top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Security and privacy in communication networks : 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers / Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao (eds.).
Security and privacy in communication networks : 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers / Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao (eds.).
Creatore [SecureComm (Conference) (9th : 2013 : Sydney, N.S.W.)]
Estensione 1 online resource (xi, 420 pages) : illustrations.
Disciplina 005.8
Accesso persona Zia, Tanveer, editor
Zomaya, Albert Y., editor.
Varadharajan, Vijay, editor
Mao, Morley, editor
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783319042831
3319042831
3319042823
9783319042824
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks -- Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks / Eirini Karapistoli, Anastasios A. Economides -- Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks / Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li -- CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones / Mengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian.
Session II: Malware, Botnets, and Distributed Denial of Service -- Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets / Cui Xiang, Fang Binxing, Shi Jinqiao, Liu Chaoge -- Contrasting Permission Patterns between Clean and Malicious Android Applications / Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Batten -- DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android / Yousra Aafer, Wenliang Du, Heng Yin
Session III: Security for Emerging Technologies: VoIP, Peer-to-peer, and Cloud Computing -- Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation / Ryan Farley, Xinyuan Wang -- VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing / Jun Jiang, Meining Nie, Purui Su, Dengguo Feng -- Integrated Security Architecture for Virtual Machines / Vijay Varadharajan, Udaya Tupakula.
Session IV: Encryption and Key Management -- Generic Mediated Encryption / Ibrahim Elashry, Yi Mu, Willy Susilo -- An Efficient Reconfigurable II-ONB Modular Multiplier / Li Miao, He Liangsheng, Yang Tongjie, Gao Neng, Liu Zongbin, Zhang Qinglong -- Public-Key Encryption Resilient to Linear Related-Key Attacks / Hui Cui, Yi Mu, Man Ho Au.
Session V: Security in Software and Machine Learning -- Clonewise -- Detecting Package-Level Clones Using Machine Learning / Silvio Cesare, Yang Xiang, Jun Zhang -- Automatic Polymorphic Exploit Generation for Software Vulnerabilities / Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng.
Session VI: Network and System Security Model -- A Novel Web Tunnel Detection Method Based on Protocol Behaviors / Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang -- Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege / Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens -- Scalable Security Model Generation and Analysis Using k-importance Measures / Jin B. Hong, Dong Seong Kim.
Session VII: Security and Privacy in Pervasive and Ubiquitous Computing -- The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems / Mehari Msgna, Konstantinos Markantonakis, Keith Mayes -- An e-payment Architecture Ensuring a High Level of Privacy Protection / Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty [and others] -- Unveiling Privacy Setting Breaches in Online Social Networks / Xin Ruan, Chuan Yue, Haining Wang.
ATIS 2013: 4th International Workshop on Applications and Techniques in Information Security -- Securing a Web-Based Anti-counterfeit RFID System / Belal Chowdhury, Morshed Chowdhury, Jemal Abawajy -- Security Concerns and Remedy in a Cloud Based E-learning System / Md. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal Abawajy -- Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs / Quazi Mamun, Rafiqul Islam, Mohammed Kaosar -- (k -- n) Oblivious Transfer Using Fully Homomorphic Encryption System / Mohammed Kaosar, Quazi Mamun, Rafiqul Islam, Xun Yi -- Detection of Android API Call Using Logging Mechanism within Android Framework / Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai -- Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform / Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan.
Record Nr. NYU-004443089
[SecureComm (Conference) (9th : 2013 : Sydney, N.S.W.)]  
Materiale a stampa
Lo trovi qui: New York University
Cyber security and resiliency policy framework / edited by Ashok Vaseashta, Philip Susmann and Eric Braman
Cyber security and resiliency policy framework / edited by Ashok Vaseashta, Philip Susmann and Eric Braman
Creatore [NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework (2013 : Ohrid, Macedonia)]
Estensione 1 online resource.
Disciplina 005.8
Accesso persona Vaseashta, A. (Ashok), editor.
