Normal view MARC view ISBD view

Security and Trust Management [electronic resource] : 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, Proceedings / edited by Kostantinos Markantonakis, Marinella Petrocchi.

Contributor(s): Markantonakis, Kostantinos [editor.] | Petrocchi, Marinella [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 12386Publisher: Cham : Springer International Publishing : Imprint: Springer, 2020Edition: 1st ed. 2020.Description: IX, 139 p. 80 illus., 13 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030598174.Subject(s): Data protection | Application software | Computers and civilization | Cryptography | Data encryption (Computer science) | Computer networks -- Security measures | Computer networks  | Data and Information Security | Computer and Information Systems Applications | Computers and Society | Cryptology | Mobile and Network Security | Computer Communication NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Security Properties and Attacks -- Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties -- Reducing the Forensic Footprint with Android Accessibility Attacks -- A Novel Machine Learning Methodology for Detecting /Phishing Attacks in Real Time -- Confidentiality Schema -- Revocable access to encrypted message boards -- Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0 -- Security Processes -- Improved Feature Engineering for Free-Text Keystroke Dynamics -- Subversion-Resistant Commitment Schemes: Definitions and Constructions -- Challenges in IT Security Processes and Solution Approaches with Process Mining.
In: Springer Nature eBookSummary: This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located with the 25th European Symposium on Research in Computer Security, ESORICS 2020. The conference was planned to take place in Guildford, UK, but had to be moved to an online format due to the COVID-19 pandemic. The workshop took place during September 17-18, 2020. The 8 papers presented in this volume were carefully reviewed and selected from 20 submissions. They were organized in topical sections on security properties and attacks; confidentiality schema and security processes. .
    average rating: 0.0 (0 votes)
No physical items for this record

Security Properties and Attacks -- Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties -- Reducing the Forensic Footprint with Android Accessibility Attacks -- A Novel Machine Learning Methodology for Detecting /Phishing Attacks in Real Time -- Confidentiality Schema -- Revocable access to encrypted message boards -- Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0 -- Security Processes -- Improved Feature Engineering for Free-Text Keystroke Dynamics -- Subversion-Resistant Commitment Schemes: Definitions and Constructions -- Challenges in IT Security Processes and Solution Approaches with Process Mining.

This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located with the 25th European Symposium on Research in Computer Security, ESORICS 2020. The conference was planned to take place in Guildford, UK, but had to be moved to an online format due to the COVID-19 pandemic. The workshop took place during September 17-18, 2020. The 8 papers presented in this volume were carefully reviewed and selected from 20 submissions. They were organized in topical sections on security properties and attacks; confidentiality schema and security processes. .

There are no comments for this item.

Log in to your account to post a comment.