ICT Systems Security and Privacy Protection: 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers: IFIP Advances in Information and Communication Technology, cartea 679
Editat de Norbert Meyer, Anna Grocholewska-Czuryłoen Limba Engleză Hardback – 24 apr 2024
The 26 full papers included in this book were carefully reviewed and selected from 84 submissions. They focus on topics such as access control and authentication; applied cryptography; mobile security; side-channel attacks; trust management, digital forensics; industry networks security, etc.
Din seria IFIP Advances in Information and Communication Technology
- 20% Preț: 170.51 lei
- 20% Preț: 615.74 lei
- 20% Preț: 337.82 lei
- Preț: 394.46 lei
- 20% Preț: 333.55 lei
- 20% Preț: 338.47 lei
- 20% Preț: 503.41 lei
- 17% Preț: 523.40 lei
- 20% Preț: 502.06 lei
- 17% Preț: 488.96 lei
- 20% Preț: 501.04 lei
- 20% Preț: 403.20 lei
- 15% Preț: 703.62 lei
- 20% Preț: 1162.12 lei
- 20% Preț: 1278.74 lei
- 18% Preț: 1218.16 lei
- 20% Preț: 1272.54 lei
- 18% Preț: 1215.15 lei
- 18% Preț: 946.01 lei
- 18% Preț: 946.17 lei
- 18% Preț: 938.03 lei
- 18% Preț: 941.30 lei
- 15% Preț: 640.72 lei
- 18% Preț: 953.04 lei
- 20% Preț: 1278.59 lei
- 20% Preț: 991.33 lei
- 18% Preț: 942.24 lei
- 20% Preț: 1274.33 lei
- 20% Preț: 988.55 lei
- 15% Preț: 641.03 lei
- 20% Preț: 1267.30 lei
- 20% Preț: 1908.77 lei
- 20% Preț: 1276.46 lei
- 18% Preț: 949.62 lei
- 18% Preț: 939.75 lei
- 18% Preț: 1215.32 lei
- 20% Preț: 1268.45 lei
- 18% Preț: 946.01 lei
- 18% Preț: 940.99 lei
- 20% Preț: 1283.00 lei
- 18% Preț: 949.14 lei
- 20% Preț: 641.03 lei
- 18% Preț: 1226.14 lei
- 20% Preț: 1274.98 lei
- 18% Preț: 1221.92 lei
- 20% Preț: 985.77 lei
- 20% Preț: 1279.43 lei
- 20% Preț: 979.88 lei
- 18% Preț: 1819.79 lei
Preț: 651.86 lei
Preț vechi: 814.83 lei
-20% Nou
Puncte Express: 978
Preț estimativ în valută:
124.84€ • 128.62$ • 104.58£
124.84€ • 128.62$ • 104.58£
Carte tipărită la comandă
Livrare economică 22 februarie-08 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031563256
ISBN-10: 3031563255
Pagini: 550
Ilustrații: XIII, 378 p. 100 illus., 79 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.73 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:Cham, Switzerland
ISBN-10: 3031563255
Pagini: 550
Ilustrații: XIII, 378 p. 100 illus., 79 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.73 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:Cham, Switzerland
Cuprins
Web Content Integrity Tamper-proof websites beyond HTTPS.- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP.- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design.- The Influence of Privacy Concerns on Cryptocurrency Acceptance.- Automated Enrichment of Logical Attack Graphs via Formal Ontologies.- Detecting Web Bots via Mouse Dynamics and Communication Metadata.- Practical Single-Round Secure Wildcard Pattern Matching.- Efficient non-interactive anonymous communication.- PointPuff An Ed25519 Optimization Implementation.- Detecting web tracking at the network layer.- What’s inside a node? Malicious IPFS nodes under the magnifying glass.- Quantum-secure Communication for Trusted Edge Computing with IoT Devices.- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises.- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe.- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network.- Towards An Information Privacy Competency Model for the Usage of Mobile Applications.- SecPassInput: Towards Secure Memory and Password Handling in Web Applications.- Bl0ck Paralyzing 802.11 connections through Block Ack frames.- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates.- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis.- Cyber Key Terrain Identification Using Adjusted PageRank Centrality.- Machine Learning Metrics for Network Datasets Evaluation.- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools.- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection.- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.