Limitar la búsqueda a ejemplares disponibles

Cubierta del libro

Título Information Security Theory and Practice. Securing the Internet of Things [electronic resource] : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 ́㠊uly 2, 2014. Proceedings / edited by David Naccache, Damien Sauveron.

Descripción física XVIII, 201 p. 47 illus. online resource.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Colección Lecture Notes in Computer Science, 0302-9743 ; 8501
Lecture Notes in Computer Science, 0302-9743 ; 8501
       Mostrar referencias similares
Springer eBooks. Computer Science
       Mostrar referencias similares
Contiene: Sweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations -- Towards More Practical Time-Driven Cache Attacks -- Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Built in Protection against Side-Channel and Fault Attacks -- New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards -- A Pre-processing Composition for Secret Key Recovery on Android Smartphone -- Usable Privacy for Mobile Sensing Applications -- A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection -- End-to-End Secure and Privacy Preserving Mobile Chat Application -- S-box, SET, Match: A Toolbox for S-box Analysis -- Policy-Based Access Control for Body Sensor Networks -- Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider -- CAN Bus Risk Analysis Revisit -- AU2EU: Privacy-Preserving Matching of DNA Sequences -- Early DDoS Detection Based on Data Mining Techniques.
Resumen: This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.
Materia Computer science.
Computer organization.
Computer security.
Data encryption (Computer science).
Computer Science.
       Mostrar referencias similares
Systems and Data Security.
       Mostrar referencias similares
Data Encryption.
       Mostrar referencias similares
Computer Systems Organization and Communication Networks.
       Mostrar referencias similares
Autor secundario Naccache, David., editor.
Sauveron, Damien., editor.
SpringerLink (Online service)
En Springer eBooks
OTRO SOPORTE Printed edition: 9783662438251
ISBN 9783662438268 978-3-662-43826-8
ISBN/ISSN 10.1007/978-3-662-43826-8 doi