Secure IT systems : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings /: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings. (2018)
- Record Type:
- Book
- Title:
- Secure IT systems : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings /: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings. (2018)
- Main Title:
- Secure IT systems : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings
- Other Titles:
- NordSec 2018
- Further Information:
- Note: Nils Gruschka (eds.).
- Editors:
- Gruschka, Nils
- Other Names:
- Nordic Conference on Secure IT Systems, 23rd
- Contents:
- Privacy -- Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid -- Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps -- MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix-Zones -- AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications -- Cryptography -- Unifying Kleptographic Attacks -- Steady: A Simple End-to-End Secure Logging System -- Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation -- On Security Analysis of Generic Dynamic Authenticated Group Key Exchange -- A Blockchain-Assisted Hash-Based Signature Scheme -- The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants -- Verifiable Light-Weight Monitoring for Certificate Transparency Logs -- Network and Cloud Security -- CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs -- Detection of covert channels in TCP retransmissions -- What you can change and what you can’t: human experience in computer network defenses -- Attack simulation for a realistic evaluation and comparison of network security techniques -- Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots using Virtual Machine Introspection -- Authorization Policies Specification and Consistency Management within Multi-Cloud Environments -- Cyber Security and Malware -- Cyber Hygiene: The Big Picture -- Estimating thePrivacy -- Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid -- Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps -- MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix-Zones -- AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications -- Cryptography -- Unifying Kleptographic Attacks -- Steady: A Simple End-to-End Secure Logging System -- Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation -- On Security Analysis of Generic Dynamic Authenticated Group Key Exchange -- A Blockchain-Assisted Hash-Based Signature Scheme -- The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants -- Verifiable Light-Weight Monitoring for Certificate Transparency Logs -- Network and Cloud Security -- CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs -- Detection of covert channels in TCP retransmissions -- What you can change and what you can’t: human experience in computer network defenses -- Attack simulation for a realistic evaluation and comparison of network security techniques -- Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots using Virtual Machine Introspection -- Authorization Policies Specification and Consistency Management within Multi-Cloud Environments -- Cyber Security and Malware -- Cyber Hygiene: The Big Picture -- Estimating the Risk of Fraud against E-services -- PESTEL Analysis of Hacktivism Campaign Motivations -- Data Modelling for Predicting Exploits -- UpDroid : Updated Android Malware and Its Familial Classification -- Evaluation of Cyber Security Management of Critical Infrastructures: A Literature Review Guided by the NIST Cybersecurity Framework -- Next Generation Ransomware -- Security for Software and Software Development -- Hardware-Assisted Program Execution Integrity: HAPEI -- Protecting Instruction Set Randomization from Code Reuse Attacks -- A Uniform Information-Flow-Security Benchmark Suite for Source Code and Bytecode -- When Harry met Tinder: Security analysis of dating apps on Android -- Threat Poker: Solving Security and Privacy Threats in Agile Software Development. . … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xiii, 486 pages), illustrations (some color)
- Subjects:
- 005.8
Computer security -- Congresses
Computer security
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030036386
3030036383 - Related ISBNs:
- 9783030036379
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed December 3, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.377759
- Ingest File:
- 02_358.xml