ICT Systems Security and Privacy Protection: 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers: IFIP Advances in Information and Communication Technology, cartea 679
Editat de Norbert Meyer, Anna Grocholewska-Czuryłoen Limba Engleză Hardback – 24 apr 2024
The 26 full papers included in this book were carefully reviewed and selected from 84 submissions. They focus on topics such as access control and authentication; applied cryptography; mobile security; side-channel attacks; trust management, digital forensics; industry networks security, etc.
Din seria IFIP Advances in Information and Communication Technology
- 20% Preț: 170.51 lei
- 20% Preț: 615.74 lei
- 20% Preț: 340.32 lei
- Preț: 397.38 lei
- 20% Preț: 336.02 lei
- 20% Preț: 340.98 lei
- 20% Preț: 503.41 lei
- 17% Preț: 523.40 lei
- 20% Preț: 502.06 lei
- 17% Preț: 488.96 lei
- 20% Preț: 501.04 lei
- 20% Preț: 403.20 lei
- 20% Preț: 2194.47 lei
- 15% Preț: 708.83 lei
- 20% Preț: 1159.62 lei
- 20% Preț: 1288.25 lei
- 18% Preț: 1227.21 lei
- 20% Preț: 1282.00 lei
- 18% Preț: 1224.18 lei
- 18% Preț: 953.03 lei
- 18% Preț: 953.20 lei
- 18% Preț: 944.99 lei
- 18% Preț: 948.29 lei
- 15% Preț: 645.47 lei
- 18% Preț: 960.13 lei
- 20% Preț: 1288.11 lei
- 15% Preț: 645.79 lei
- 20% Preț: 1271.10 lei
- 20% Preț: 1922.99 lei
- 20% Preț: 1285.97 lei
- 18% Preț: 956.69 lei
- 18% Preț: 946.72 lei
- 18% Preț: 1224.36 lei
- 20% Preț: 1277.89 lei
- 18% Preț: 953.03 lei
- 18% Preț: 947.98 lei
- 20% Preț: 1292.54 lei
- 18% Preț: 956.18 lei
- 20% Preț: 645.79 lei
- 20% Preț: 1284.47 lei
- 18% Preț: 1235.25 lei
- 20% Preț: 998.70 lei
- 18% Preț: 949.23 lei
- 20% Preț: 1283.81 lei
- 20% Preț: 995.89 lei
- 18% Preț: 1231.01 lei
- 20% Preț: 993.09 lei
- 20% Preț: 1288.94 lei
- 20% Preț: 987.17 lei
Preț: 770.53 lei
Preț vechi: 963.17 lei
-20% Nou
Puncte Express: 1156
Preț estimativ în valută:
147.44€ • 154.26$ • 122.48£
147.44€ • 154.26$ • 122.48£
Carte tipărită la comandă
Livrare economică 03-17 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031563256
ISBN-10: 3031563255
Pagini: 550
Ilustrații: XIII, 378 p. 100 illus., 79 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.73 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:Cham, Switzerland
ISBN-10: 3031563255
Pagini: 550
Ilustrații: XIII, 378 p. 100 illus., 79 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.73 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:Cham, Switzerland
Cuprins
Web Content Integrity Tamper-proof websites beyond HTTPS.- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP.- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design.- The Influence of Privacy Concerns on Cryptocurrency Acceptance.- Automated Enrichment of Logical Attack Graphs via Formal Ontologies.- Detecting Web Bots via Mouse Dynamics and Communication Metadata.- Practical Single-Round Secure Wildcard Pattern Matching.- Efficient non-interactive anonymous communication.- PointPuff An Ed25519 Optimization Implementation.- Detecting web tracking at the network layer.- What’s inside a node? Malicious IPFS nodes under the magnifying glass.- Quantum-secure Communication for Trusted Edge Computing with IoT Devices.- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises.- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe.- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network.- Towards An Information Privacy Competency Model for the Usage of Mobile Applications.- SecPassInput: Towards Secure Memory and Password Handling in Web Applications.- Bl0ck Paralyzing 802.11 connections through Block Ack frames.- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates.- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis.- Cyber Key Terrain Identification Using Adjusted PageRank Centrality.- Machine Learning Metrics for Network Datasets Evaluation.- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools.- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection.- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.