ICT systems security and privacy protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings /: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings. (2016)
- Record Type:
- Book
- Title:
- ICT systems security and privacy protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings /: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings. (2016)
- Main Title:
- ICT systems security and privacy protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings
- Other Titles:
- SEC 2016
- Further Information:
- Note: Edited by Jaap-Henk Hoepman, Stefan Katzenbeisser.
- Editors:
- Hoepman, Jaap-Henk
Katzenbeisser, Stefan - Other Names:
- IFIP TC11 International Information Security Conference, 31st
- Contents:
- Coercion-Resistant Proxy Voting -- A Posteriori Openable Public Key Encryption.-Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid -- Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research -- Evaluating CVSS Base Score Using Vulnerability Rewards Programs -- Defining Objectives For Preventing Cyberstalking -- Using Process Invariants to Detect Cyber Attacks on a Water Treatment System -- Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud -- Software Defined Networking Reactive Stateful Firewall -- Teaching Phishing-Security: Which Way is Best? -- On Gender Specific Perception of Data Sharing in Japan -- TORPEDO: TOoltip-poweRed Phishing Email DetectiOn -- SybilRadar: A Graph-Structure Based Framework for Sybil Detection in Online Social Networks -- Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence -- Automated Source Code Instrumentation for Verifying Potential Vulnerabilities -- An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities -- Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Scanners -- A Utility-Based Reputation Model for the Internet of Things -- Advanced Remote Firmware Upgrades Using TPM 2.0 -- RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks -- Uncertain? No, it's Very Certain! Recovering the Key from Guessing Entropy Enhanced CPACoercion-Resistant Proxy Voting -- A Posteriori Openable Public Key Encryption.-Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid -- Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research -- Evaluating CVSS Base Score Using Vulnerability Rewards Programs -- Defining Objectives For Preventing Cyberstalking -- Using Process Invariants to Detect Cyber Attacks on a Water Treatment System -- Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud -- Software Defined Networking Reactive Stateful Firewall -- Teaching Phishing-Security: Which Way is Best? -- On Gender Specific Perception of Data Sharing in Japan -- TORPEDO: TOoltip-poweRed Phishing Email DetectiOn -- SybilRadar: A Graph-Structure Based Framework for Sybil Detection in Online Social Networks -- Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence -- Automated Source Code Instrumentation for Verifying Potential Vulnerabilities -- An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities -- Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Scanners -- A Utility-Based Reputation Model for the Internet of Things -- Advanced Remote Firmware Upgrades Using TPM 2.0 -- RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks -- Uncertain? No, it's Very Certain! Recovering the Key from Guessing Entropy Enhanced CPA -- Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware -- NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries -- A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor -- Deducing User Presence from Inter-Message Intervals in Home Automation Systems -- Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies -- A Trustless Privacy-Preserving Reputation System. … (more)
- Publisher Details:
- Switzerland : Springer
- Publication Date:
- 2016
- Extent:
- 1 online resource (xiii, 414 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Internet -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Internet -- Security measures
Computers -- Security -- General
Computers -- Social Aspects -- General
Computers -- Hardware -- Network Hardware
Computers -- Information Technology
Coding theory & cryptology
Ethical & social aspects of IT
Network hardware
Information retrieval
Computer security
Data encryption (Computer science)
Computer Communication Networks
Computer security
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319336305
3319336304 - Related ISBNs:
- 9783319336299
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed May 18, 2016).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.355987
- Ingest File:
- 01_316.xml