Description |
1 online resource (381 pages) : illustrations (black and white) |
Series |
Lecture notes in computer science, 0302-9743 ; 7743 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7743.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Cryptography and Information Theory. MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption / Jie Li, Jianliang Zheng -- Proofs of Retrievability via Fountain Code / Sumanta Sarkar, Reihaneh Safavi-Naini -- MARC: Modified ARC4 / Jianliang Zheng, Jie Li -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements / Pawel Chwalinski, Roman Belavkin, Xiaochun Cheng -- Key Management and Cryptographic Protocols. A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes / Khair Eddin Sabri, Ridha Khedri -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities / Hadi Ahmadi, Reihaneh Safavi-Naini -- COMPASS: Authenticated Group Key Agreement from Signcryption / Nick Mailloux, Ali Miri, Monica Nevins |
|
Privacy and Trust. Classifying Online Social Network Users through the Social Graph / Cristina Pérez-Solà, Jordi Herrera-Joancomartí -- A Formal Derivation of Composite Trust / Tim Muller, Patrick Schweitzer -- IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability / Ahmad Al Sa'deh, Hosnieh Rafiee, Christoph Meinel -- Policies and Applications Security. Policy Administration in Tag-Based Authorization / Sandro Etalle [and others] -- Enabling Dynamic Security Policy in the Java Security Manager / Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens -- A Novel Obfuscation: Class Hierarchy Flattening / Christophe Foket [and others] -- RESource: A Framework for Online Matching of Assembly with Open Source Code / Ashkan Rahimian [and others] -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone / Tongbo Luo [and others] |
|
Network and Adaptive Security. Short-Term Linkable Group Signatures with Categorized Batch Verification / Lukas Malina [and others] -- GHUMVEE: Efficient, Effective, and Flexible Replication / Stijn Volckaert [and others] -- Extracting Attack Scenarios Using Intrusion Semantics / Sherif Saad, Issa Traore -- On Securely Manipulating XML Data / Houari Mahfoud, Abdessamad Imine -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks / Isaac Woungang [and others] -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs / Tahsin Arafat Reza, Michel Barbeau -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC / Colin O'Flynn, Zhizhang Chen -- Short Papers. Towards Modelling Adaptive Attacker's Behaviour / Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin -- Scalable Deniable Group Key Establishment / Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona -- Information-Theoretic Foundations of Differential Privacy / Darakhshan J. Mir |
Summary |
This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security |
Analysis |
Computer science |
|
Software engineering |
|
Computer vision |
|
Information systems |
|
Management information systems |
|
Information Systems Applications (incl. Internet) |
|
Computer Appl. in Administrative Data Processing |
|
Management of Computing and Information Systems |
Notes |
Includes author index |
|
Print version record |
Subject |
Computer security -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Access control -- Congresses.
|
|
Computer security.
|
|
Computer networks.
|
|
Computer Security
|
|
Computer Communication Networks
|
|
Computer networks
|
|
Computer networks -- Access control
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Garcia-Alfaro, Joaquin, editor
|
|
Cuppens, Frédéric, editor
|
|
Cuppens-Boulahia, Nora, editor
|
|
Miri, Ali, editor
|
|
Tawbi, Nadia, editor
|
ISBN |
9783642371196 |
|
3642371191 |
|