000 05271nam a22006735i 4500
001 978-3-642-37119-6
003 DE-He213
005 20240730191237.0
007 cr nn 008mamaa
008 130327s2013 gw | s |||| 0|eng d
020 _a9783642371196
_9978-3-642-37119-6
024 7 _a10.1007/978-3-642-37119-6
_2doi
050 4 _aQA76.758
072 7 _aUMZ
_2bicssc
072 7 _aCOM051230
_2bisacsh
072 7 _aUMZ
_2thema
082 0 4 _a005.1
_223
245 1 0 _aFoundations and Practice of Security
_h[electronic resource] :
_b5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers /
_cedited by Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi.
250 _a1st ed. 2013.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2013.
300 _aXIV, 383 p. 90 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v7743
505 0 _aCryptography and Information Theory -- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic Protocols -- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities -- COMPASS: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network Users through the Social Graph -- A Formal Derivation of Composite Trust -- Policies and Applications Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy in the Java Security Manager -- A Novel Obfuscation: Class Hierarchy Flattening -- RESource: A Framework for Online Matching of Assembly with Open Source Code -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone -- Network and Adaptive Security -- Short-Term Linkable Group Signatures with Categorized Batch Verification -- GHUMVEE: Efficient, Effective, and Flexible Replication -- Extracting Attack Scenarios Using Intrusion Semantics -- On Securely Manipulating XML Data -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC -- Short Papers -- Towards Modelling Adaptive Attacker's Behaviour -- Scalable Deniable Group Key Establishment -- Information-Theoretic Foundations of Differential Privacy.
520 _aThis book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security.
650 0 _aSoftware engineering.
_94138
650 0 _aApplication software.
_9145624
650 0 _aBusiness information services.
_928705
650 0 _aInformation technology
_xManagement.
_95368
650 0 _aElectronic data processing
_xManagement.
_9145625
650 0 _aImage processing
_xDigital techniques.
_94145
650 0 _aComputer vision.
_9145626
650 1 4 _aSoftware Engineering.
_94138
650 2 4 _aComputer and Information Systems Applications.
_9145627
650 2 4 _aIT in Business.
_933373
650 2 4 _aComputer Application in Administrative Data Processing.
_931588
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputer Imaging, Vision, Pattern Recognition and Graphics.
_931569
700 1 _aGarcia-Alfaro, Joaquin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9145628
700 1 _aCuppens, Frederic.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9145629
700 1 _aCuppens-Boulahia, Nora.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9145630
700 1 _aMiri, Ali.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9145631
700 1 _aTawbi, Nadia.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9145632
710 2 _aSpringerLink (Online service)
_9145633
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642371189
776 0 8 _iPrinted edition:
_z9783642371202
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v7743
_9145634
856 4 0 _uhttps://doi.org/10.1007/978-3-642-37119-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c93675
_d93675