004623178
[IFIP TC11 International Conference on Information Security (27th : 2012 : Ērakleion, Greece)]  
Materiale a stampa
Lo trovi qui: New York University
Computer security : proceedings of the IFIP TC11 Ninth International Conference on Information Security, Toronto, Canada, 12-14 May, 1993 / edited by E. Graham Dougall
Computer security : proceedings of the IFIP TC11 Ninth International Conference on Information Security, Toronto, Canada, 12-14 May, 1993 / edited by E. Graham Dougall
Creatore [IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.)]
Estensione ix, 417 p. : ill. ; 23 cm.
Disciplina 005.8
Accesso persona Dougall, E. Graham
ISBN 0444817484 (acid-free paper)
9780444817488 (acid-free paper)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. STANFORD-a2810554
[IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.)]  
Materiale a stampa
Lo trovi qui: Stanford University
Security and privacy in the age of uncertainty : IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece / edited by Dimitris Gritzalis ... [et al.].
Security and privacy in the age of uncertainty : IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece / edited by Dimitris Gritzalis ... [et al.].
Creatore [IFIP TC11 International Conference on Information Security (18th : 2003 : Athens, Greece)]
Estensione xviii, 494 p. : ill. ; 25 cm.
Disciplina 005.8
Accesso persona Gritzalis, Dimitris
ISBN 1402074492
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UMICH-004368989
[IFIP TC11 International Conference on Information Security (18th : 2003 : Athens, Greece)]  
Materiale a stampa
Lo trovi qui: University of Michigan Ann Arbor
Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings / Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi (eds.).
Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings / Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi (eds.).
Creatore [IFIP TC11 International Conference on Information Security (28th : 2013 : Auckland, N.Z.)]
Estensione 1 online resource (xiii, 436 pages) : illustrations.
Disciplina 005.8
Accesso persona Janczewski, Lech, 1943- editor
Wolfe, Henry B., editor
Shenoi, Sujeet, editor
Soggetto non controllato Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Computers and Society
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
ISBN 9783642392184
3642392180
9783642392177
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware, authentication and authorization -- Network security/cryptography -- Software security, policy compliance and obligations -- Privacy protection -- Risk analysis and security metrics -- Social engineering -- Security management/forensics.
Record Nr. STANFORD-a10215691
[IFIP TC11 International Conference on Information Security (28th : 2013 : Auckland, N.Z.)]  
Materiale a stampa
Lo trovi qui: Stanford University
Security and privacy in the age of uncertainty : IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece / edited by Dimitris Gritzalis [and others]
Security and privacy in the age of uncertainty : IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece / edited by Dimitris Gritzalis [and others]
Creatore [IFIP TC11 International Conference on Information Security (18th : 2003 : Athens, Greece)]
Estensione 1 online resource (xviii, 494 pages) : illustrations
Disciplina 005.8
Accesso persona Gritzalis, Dimitris
ISBN 9780387356914
0387356916
1402074492
9781402074493
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure networks and distributed systems -- Content protection -- Secure multicast communication and secure mobile networks -- Security management -- Intrusion prevention and detection -- Access control policies and models -- Secure information systems -- Security protocols -- Workshop on information security management -- Workshop on privacy and anonymity in network and distributed systems -- Workshop on small systems security -- Workshop on security and control of IT in society.
Record Nr. STANFORD-a13366284
[IFIP TC11 International Conference on Information Security (18th : 2003 : Athens, Greece)]  
Materiale a stampa
Lo trovi qui: Stanford University
Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings / Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi (eds.).
Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings / Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi (eds.).
Creatore [IFIP TC11 International Conference on Information Security (28th : 2013 : Auckland, N.Z.)]
Estensione 1 online resource (xiii, 436 pages) : illustrations.
Disciplina 005.8
Accesso persona Janczewski, Lech, 1943-editor
Wolfe, Henry B., editor.
Shenoi, Sujeet, editor
Genere/Forma Congresses
Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Computers and Society
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
ISBN 9783642392184
3642392180
9783642392177
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware, authentication and authorization -- Network security/cryptography -- Software security, policy compliance and obligations -- Privacy protection -- Risk analysis and security metrics -- Social engineering -- Security management/forensics.
Record Nr. NYU-004423413
[IFIP TC11 International Conference on Information Security (28th : 2013 : Auckland, N.Z.)]  
Materiale a stampa
Lo trovi qui: New York University
Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings / Jan Camenisch [and others] (Eds.).
Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings / Jan Camenisch [and others] (Eds.).
Creatore [IFIP TC11 International Conference on Information Security (26th : 2011 : Lucerne, Switzerland)]
Estensione 1 online resource (xiii, 328 pages).
Disciplina 005.8
Accesso persona Camenisch, Jan.
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783642214240
364221424X
3642214231
9783642214233
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004369910
[IFIP TC11 International Conference on Information Security (26th : 2011 : Lucerne, Switzerland)]  
Materiale a stampa
Lo trovi qui: New York University
Information security and privacy research : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings / Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.).
Information security and privacy research : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings / Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.).
Creatore [IFIP TC11 International Conference on Information Security (27th : 2012 : Ērakleion, Greece)]
Estensione 1 online resource.
Accesso persona Gritzalis, Dimitris
Furnell, Steven, 1970-
Theoharidou, Marianthi
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Data Encryption
Computers and Society
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
ISBN 9783642304361
3642304362
3642304354
9783642304354
Classificazione 54.62
54.32
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Relay Attacks on Secure Element-Enabled Mobile Devices / Virtual Pickpocketing Revisited / Michael Roland, Josef Langer and Josef Scharinger -- Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) / Alessandro Armando, Alessio Merlo, Mauro Migliardi and Luca Verderame -- An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling / Bernhard J. Berger and Karsten Sohr -- Embedded Eavesdropping on Java Card / Guillaume Barbu, Christophe Giraud and Vincent Guerin -- Authenticated Key Exchange (AKE) in Delay Tolerant Networks / Sofia Anna Menesidou and Vasilios Katos -- OFELIA -- A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management / Alexandre B. Augusto and Manuel Eduardo Correia -- Smart OpenID: A Smart Card Based OpenID Protocol / Andreas Leicher, Andreas U. Schmidt and Yogendra Shah -- Peer to Peer Botnet Detection Based on Flow Intervals / David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed and Sherif Saad, et al. -- Towards a Universal Data Provenance Framework Using Dynamic Instrumentation / Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis and Sotiris Ioannidis -- Improving Flask Implementation Using Hardware Assisted In-VM Isolation / Baozeng Ding, Fufeng Yao, Yanjun Wu and Yeping He.
HyperForce: Hypervisor-enForced Execution of Security-Critical Code / Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg and Wouter Joosen -- RandHyp: Preventing Attacks via Xen Hypercall Interface / Feifei Wang, Ping Chen, Bing Mao and Li Xie -- Role Mining under Role-Usage Cardinality Constraint / John C. John, Shamik Sural, Vijayalakshmi Atluri and Jaideep S. Vaidya -- HIDE_DHCP: Covert Communications through Network Configuration Messages / Ruben Rios, Jose A. Onieva and Javier Lopez -- Handling Stateful Firewall Anomalies / Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Tarik Moataz and Xavier Rimasson -- A Framework for Threat Assessment in Access Control Systems / Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi and Luigi Logrippo -- Support for Write Privileges on Outsourced Data / Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati -- Malicious Users' Transactions: Tackling Insider Threat / Weihan Li, Brajendra Panda and Qussai Yaseen -- Privacy-Preserving Television Audience Measurement Using Smart TVs / George Drosatos, Aimilia Tasidou and Pavlos S. Efraimidis -- Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility / Christian Banse, Dominik Herrmann and Hannes Federrath.
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition / Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou and Dimitris Gritzalis -- Modeling Social Engineering Botnet Dynamics across Multiple Social Networks / Shuhao Li, Xiaochun Yun, Zhiyu Hao, Yongzheng Zhang and Xiang Cui, et al. -- Layered Analysis of Security Ceremonies / Giampaolo Bella and Lizzie Coles-Kemp -- A Small Depth-16 Circuit for the AES S-Box / Joan Boyar and René Peralta -- Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol / Maria Christofi and Aline Gouget -- My Authentication Album: Adaptive Images-Based Login Mechanism / Amir Herzberg and Ronen Margulies -- Balancing Security and Usability of Local Security Mechanisms for Mobile Devices / Shuzhe Yang and Gökhan Bal -- Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation / Ella Kolkowska and Bart De Decker -- When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems / Gurpreet Dhillon, Tiago Oliveira, Santa Susarapu and Mário Caldeira -- Security-by-Contract for the OSGi Platform / Olga Gadyatskaya, Fabio Massacci and Anton Philippov -- Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis / Hyundo Park, Sung-Oh David Jung, Heejo Lee and Hoh Peter In.
