Imagen de Google Jackets

Security and Privacy in Communication Networks [electronic resource] : 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings / edited by Sushil Jajodia, Jianying Zhou.

Por: Colaborador(es): Tipo de material: TextoTextoSeries Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 50 | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 50Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Descripción: XIII, 500p. 160 illus. online resourceTipo de contenido:
  • text
Tipo de medio:
  • computer
Tipo de soporte:
  • online resource
ISBN:
  • 9783642161612
Trabajos contenidos:
  • SpringerLink (Online service)
Tema(s): Formatos físicos adicionales: Sin títuloClasificación CDD:
  • 004.6 23
Clasificación LoC:
  • TK5105.5-5105.9
Recursos en línea:
Contenidos:
Springer eBooks
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Malware and Email Security -- SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection -- Analyzing and Exploiting Network Behaviors of Malware -- Inexpensive Email Addresses An Email Spam-Combating System -- Anonymity and Privacy -- Privacy Administration in Distributed Service Infrastructure -- On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS -- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings -- Wireless Security -- A Study on False Channel Condition Reporting Attacks in Wireless Networks -- Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services -- Saving Energy on WiFi with Required IPsec -- Systems Security I -- Transparent Protection of Commodity OS Kernels Using Hardware Virtualization -- A Generic Construction of Dynamic Single Sign-on with Strong Security -- DeCore: Detecting Content Repurposing Attacks on Clients Systems -- Network Security I -- Realizing a Source Authentic Internet -- Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks -- Attacking Beacon-Enabled 802.15.4 Networks -- Supporting Publication and Subscription Confidentiality in Pub/Sub Networks -- Security Protocols I -- CED2: Communication Efficient Disjointness Decision -- Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes -- Context-Aware Usage Control for Android -- System Security II -- Efficient Isolation of Trusted Subsystems in Embedded Systems -- Enhancing Host Security Using External Environment Sensors -- FADE: Secure Overlay Cloud Storage with File Assured Deletion -- Security Protocols II -- A New Information Leakage Measure for Anonymity Protocols -- Hidden Markov Models for Automated Protocol Learning -- Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast -- Network Security II -- Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly -- The Hitchhikers Guide to DNS Cache Poisoning -- A Formal Definition of Online Abuse-Freeness.

ZDB-2-SCS

No hay comentarios en este titulo.

para colocar un comentario.