Cantitate/Preț
Produs

Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings: Lecture Notes in Computer Science, cartea 8735

Editat de Bart De Decker, André Zúquete
en Limba Engleză Paperback – 5 sep 2014
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014.
The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 26936 lei

Preț vechi: 33669 lei
-20% Nou

Puncte Express: 404

Preț estimativ în valută:
5156 5417$ 4333£

Carte tipărită la comandă

Livrare economică 11-25 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783662448847
ISBN-10: 366244884X
Pagini: 169
Ilustrații: XII, 157 p. 37 illus.
Dimensiuni: 155 x 235 x 13 mm
Greutate: 0.25 kg
Ediția:2014
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Malicious MPLS Policy Engine Reconnaissance.- USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizations.- Free Typed Text Using Keystroke Dynamics for Continuous Authentication.- Secure Storage on Android with Context-Aware Access Control.- A Study on Advanced Persistent Threats.- Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems.- Touchpad Input for Continuous Biometric Authentication.- A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption.- D–Shuffle for Prêt à Voter.- An Approach to Information Security Policy Modeling for Enterprise Networks.- Introduction to Attribute Based Searchable Encryption.- Risk Analysis of Physically Unclonable Functions.- Decentralized Bootstrap for Social Overlay Networks.- Enhancing Privacy with Quantum Networks.- The Fundamental Principle of BreachPrevention.