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds / Yulong Zhang, Min Li, Kun Bai, Meng Yu and Wanyu Zang -- Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework / Han Jiao, Jixue Liu, Jiuyong Li and Chengfei Liu -- A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation / Giuseppe D'Acquisto, Marta Flamini and Maurizio Naldi -- Optimizing Network Patching Policy Decisions / Yolanta Beres and Jonathan Griffin -- A Risk Assessment Method for Smartphones / Marianthi Theoharidou, Alexios Mylonas and Dimitris Gritzalis -- Empirical Benefits of Training to Phishing Susceptibility / Ronald Dodge, Kathryn Coronges and Ericka Rovira -- Multi-modal Behavioural Biometric Authentication for Mobile Devices / Hataichanok Saevanee, Nathan L. Clarke and Steven M. Furnell -- Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks / Christoforos Ntantogian, Christos Xenakis and Ioannis Stavrakakis -- Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks / Yongge Wang -- Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains / Shaoying Cai, Yingjiu Li and Yunlei Zhao -- Enhanced Dictionary Based Rainbow Table / Vrizlynn L.L. Thing and Hwei-Ming Ying.
Authorization Policies for Materialized Views / Sarah Nait-Bahloul, Emmanuel Coquery and Mohand-Saïd Hacid -- Enhancing the Security of On-line Transactions with CAPTCHA Keyboard / Yongdong Wu and Zhigang Zhao -- Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach / Xin Kang and Yongdong Wu -- A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network / Ioannis Psaroudakis, Vasilios Katos and Pavlos S. Efraimidis -- A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages / Marco Prandini and Marco Ramilli -- Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System / Milica Milutinovic, Vincent Naessens and Bart De Decker -- Web Services Security Assessment: An Authentication-Focused Approach / Yannis Soupionis and Miltiadis Kandias -- Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case / Nineta Polemi and Theodoros Ntouskas -- A Response Strategy Model for Intrusion Response Systems / Nor Badrul Anuar, Maria Papadaki, Steven Furnell and Nathan Clarke -- Intrusion Tolerance of Stealth DoS Attacks to Web Services / Massimo Ficco and Massimiliano Rak -- Towards Use-Based Usage Control / Christos Grompanopoulos and Ioannis Mavridis.
Record Nr. UCHICAGO-11076972
[IFIP TC11 International Conference on Information Security (27th : 2012 : Ērakleion, Greece)]  
Materiale a stampa
Lo trovi qui: University of Chicago
Information security and privacy research [electronic resource] : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings / Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.).
Information security and privacy research [electronic resource] : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings / Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.).
Creatore [IFIP TC11 International Conference on Information Security (27th : 2012 : Ērakleion, Greece)]
Estensione 1 online resource.
Disciplina 005.8
Accesso persona Furnell, Steven, 1970-
Gritzalis, Dimitris
Theoharidou, Marianthi
Accesso convegno IFIP TC11 International Conference on Information Security
ISBN 3642304362 (electronic bk.)
9783642304361 (electronic bk.)
9783642304354
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authorization Policies for Materialized Views / Sarah Nait-Bahloul, Emmanuel Coquery and Mohand-Saïd Hacid -- Enhancing the Security of On-line Transactions with CAPTCHA Keyboard / Yongdong Wu and Zhigang Zhao -- Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach / Xin Kang and Yongdong Wu -- A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network / Ioannis Psaroudakis, Vasilios Katos and Pavlos S. Efraimidis -- A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages / Marco Prandini and Marco Ramilli -- Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System / Milica Milutinovic, Vincent Naessens and Bart De Decker -- Web Services Security Assessment: An Authentication-Focused Approach / Yannis Soupionis and Miltiadis Kandias -- Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case / Nineta Polemi and Theodoros Ntouskas -- A Response Strategy Model for Intrusion Response Systems / Nor Badrul Anuar, Maria Papadaki, Steven Furnell and Nathan Clarke -- Intrusion Tolerance of Stealth DoS Attacks to Web Services / Massimo Ficco and Massimiliano Rak -- Towards Use-Based Usage Control / Christos Grompanopoulos and Ioannis Mavridis.
