Description |
1 online resource (xiv, 686 pages) |
Series |
Lecture notes in computer science ; 6879 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 6879.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Machine generated contents note: Wireless Security -- Secure Localization Using Dynamic Verifiers / Majid Ghaderi -- WiFiHop -- Mitigating the Evil Twin Attack through Multi-hop Detection / Carlos Ribeiro -- Investigation of Signal and Message Manipulations on the Wireless Channel / Srdjan Capkun -- Web Security I -- Protecting Private Web Content from Embedded Scripts / David Evans -- Preventing Web Application Injections with Complementary Character Coding / Phyllis Frankl -- Automatic and Precise Client-Side Protection against CSRF Attacks / Frank Piessens -- Web Security II -- Timing Is Everything: The Importance of History Detection / Gunnar Kreitz -- Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs / John C. Mitchell -- Systematic Analysis of XSS Sanitization in Web Application Frameworks / Dawn Song -- Forensics, Biometrics and Software Protection -- ̂ Who Wrote This Code? Identifying the Authors of Program Binaries / Barton P. Miller -- Secure and Efficient Protocols for Iris and Fingerprint Identification / Paolo Gasti -- Linear Obfuscation to Combat Symbolic Execution / Debin Gao -- DriverGuard: A Fine-Grained Protection on I/O Flows / Robert H. Deng -- Access Control -- Time-Storage Trade-Offs for Cryptographically-Enforced Access Control / Jason Crampton -- Socially Constructed Trust for Distributed Authorization / Valerio Genovese -- Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles / Tsz Hon Yuen -- Cryptography and Protocol Analysis -- How to Aggregate the CL Signature Scheme / Dominique Schroder -- Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2 / Cas Cremers -- Adapting Helios for Provable Ballot Privacy / Bogdan Warinschi -- Information Flow, Side Channels, and Vulnerability Analysis -- ̂ Remote Timing Attacks Are Still Practical / Nicola Tuveri |
|
Note continued: Multi-run Security / Andrei Sabelfeld -- Automated Information Flow Analysis of Virtualized Infrastructures / Konrad Eriksson -- Scalable Analysis of Attack Scenarios / V.S. Subrahmanian -- Usability, Ttrust, and Economics of Security and Privacy -- Usability of Display-Equipped RFID Tags for Security Purposes / Ersin Uzun -- Forcing Johnny to Login Safely: Long-Term User Study of Forcing and Training Login Mechanisms / Ronen Margulies -- Towards a Mechanism for Incentivating Privacy / Luigi Sauro -- Investigating the OpenPGP Web of Trust / Georg Carle -- Privacy I -- Practical Complexity-Theoretic Analysis of Mix Systems / Dogan Kesdogan -- Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds / Daji Qiao -- Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective / Jean-Pierre Hubaux -- Privacy II -- New RFID Privacy Model / Bart Preneel -- Quantitative Information Flow, with a View / Michela Paolini -- To Release Or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data / Xiao Feng Wang -- Privacy III -- Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing / Ting Yu -- Supporting Concurrency in Private Data Outsourcing / Pierangela Samarati -- Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods / Christopher Piosecny |
Summary |
Annotation The 36 papers are organized in topical sections on wireless security; Web security; forensics, biometrics and software protection; access control; cryptography and protocol analysis; information flow, side channels, and vulnerability analysis; usability, trust, and economics of security and privacy; and privacy |
Bibliography |
Includes bibliographical references and author index |
In |
Springer eBooks |
Subject |
Computer security -- Congresses
|
|
Informatique.
|
|
Computer security
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Atluri, Vijay, 1956-
|
|
Diaz, Claudia (Assistant professor in Computer Security and Industrial Cryptography)
|
ISBN |
9783642238222 |
|
364223822X |
|