Information Security Theory and Practice, 1st ed. 2015 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings Security and Cryptology Series
Coordonnateurs : Akram Raja Naeem, Jajodia Sushil
![Couverture de l’ouvrage Information Security Theory and Practice](https://images.lavoisier.fr/couvertures/1317270870.jpg)
Security and Privacy Services.- On Secrecy Amplification Protocols.- Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing.- Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols.- Private Minutia-based Fingerprint Matching.- Secure Resource Sharing and Access Control.- Secure Resource Sharing for Embedded Protected Module Architectures.- Secure Obfuscation of Authoring Style.- DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption.- WSACd - A Usable Access Control Framework for Smart Home Devices.-Secure Devices and Execution Environment.- Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques.- Practical and Privacy-Preserving TEE Migration.- Randomizing the Montgomery Powering Ladder.- Challenges of Security and Reliability.- How Current Android Malware Seeks to Evade Automated Code Analysis.- On linkability and malleability in self-blindable credentials.- Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality.- Short Papers.- Normalizing Security Events with a Hierarchical Knowledge Base.- Attack Tree Generation by Policy Invalidation.- Lightweight Password Hashing Scheme for Embedded Systems.- Secure and Authenticated Access to LLN Resources Through Policy Constraints.
Includes supplementary material: sn.pub/extras
Date de parution : 11-2015
Ouvrage de 281 p.
15.5x23.5 cm
Thèmes d’Information Security Theory and Practice :
Mots-clés :
Cryptography; Security Services; Security in Hardware; Systems Security; Mobile and Wireless Security; access control; anonymity; countermeasures; internet of things; lightweight cryptography; natural language processing; network security; password hashing; security protocols; side-channel analysis; smart home; trusted computing; ubiquitous computing; vulnerability; Web services