HyperForce: Hypervisor-enForced Execution of Security-Critical Code / Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg and Wouter Joosen -- RandHyp: Preventing Attacks via Xen Hypercall Interface / Feifei Wang, Ping Chen, Bing Mao and Li Xie -- Role Mining under Role-Usage Cardinality Constraint / John C. John, Shamik Sural, Vijayalakshmi Atluri and Jaideep S. Vaidya -- HIDE_DHCP: Covert Communications through Network Configuration Messages / Ruben Rios, Jose A. Onieva and Javier Lopez -- Handling Stateful Firewall Anomalies / Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Tarik Moataz and Xavier Rimasson -- A Framework for Threat Assessment in Access Control Systems / Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi and Luigi Logrippo -- Support for Write Privileges on Outsourced Data / Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati -- Malicious Users' Transactions: Tackling Insider Threat / Weihan Li, Brajendra Panda and Qussai Yaseen -- Privacy-Preserving Television Audience Measurement Using Smart TVs / George Drosatos, Aimilia Tasidou and Pavlos S. Efraimidis -- Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility / Christian Banse, Dominik Herrmann and Hannes Federrath.
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds / Yulong Zhang, Min Li, Kun Bai, Meng Yu and Wanyu Zang -- Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework / Han Jiao, Jixue Liu, Jiuyong Li and Chengfei Liu -- A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation / Giuseppe D'Acquisto, Marta Flamini and Maurizio Naldi -- Optimizing Network Patching Policy Decisions / Yolanta Beres and Jonathan Griffin -- A Risk Assessment Method for Smartphones / Marianthi Theoharidou, Alexios Mylonas and Dimitris Gritzalis -- Empirical Benefits of Training to Phishing Susceptibility / Ronald Dodge, Kathryn Coronges and Ericka Rovira -- Multi-modal Behavioural Biometric Authentication for Mobile Devices / Hataichanok Saevanee, Nathan L. Clarke and Steven M. Furnell -- Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks / Christoforos Ntantogian, Christos Xenakis and Ioannis Stavrakakis -- Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks / Yongge Wang -- Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains / Shaoying Cai, Yingjiu Li and Yunlei Zhao -- Enhanced Dictionary Based Rainbow Table / Vrizlynn L. L. Thing and Hwei-Ming Ying.
Relay Attacks on Secure Element-Enabled Mobile Devices / Virtual Pickpocketing Revisited / Michael Roland, Josef Langer and Josef Scharinger -- Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) / Alessandro Armando, Alessio Merlo, Mauro Migliardi and Luca Verderame -- An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling / Bernhard J. Berger and Karsten Sohr -- Embedded Eavesdropping on Java Card / Guillaume Barbu, Christophe Giraud and Vincent Guerin -- Authenticated Key Exchange (AKE) in Delay Tolerant Networks / Sofia Anna Menesidou and Vasilios Katos -- OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management / Alexandre B. Augusto and Manuel Eduardo Correia -- Smart OpenID: A Smart Card Based OpenID Protocol / Andreas Leicher, Andreas U. Schmidt and Yogendra Shah -- Peer to Peer Botnet Detection Based on Flow Intervals / David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed and Sherif Saad, et al. -- Towards a Universal Data Provenance Framework Using Dynamic Instrumentation / Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis and Sotiris Ioannidis -- Improving Flask Implementation Using Hardware Assisted In-VM Isolation / Baozeng Ding, Fufeng Yao, Yanjun Wu and Yeping He.
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition / Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou and Dimitris Gritzalis -- Modeling Social Engineering Botnet Dynamics across Multiple Social Networks / Shuhao Li, Xiaochun Yun, Zhiyu Hao, Yongzheng Zhang and Xiang Cui, et al. -- Layered Analysis of Security Ceremonies / Giampaolo Bella and Lizzie Coles-Kemp -- A Small Depth-16 Circuit for the AES S-Box / Joan Boyar and René Peralta -- Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol / Maria Christofi and Aline Gouget -- My Authentication Album: Adaptive Images-Based Login Mechanism / Amir Herzberg and Ronen Margulies -- Balancing Security and Usability of Local Security Mechanisms for Mobile Devices / Shuzhe Yang and Gökhan Bal -- Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation / Ella Kolkowska and Bart De Decker -- When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems / Gurpreet Dhillon, Tiago Oliveira, Santa Susarapu and Mário Caldeira -- Security-by-Contract for the OSGi Platform / Olga Gadyatskaya, Fabio Massacci and Anton Philippov -- Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis / Hyundo Park, Sung-Oh David Jung, Heejo Lee and Hoh Peter In.
Record Nr. UALBERTA-5643275
[IFIP TC11 International Conference on Information Security (27th : 2012 : Ērakleion, Greece)]  
Materiale a stampa
Lo trovi qui: University of Alberta / NEOS Library Consortium