000 04129nam a22006375i 4500
001 978-3-030-70852-8
003 DE-He213
005 20240730165639.0
007 cr nn 008mamaa
008 210302s2021 sz | s |||| 0|eng d
020 _a9783030708528
_9978-3-030-70852-8
024 7 _a10.1007/978-3-030-70852-8
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecure IT Systems
_h[electronic resource] :
_b25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings /
_cedited by Mikael Asplund, Simin Nadjm-Tehrani.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXII, 263 p. 60 illus., 33 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v12556
505 0 _aMalware and attacks -- Persistence in Linux-Based IoT Malware -- Real-time triggering of Android memory dumps for stealthy attack investigation -- Using Features of Encrypted Network Traffic to Detect Malware -- Formal analysis -- Machine-checking the universal verifiability of ElectionGuard -- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures -- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme -- Applied cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms and training -- HoneyHash: Honeyword Generation Based on Transformed Hashes -- Agent-based File Extraction Using Virtual Machine Introspection -- Cyber range automation overview with a case study of CRATE -- Applications and privacy -- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU -- OnLITE: On-line Label for IoT Transparency Enhancement -- An Investigation of Comic-Based Permission Requests.
520 _aThis book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linköping University, Sweden, and held online during November 23-24, 2020. The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
650 0 _aData protection.
_97245
650 0 _aApplication software.
_990006
650 0 _aComputers
_xLaw and legislation.
_975151
650 0 _aInformation technology
_xLaw and legislation.
_982531
650 0 _aComputer networks .
_931572
650 0 _aComputer networks
_xSecurity measures.
_93969
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer and Information Systems Applications.
_990007
650 2 4 _aLegal Aspects of Computing.
_953952
650 2 4 _aComputer Communication Networks.
_990008
650 2 4 _aMobile and Network Security.
_933624
700 1 _aAsplund, Mikael.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_990009
700 1 _aNadjm-Tehrani, Simin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_990010
710 2 _aSpringerLink (Online service)
_990011
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030708511
776 0 8 _iPrinted edition:
_z9783030708535
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v12556
_990012
856 4 0 _uhttps://doi.org/10.1007/978-3-030-70852-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c86450
_d86450