000 | 03557nam a22003855i 4500 | ||
---|---|---|---|
001 | 317156 | ||
003 | MX-SnUAN | ||
005 | 20160429161013.0 | ||
007 | cr nn 008mamaa | ||
008 | 160108s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319053028 _9978-3-319-05302-8 |
||
035 | _avtls000416748 | ||
039 | 9 |
_y201601081123 _zstaff |
|
050 | 4 | _aQA76.9.A25 | |
245 | 1 | 0 |
_aFoundations and practice of security : _b6th international symposium, fps 2013, la rochelle, france, october 21-22, 2013, revised selected papers / _cedited by Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bSpringer, _c2014. |
|
300 |
_axiii, 444 páginas : _b134 ilustraciones |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8352 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aOn the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange -- Model-Based Specification and Validation of Security and Dependability Patterns -- Enforcing Information Flow by Combining Static and Dynamic Analysis -- Fault Injection to Reverse Engineer DES-like Cryptosystems -- Software Camouflage -- Investigation of Parameters Influencing the Success of Optical Fault Attacks -- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework -- Quantitative Evaluation of Enforcement Strategies -- Collusion Resistant Inference Control for Cadastral Databases -- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model -- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations -- Computational Soundness of Symbolic Blind Signatures under Active Attacker -- Improved Davies-Murphys Attack on DES Revisited -- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts -- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs -- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks -- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs -- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation -- Evaluation of Software-Oriented Block Ciphers on Smartphones -- Don’t Push it: Breaking iButton Security -- Discovering Flaws in IDS through Analysis of their Inputs -- On the Reverse Engineering of the Citadel Botnet -- The Carna Botnet Through the Lens of a Network Telescope. | |
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aDanger, Jean Luc, _eeditor. _9353148 |
|
700 | 1 |
_aDebbabi, Mourad, _eeditor. _9322975 |
|
700 | 1 |
_aMarion, Jean-Yves, _eeditor. _9360594 |
|
700 | 1 |
_aGarcia-Alfaro, Joaquin, _eeditor. _9338720 |
|
700 | 1 |
_aZincir Heywood, Nur, _eeditor. _9360595 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783319053011 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-319-05302-8 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c317156 _d317156 |