Foundations and Practice of Security : 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers

This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 22 full papers, accompanied by 3 short papers. The pape...

Celý popis

Uloženo v:
Podrobná bibliografie
Další autoři: Garcia-Alfaro, Joaquin (Editor)
Cuppens, Frédéric (Editor)
Cuppens-Boulahia, Nora (Editor)
Miri, Ali (Editor)
Tawbi, Nadia (Editor)
Korporace: SpringerLink (online služba)  
Médium: E-kniha
Jazyk:angličtina
Vydáno: Berlin ; Heidelberg : Springer Berlin Heidelberg, 2013
Edice:Lecture Notes in Computer Science
Žánr/forma:elektronické knihy
ISBN:978-3-642-37119-6
9783642371189
Témata:
On-line přístup:Plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
Obálka
LEADER 05106nam a22006495i 4500
001 001817194
003 CZ PrSTK
005 20151204144921.0
006 m f d
007 cr nn 008mamaa
008 130327s2013 gw | s |||| 0|eng d
020 |a 978-3-642-37119-6  |9 9783642371196 
024 7 |a 10.1007/978-3-642-37119-6  |2 doi 
040 |a DE-He213  |b cze  |d ABA013 
072 7 |a 004  |x Počítačová věda. Výpočetní technika. Informační technologie  |2 Konspekt  |9 23 
080 |a 004  |2 MRF 
245 1 0 |a Foundations and Practice of Security :  |b 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers /  |c edited by Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi 
264 1 |a Berlin ;  |a Heidelberg :  |b Springer Berlin Heidelberg,  |c 2013 
300 |a 1 online zdroj (XIV, 383 stran) :  |b 90 ilustrací 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 7743 
505 0 |a Cryptography and Information Theory -- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic Protocols -- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities -- COMPASS: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network Users through the Social Graph -- A Formal Derivation of Composite Trust -- Policies and Applications Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy in the Java Security Manager -- A Novel Obfuscation: Class Hierarchy Flattening -- RESource: A Framework for Online Matching of Assembly with Open Source Code -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone -- Network and Adaptive Security -- Short-Term Linkable Group Signatures with Categorized Batch Verification -- GHUMVEE: Efficient, Effective, and Flexible Replication -- Extracting Attack Scenarios Using Intrusion Semantics -- On Securely Manipulating XML Data -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC -- Short Papers -- Towards Modelling Adaptive Attacker’s Behaviour -- Scalable Deniable Group Key Establishment -- Information-Theoretic Foundations of Differential Privacy 
520 |a This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
659 0 |a Computer science 
659 0 |a Information technology 
659 0 |a Business  |x Data processing 
659 0 |a Software engineering 
659 0 |a Computer graphics 
659 0 |a Application software 
659 0 |a Management information systems 
659 1 4 |a Computer Science 
659 2 4 |a Software Engineering 
659 2 4 |a Information Systems Applications (incl. Internet) 
659 2 4 |a IT in Business 
659 2 4 |a Computer Appl. in Administrative Data Processing 
659 2 4 |a Management of Computing and Information Systems 
659 2 4 |a Computer Imaging, Vision, Pattern Recognition and Graphics 
650 0 7 |a informatika  |x if  |7 psh6548  |2 psh 
650 0 7 |a výpočetní technika  |x vt  |7 psh12314  |2 psh 
650 0 7 |a softwarové inženýrství  |x if  |7 psh6634  |2 psh 
650 0 7 |a počítačová grafika  |x vt  |7 psh12567  |2 psh 
650 0 7 |a aplikační programy  |x vt  |7 psh12553  |2 psh 
650 0 7 |a podnikové informační systémy  |x ev  |7 psh13633  |2 psh 
700 1 |a Garcia-Alfaro, Joaquin  |4 edt 
700 1 |a Cuppens, Frédéric  |4 edt 
700 1 |a Cuppens-Boulahia, Nora  |4 edt 
700 1 |a Miri, Ali  |4 edt 
700 1 |a Tawbi, Nadia  |4 edt 
710 2 |a SpringerLink (online služba)  |7 ntk2018999494 
776 0 8 |i Tištěné vydání:  |t Foundations and Practice of Security : 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers  |z 9783642371189 
830 0 |a Lecture Notes in Computer Science 
856 4 0 |u https://doi.org/10.1007/978-3-642-37119-6  |y Plný text 
910 |a ABA013 
950 |a Springer  |b Lecture Notes in Computer Science 2017