Susmann, Philip, editor
Braman, Eric, editor
Accesso ente IOS Press
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9781614994466
1614994463
132221123X
9781322211237
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK""; ""Preface""; ""Meet the Authors""; ""Contents""; ""Cyber Security � Threat Scenarios, Policy Framework and Cyber Wargames""; ""E-Government 3 Web Security Issues: Who, What, When?""; ""Cyber Security Issues of Telecommunication Infrastructure""; ""Security Issues for Mobile Devices""; ""Strengthening Cyber Security Policy by Means of End-Users Dedicated Training""; ""Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia""
""Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body""""Turkey's Approaches on Cyber Security Policy Framework""; ""Cyber Security Challenges in Smart Homes""; ""Development of Defense-Oriented Application Software under Fire: The Case of Israel""; ""Education as a Long-Term Strategy for Cyber Security""; ""Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps""; ""Subject Index""; ""Author Index""
Record Nr. NYU-004256680
[NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework (2013 : Ohrid, Macedonia)]  
Materiale a stampa
Lo trovi qui: New York University
Cyber situational awareness : issues and research / Sushil Jajodia [and others], editors
Cyber situational awareness : issues and research / Sushil Jajodia [and others], editors
Estensione 1 online resource (xii, 249 pages) : illustrations.
Disciplina 005.8
Accesso persona Jajodia, Sushil
Genere/Forma Electronic books
ISBN 9781441901408
144190140X
9781441901392
1441901396
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber SA : situational awareness for cyber defense / P. Barford [and others] -- Overview of cyber situation awareness / George P. Tadda and John S. Salerno -- RPD-based hypothesis reasoning for cyber situation awareness / John Yen [and others] -- Uncertainty and risk management in cyber situational awareness / Jason Li, Xinming Ou, and Raj Rajagopalan -- Employing honeynets for network situational awareness / P. Barford [and others] -- Assessing cybercrime through the eyes of the WOMBAT / Marc Dacier [and others] -- Topological vulnerability analysis / Sushil Jajodia and Steven Noel -- Cross-layer damage assessment for cyber situational awareness / Peng Liu [and others] -- A declarative framework for intrusion analysis / Matt Fredrikson [and others] -- Automated software vulnerability analysis / Emre C. Sezer, Chongkyung Kil, and Peng Ning -- Machine learning methods for high level cyber situation awareness / Thomas G. Dietterich [and others].
Record Nr. NYU-004363065
Materiale a stampa
Lo trovi qui: New York University
Security in computing and communications : international symposium, SSCC 2013, Mysore, India, August 22-24, 2013 : proceedings / Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.).
Security in computing and communications : international symposium, SSCC 2013, Mysore, India, August 22-24, 2013 : proceedings / Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.).
Creatore [SSCC (Conference) (2013 : Mysore, India)]
Estensione 1 online resource (xvi, 404 pages) : illustrations.
Disciplina 005.8
Accesso persona Thampi, Sabu M., editor.
Atrey, Pradeep, editor
Fan, Chun-I., editor.
Martinez Pérez, Gregorio, editor
Genere/Forma Congresses
Electronic books
Conference papers and proceedings
ISBN 9783642405761
3642405762
9783642405754
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Regular Papers. A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System / Sunil Malipatlolla -- Signature Embedding in the Functional Description of Reversible Circuit / Animesh Roy, Debasis Mitra -- Detecting Laser Fault Injection for Smart Cards Using Security Automata / Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet -- Virtual World Authentication Using the Smart Card Web Server / Lazaros Kyrillidis [and others] -- A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart Cards / Chandra Sekhar Vorugunti, Mrudula Sarvabhatla -- A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition / G. Jyothish Lal, V.K. Veena, K.P. Soman -- Random Key and Key Dependent S-box Generation for AES Cipher to Overcome Known Attacks / L.N. Pradeep, Aniruddha Bhattacharjya.
