Security and Privacy in Communication Networks [electronic resource] : 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings / edited by Sushil Jajodia, Jianying Zhou.
Tipo de material: TextoSeries Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 50 | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 50Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Descripción: XIII, 500p. 160 illus. online resourceTipo de contenido:- text
- computer
- online resource
- 9783642161612
- SpringerLink (Online service)
- Computer science
- Computer Communication Networks
- Software engineering
- Operating systems (Computers)
- Data encryption (Computer science)
- Computer software
- Information Systems
- Computer Science
- Computer Communication Networks
- Management of Computing and Information Systems
- Data Encryption
- Software Engineering
- Algorithm Analysis and Problem Complexity
- Operating Systems
- 004.6 23
- TK5105.5-5105.9
Malware and Email Security -- SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection -- Analyzing and Exploiting Network Behaviors of Malware -- Inexpensive Email Addresses An Email Spam-Combating System -- Anonymity and Privacy -- Privacy Administration in Distributed Service Infrastructure -- On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS -- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings -- Wireless Security -- A Study on False Channel Condition Reporting Attacks in Wireless Networks -- Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services -- Saving Energy on WiFi with Required IPsec -- Systems Security I -- Transparent Protection of Commodity OS Kernels Using Hardware Virtualization -- A Generic Construction of Dynamic Single Sign-on with Strong Security -- DeCore: Detecting Content Repurposing Attacks on Clients Systems -- Network Security I -- Realizing a Source Authentic Internet -- Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks -- Attacking Beacon-Enabled 802.15.4 Networks -- Supporting Publication and Subscription Confidentiality in Pub/Sub Networks -- Security Protocols I -- CED2: Communication Efficient Disjointness Decision -- Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes -- Context-Aware Usage Control for Android -- System Security II -- Efficient Isolation of Trusted Subsystems in Embedded Systems -- Enhancing Host Security Using External Environment Sensors -- FADE: Secure Overlay Cloud Storage with File Assured Deletion -- Security Protocols II -- A New Information Leakage Measure for Anonymity Protocols -- Hidden Markov Models for Automated Protocol Learning -- Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast -- Network Security II -- Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly -- The Hitchhikers Guide to DNS Cache Poisoning -- A Formal Definition of Online Abuse-Freeness.
ZDB-2-SCS
No hay comentarios en este titulo.