ICT Systems Security and Privacy Protection: 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers: IFIP Advances in Information and Communication Technology, cartea 679
Editat de Norbert Meyer, Anna Grocholewska-Czuryłoen Limba Engleză Hardback – 24 apr 2024
The 26 full papers included in this book were carefully reviewed and selected from 84 submissions. They focus on topics such as access control and authentication; applied cryptography; mobile security; side-channel attacks; trust management, digital forensics; industry networks security, etc.
Din seria IFIP Advances in Information and Communication Technology
- 20% Preț: 170.50 lei
- 20% Preț: 615.73 lei
- 20% Preț: 330.61 lei
- Preț: 386.07 lei
- 20% Preț: 326.45 lei
- 20% Preț: 331.24 lei
- 20% Preț: 503.40 lei
- 17% Preț: 523.39 lei
- 20% Preț: 502.05 lei
- 17% Preț: 488.95 lei
- 20% Preț: 501.04 lei
- 20% Preț: 403.19 lei
- 20% Preț: 1162.10 lei
- 20% Preț: 1251.24 lei
- 18% Preț: 1191.97 lei
- 20% Preț: 1245.17 lei
- 18% Preț: 1189.03 lei
- 18% Preț: 925.68 lei
- 18% Preț: 925.85 lei
- 18% Preț: 917.87 lei
- 18% Preț: 921.07 lei
- 15% Preț: 626.99 lei
- 18% Preț: 932.56 lei
- 20% Preț: 1251.10 lei
- 20% Preț: 970.01 lei
- 18% Preț: 921.99 lei
- 20% Preț: 1246.94 lei
- 20% Preț: 967.31 lei
- 15% Preț: 627.29 lei
- 20% Preț: 1240.04 lei
- 20% Preț: 1867.66 lei
- 20% Preț: 1249.02 lei
- 18% Preț: 929.23 lei
- 18% Preț: 919.56 lei
- 18% Preț: 1189.20 lei
- 20% Preț: 1241.17 lei
- 18% Preț: 925.68 lei
- 18% Preț: 920.77 lei
- 20% Preț: 1255.40 lei
- 18% Preț: 928.76 lei
- 20% Preț: 627.29 lei
- 18% Preț: 1199.77 lei
- 20% Preț: 1247.57 lei
- 18% Preț: 1195.65 lei
- 20% Preț: 964.59 lei
- 20% Preț: 1251.92 lei
- 20% Preț: 958.83 lei
- 18% Preț: 1780.60 lei
- 20% Preț: 1255.09 lei
Preț: 632.87 lei
Preț vechi: 744.54 lei
-15% Nou
Puncte Express: 949
Preț estimativ în valută:
121.13€ • 126.25$ • 100.84£
121.13€ • 126.25$ • 100.84£
Carte tipărită la comandă
Livrare economică 04-18 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031563256
ISBN-10: 3031563255
Pagini: 550
Ilustrații: XIII, 378 p. 100 illus., 79 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.73 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:Cham, Switzerland
ISBN-10: 3031563255
Pagini: 550
Ilustrații: XIII, 378 p. 100 illus., 79 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.73 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:Cham, Switzerland
Cuprins
Web Content Integrity Tamper-proof websites beyond HTTPS.- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP.- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design.- The Influence of Privacy Concerns on Cryptocurrency Acceptance.- Automated Enrichment of Logical Attack Graphs via Formal Ontologies.- Detecting Web Bots via Mouse Dynamics and Communication Metadata.- Practical Single-Round Secure Wildcard Pattern Matching.- Efficient non-interactive anonymous communication.- PointPuff An Ed25519 Optimization Implementation.- Detecting web tracking at the network layer.- What’s inside a node? Malicious IPFS nodes under the magnifying glass.- Quantum-secure Communication for Trusted Edge Computing with IoT Devices.- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises.- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe.- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network.- Towards An Information Privacy Competency Model for the Usage of Mobile Applications.- SecPassInput: Towards Secure Memory and Password Handling in Web Applications.- Bl0ck Paralyzing 802.11 connections through Block Ack frames.- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates.- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis.- Cyber Key Terrain Identification Using Adjusted PageRank Centrality.- Machine Learning Metrics for Network Datasets Evaluation.- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools.- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection.- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.