Emulating a High Interaction Honeypot to Monitor Intrusion Activity / Anil Gopalakrishna, Alwyn Rosham Pais -- On Pseudo-random Number Generation Using Elliptic Curve Cryptography / Manali Dubal, Aaradhana Deshmukh -- Exploiting Functional Models to Assess the Security Aspect in Embedded System Design / Ingo Stierand, Sunil Malipatlolla -- Design of CAPTCHA Script for Indian Regional Websites / M. Tariq Banday, Shafiya Afzal Sheikh -- A Survey of Traditional and Cloud Specific Security Issues / Sumitra Binu, Mohammed Misbahuddin -- A Chaos Based Method for Efficient Cryptographic S-box Design / Musheer Ahmad [and others] -- A Multicast Authentication Protocol (MAP) for Dynamic Multicast Groups in Wireless Networks / Parag J. Jambhulkar [and others] -- Clustering Based on Trust of a Node in Mobile Ad-Hoc NETworks / Pallavi Khatri, Shashikala Tapaswi, Udai P. Verma.
A Novel Approach for Monitoring SQL Anti-Forensic Attacks Using Pattern Matching for Digital Forensic Investigation / Vaibhav T. Patil, Amrita A. Manjrekar -- Robust BPSO and Scene Change Based Digital Video Watermarking Algorithm in DWT-DFT-SVD Domain / Rahim Ansari [and others] -- Slide Attacks against Iterated Hill Ciphers / Liam Keliher, Samuel Thibodeau -- Efficient Hierarchical Key Management Scheme Based on Polynomial Construction / B.R. Purushothama, B.B. Amberker -- Hand Vein Authentication System Using Dynamic ROI / Munaga V.N.K. Prasad, Ilaiah Kavati, Kanavu Ravindra -- Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation / Ilaiah Kavati, Munaga V.N.K. Prasad, Chakravarthy Bhagvati -- Short Attribute-Based Group Signature without Random Oracles with Attribute Anonymity / Syed Taqi Ali, B.B. Amberker -- Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function / Ashok Kumar Das, Vanga Odelu, Adrijit Goswami.
Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks / Ashok Kumar Das, Santanu Chatterjee, Jamuna Kanta Sing -- Work-in-Progress. VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud / Sanchika Gupta, Padam Kumar -- Implementation and Embellishment of Prevention of Keylogger Spyware Attacks / Mohammad Wazid [and others] -- Data Anonymization According to the Combination of Attributes on Social Network Sites / Sanaz Kavianpour, Bharanidharan Shanmugam, Zuraini Ismail -- Secure Multimedia Transmission in P2P Using Recurrence Relation and Evolutionary Algorithm / Ramesh Shahabadkar, Ramchandra V. Pujeri -- Hybrid Approach for Improvising Credit Card Fraud Detection Based on Collective Animal Behaviour and SVM / V. Dheepa, R. Dhanapal -- Recent Trends in Collection of Software Forensics Artifacts: Issues and Challenges / Deepak Gupta, Babu M. Mehtre.
Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net / Yosra Ben Mustapha, Hervé Debar -- Monitoring Information Leakage in a Web Browser / Nemisha Sharma [and others] -- Securing Biometric Data with Visual Cryptography and Steganography / Deepak Aeloor, Amrita A. Manjrekar -- Forensics Analysis of Sandboxie Artifacts / Deepak Gupta, B.M. Mehte -- An Improved Secure Communication Scheme Using Adaptive Parameter Synchronization / Arti Dwivedi, Ashok K. Mittal, Suneet Dwivedi -- A Side View Based Video in Video Watermarking Using DWT and Hilbert Transform / Loganathan Agilandeeswari, K. Ganesan, K. Muralibabu -- Malware Detection Using API Function Frequency with Ensemble Based Classifier / Pratiksha Natani, Deepti Vidyarthi -- Privacy Issues in Single and Multi-hop Wireless Mesh Network / Sagar Kakade, Ravi Sawant, Deepak C. Karia -- Scalable Key Transport Protocol Using Chinese Remainder Theorem / Manisha Y. Joshi, R.S. Bichkar.
