Items related to ICT Systems Security and Privacy Protection: 31st IFIP...

ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings - Softcover

 
9783319336312: ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings

This specific ISBN edition is currently not available.

Synopsis

Coercion-Resistant Proxy Voting.- A Posteriori Openable Public Key Encryption.-Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid.- Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research.- Evaluating CVSS Base Score Using Vulnerability Rewards Programs.- Defining Objectives For Preventing Cyberstalking.- Using Process Invariants to Detect Cyber Attacks on a Water Treatment System.- Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud.- Software Defined Networking Reactive Stateful Firewall.- Teaching Phishing-Security: Which Way is Best?.- On Gender Specific Perception of Data Sharing in Japan.- TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.- SybilRadar: A Graph-Structure Based Framework for Sybil Detection in Online Social Networks.- 
Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence.- Automated Source Code Instrumentation for Verifying Potential Vulnerabilities.- An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities.- Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Scanners.- A Utility-Based Reputation Model for the Internet of Things.- Advanced Remote Firmware Upgrades Using TPM 2.0.- RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks.- Uncertain? No, it's Very Certain! Recovering the Key from Guessing Entropy Enhanced CPA.- 
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware.- NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries.- A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor.- Deducing User Presence from Inter-Message Intervals in Home Automation Systems.- Privacy by Design Principles in Design of New Generation Cognitive
Assistive Technologies.- A Trustless Privacy-Preserving Reputation System.


"synopsis" may belong to another edition of this title.

(No Available Copies)

Search Books:



Create a Want

Can't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!

Create a Want

Other Popular Editions of the Same Title

9783319336299: ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings ... and Communication Technology, 471)

Featured Edition

ISBN 10:  3319336290 ISBN 13:  9783319336299
Publisher: Springer, 2016
Hardcover