TEST - Catálogo BURRF
   

Foundations and practice of security : 6th international symposium, fps 2013, la rochelle, france, october 21-22, 2013, revised selected papers / edited by Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood.

Colaborador(es): Tipo de material: TextoTextoSeries Lecture Notes in Computer Science ; 8352Editor: Cham : Springer International Publishing : Springer, 2014Descripción: xiii, 444 páginas : 134 ilustracionesTipo de contenido:
  • texto
Tipo de medio:
  • computadora
Tipo de portador:
  • recurso en línea
ISBN:
  • 9783319053028
Formatos físicos adicionales: Edición impresa:: Sin títuloClasificación LoC:
  • QA76.9.A25
Recursos en línea:
Contenidos:
On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange -- Model-Based Specification and Validation of Security and Dependability Patterns -- Enforcing Information Flow by Combining Static and Dynamic Analysis -- Fault Injection to Reverse Engineer DES-like Cryptosystems -- Software Camouflage -- Investigation of Parameters Influencing the Success of Optical Fault Attacks -- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework -- Quantitative Evaluation of Enforcement Strategies -- Collusion Resistant Inference Control for Cadastral Databases -- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model -- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations -- Computational Soundness of Symbolic Blind Signatures under Active Attacker -- Improved Davies-Murphys Attack on DES Revisited -- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts -- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs -- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks -- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs -- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation -- Evaluation of Software-Oriented Block Ciphers on Smartphones -- Don’t Push it: Breaking iButton Security -- Discovering Flaws in IDS through Analysis of their Inputs -- On the Reverse Engineering of the Citadel Botnet -- The Carna Botnet Through the Lens of a Network Telescope.
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Springer eBooks

On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange -- Model-Based Specification and Validation of Security and Dependability Patterns -- Enforcing Information Flow by Combining Static and Dynamic Analysis -- Fault Injection to Reverse Engineer DES-like Cryptosystems -- Software Camouflage -- Investigation of Parameters Influencing the Success of Optical Fault Attacks -- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework -- Quantitative Evaluation of Enforcement Strategies -- Collusion Resistant Inference Control for Cadastral Databases -- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model -- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations -- Computational Soundness of Symbolic Blind Signatures under Active Attacker -- Improved Davies-Murphys Attack on DES Revisited -- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts -- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs -- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks -- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs -- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation -- Evaluation of Software-Oriented Block Ciphers on Smartphones -- Don’t Push it: Breaking iButton Security -- Discovering Flaws in IDS through Analysis of their Inputs -- On the Reverse Engineering of the Citadel Botnet -- The Carna Botnet Through the Lens of a Network Telescope.

Para consulta fuera de la UANL se requiere clave de acceso remoto.

Universidad Autónoma de Nuevo León
Secretaría de Extensión y Cultura - Dirección de Bibliotecas @
Soportado en Koha