Communications and Multimedia Security, 2014 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings Security and Cryptology Series
Coordonnateurs : De Decker Bart, Zúquete André
The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security.
Malicious MPLS Policy Engine Reconnaissance.- USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizations.- Free Typed Text Using Keystroke Dynamics for Continuous Authentication.- Secure Storage on Android with Context-Aware Access Control.- A Study on Advanced Persistent Threats.- Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems.- Touchpad Input for Continuous Biometric Authentication.- A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption.- D–Shuffle for Prêt à Voter.- An Approach to Information Security Policy Modeling for Enterprise Networks.- Introduction to Attribute Based Searchable Encryption.- Risk Analysis of Physically Unclonable Functions.- Decentralized Bootstrap for Social Overlay Networks.- Enhancing Privacy with Quantum Networks.- The Fundamental Principle of Breach Prevention.
Date de parution : 09-2014
Ouvrage de 157 p.
15.5x23.5 cm
Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).
Prix indicatif 42,20 €
Ajouter au panierThème de Communications and Multimedia Security :
Mots-clés :
access control; cloud computing; data encryption; electronic commerce; malware; multimedia information systems; network-level security and protection; program verification; protection; public key cryptography; public policy issues; quality of service; real-time networks; robustnes; security; social networks; software verification; trustworthy software