Record Nr. NYU-004438724
[SSCC (Conference) (2013 : Mysore, India)]  
Materiale a stampa
Lo trovi qui: New York University
Enhanced methods in computer security, biometric and artificial intelligence systems / edited by Jerzy Pejaś, Andrzej Piegat
Enhanced methods in computer security, biometric and artificial intelligence systems / edited by Jerzy Pejaś, Andrzej Piegat
Estensione 1 online resource (xi, 394 pages) : illustrations
Disciplina 005.8
Accesso persona Pejaś, Jerzy, 1954-
Piegat, Andrzej, 1947-
Genere/Forma Electronic books
ISBN 1402077769
9781402077760
0387234845
9780387234847
1280625341
9781280625343
Classificazione TP309
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004339949
Materiale a stampa
Lo trovi qui: New York University
Security of data and transaction processing / edited by Vijay Atluri, Rutgers University, Pierangela Samarati, SRI International
Security of data and transaction processing / edited by Vijay Atluri, Rutgers University, Pierangela Samarati, SRI International
Estensione 1 online resource (152 pages) : illustrations
Disciplina 005.8
Accesso persona Atluri, Vijay, 1956-editor
Samarati, Pierangela, editor
Genere/Forma Electronic books
ISBN 9781461544616
1461544610
9781461370093
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004394248
Materiale a stampa
Lo trovi qui: New York University
Chaos-based cryptography : theory, algorithms and applications / Ljupco Kocarev and Shiguo Lian (Eds.).
Chaos-based cryptography : theory, algorithms and applications / Ljupco Kocarev and Shiguo Lian (Eds.).
Estensione 1 online resource (x, 395 pages) : illustrations.
Disciplina 005.8
Accesso persona Kocarev, L. (Ljupco)
Lian, Shiguo
Genere/Forma Electronic books
ISBN 9783642205422
3642205429
9783642205415
3642205410
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction to Chaos -- 2. Chaos-based Cryptography 3. Digitized Chaos for Pseudo-Random Number Generation in Cryptography -- 4. Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography -- 5. Chaos based hash function -- 6. Chaos-Based Video Encryption Algorithms -- 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 4. Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography -- 5. Chaos based hash function -- 6. Chaos-Based Video Encryption Algorithms -- 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 5. Chaos based hash function -- 6. Chaos-Based Video Encryption Algorithms -- 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms -- 6. Chaos-Based Video Encryption Algorithms -- 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 6. Chaos-Based Video Encryption Algorithms -- 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms.
Record Nr. NYU-004370761
Materiale a stampa
Lo trovi qui: New York University
Network hardening : an automated approach to improving network security / Lingyu Wang, Massimiliano Alvanese, Sushil Jajodia
Network hardening : an automated approach to improving network security / Lingyu Wang, Massimiliano Alvanese, Sushil Jajodia
Creatore [Wang, Lingyu, author]
Estensione 1 online resource.
Disciplina 005.8
Accesso persona Albanese, Massimiliano, author
Jajodia, Sushil, author
Genere/Forma Electronic books
ISBN 9783319046129
3319046128
9783319046112
331904611X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Related Work -- Attack Graph and Network Hardening -- Minimum-Cost Network Hardening -- Linear-Time Network Hardening -- Conclusion.
Record Nr. NYU-004445032
[Wang, Lingyu, author]  
Materiale a stampa
Lo trovi qui: New York University
Principles of security and trust : Third International Conference, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, proceedings / Martín Abadi, Steve Kremer (eds.).
Principles of security and trust : Third International Conference, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, proceedings / Martín Abadi, Steve Kremer (eds.).
Creatore [POST (Conference) (3rd : 2014 : Grenoble, France)]
Estensione 1 online resource (xviii, 305 pages) : illustrations (black and white).
