000 03557nam a22003855i 4500
001 317156
003 MX-SnUAN
005 20160429161013.0
007 cr nn 008mamaa
008 160108s2014 gw | s |||| 0|eng d
020 _a9783319053028
_9978-3-319-05302-8
035 _avtls000416748
039 9 _y201601081123
_zstaff
050 4 _aQA76.9.A25
245 1 0 _aFoundations and practice of security :
_b6th international symposium, fps 2013, la rochelle, france, october 21-22, 2013, revised selected papers /
_cedited by Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood.
264 1 _aCham :
_bSpringer International Publishing :
_bSpringer,
_c2014.
300 _axiii, 444 páginas :
_b134 ilustraciones
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8352
500 _aSpringer eBooks
505 0 _aOn the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange -- Model-Based Specification and Validation of Security and Dependability Patterns -- Enforcing Information Flow by Combining Static and Dynamic Analysis -- Fault Injection to Reverse Engineer DES-like Cryptosystems -- Software Camouflage -- Investigation of Parameters Influencing the Success of Optical Fault Attacks -- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework -- Quantitative Evaluation of Enforcement Strategies -- Collusion Resistant Inference Control for Cadastral Databases -- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model -- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations -- Computational Soundness of Symbolic Blind Signatures under Active Attacker -- Improved Davies-Murphys Attack on DES Revisited -- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts -- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs -- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks -- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs -- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation -- Evaluation of Software-Oriented Block Ciphers on Smartphones -- Don’t Push it: Breaking iButton Security -- Discovering Flaws in IDS through Analysis of their Inputs -- On the Reverse Engineering of the Citadel Botnet -- The Carna Botnet Through the Lens of a Network Telescope.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aDanger, Jean Luc,
_eeditor.
_9353148
700 1 _aDebbabi, Mourad,
_eeditor.
_9322975
700 1 _aMarion, Jean-Yves,
_eeditor.
_9360594
700 1 _aGarcia-Alfaro, Joaquin,
_eeditor.
_9338720
700 1 _aZincir Heywood, Nur,
_eeditor.
_9360595
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783319053011
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-319-05302-8
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c317156
_d317156