Disciplina 005.8
Accesso persona Abadi, Martín, editor
Kremer, Steve, editor
Accesso convegno ETAPS (Conference) (17th : 2014 : Grenoble, France)
Genere/Forma Conference papers and proceedings
Electronic books
Soggetto non controllato POST
Software
ETAPS
Security
ISBN 9783642547928
3642547923
9783642547911
3642547915
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems -- Stateful Applied Pi Calculus -- Computational Soundness Results for ProVerif: Bridging the Gap from Trace Properties to Uniformity -- A Secure Key Management Interface with Asymmetric Cryptography -- Quantitative Aspects of Information Flow Abstract Channels and Their Robust Information-Leakage Ordering -- Quantitative Information Flow in Boolean Programs -- When Not All Bits Are Equal: Worth-Based Information Flow -- Leakage Resilience against Concurrent Cache Attacks -- Information Flow Control in WebKit's JavaScript Bytecode -- A Separation Logic for Enforcing Declarative Information Flow Control Policies -- Defining and Enforcing Referential Security -- Extending and Applying a Framework for the Cryptographic Verification of Java Programs -- Compiling CAO: From Cryptographic Specifications to C Implementations -- Decentralized Composite Access Control -- Temporal Logics for Hyperproperties -- Time-Dependent Analysis of Attacks.
Record Nr. NYU-004445142
[POST (Conference) (3rd : 2014 : Grenoble, France)]  
Materiale a stampa
Lo trovi qui: New York University
Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings / Xinyi Huang, Jianying Zhou (eds.).
Information security practice and experience : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings / Xinyi Huang, Jianying Zhou (eds.).
Creatore [ISPEC (Conference) (10th : 2014 : Fuzhou, China)]
Estensione 1 online resource (xiv, 578 pages) : illustrations.
Disciplina 005.8
Accesso persona Huang, Xinyi (Computer scientist), editor
Zhou, Jianying, editor
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783319063201 (electronic bk.)
3319063200 (electronic bk.)
3319063197 (print)
9783319063195 (print)
9783319063195
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control in and Around the Browser -- Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools -- Preserving Receiver-Location Privacy in Wireless Sensor Networks -- Data Security and Privacy in the Cloud -- Forbidden City Model -- Towards a Practice Relevant Framework for Designing Cryptographic Protocols -- A CAPTCHA Scheme Based on the Identification of Character Locations -- A Multi process Mechanism of Evading Behavior-Based Bot Detection Approaches -- Obfuscating Encrypted Web Traffic with Combined Objects -- A Website Credibility Assessment Scheme Based on Page Association -- A Methodology for Hook-Based Kernel Level Rootkits -- Precise Instruction-Level Side Channel Profiling of Embedded Processors -- Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model -- SBE -- A Precise Shell code Detection Engine Based on Emulation and Support Vector Machine -- HDROP: Detecting ROP Attacks Using Performance Monitoring Counters -- Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs -- High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit -- A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm -- Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis -- Implementing a Covert Timing Channel Based on Mimic Function -- Detecting Frame Deletion in H.264 Video -- Efficient Adaptive Oblivious Transfer in UC Framework -- Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes -- Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing -- Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups -- Proofs of Retrievability Based on MRD Codes -- TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing -- Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures -- Distributed Pseudo-Random Number Generation and Its Application to Cloud Database -- A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience -- Two-Party (Blind) Ring Signatures and Their Applications -- Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model -- Attribute-Based Signature with Message Recovery -- Encryption and Key Agreement An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing -- Multi-recipient Encryption in Heterogeneous Setting -- ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage -- Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement -- New Variants of Lattice Problems and Their NP-Hardness -- Improved Preimage Attacks against Reduced HAS-160 -- Modular Inversion Hidden Number Problem Revisited -- On the Recursive Construction of MDS Matrices for Lightweight Cryptography -- On Constructions of Circulant MDS Matrices for Lightweight Cryptography.
Record Nr. NYU-004445230
[ISPEC (Conference) (10th : 2014 : Fuzhou, China)]  
Materiale a stampa
Lo trovi qui: New York University