𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Information Security Theory and Practice

✍ Scribed by Gerhard P. Hancke, Ernesto Damiani


Publisher
Springer International Publishing
Year
2018
Tongue
English
Leaves
194
Series
Lecture Notes in Computer Science 10741
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017.

The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.

✦ Table of Contents


Front Matter ....Pages I-XII
Front Matter ....Pages 1-1
A Secure and Trusted Channel Protocol for UAVs Fleets (Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-FranΓ§ois Bonnefoi, Amina Cherif, Damien Sauveron et al.)....Pages 3-24
Philanthropy on the Blockchain (Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes)....Pages 25-38
Front Matter ....Pages 39-39
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database (Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello)....Pages 41-55
JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language (Hao Jiang, Ahmed Bouabdallah)....Pages 56-72
Front Matter ....Pages 73-73
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs (Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis)....Pages 75-92
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip (Sebanjila Kevin Bukasa, Ronan Lashermes, Hélène Le Bouder, Jean-Louis Lanet, Axel Legay)....Pages 93-109
Front Matter ....Pages 111-111
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications (Madeline Cheah, Hoang Nga Nguyen, Jeremy Bryans, Siraj A. Shaikh)....Pages 113-129
Examination of a New Defense Mechanism: Honeywords (Ziya Alper Genç, Süleyman Kardaş, Mehmet Sabir Kiraz)....Pages 130-139
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics (Yonas Leguesse, Mark Vella, Joshua Ellul)....Pages 140-152
Front Matter ....Pages 153-153
A More Efficient 1–Checkable Secure Outsourcing Algorithm for Bilinear Maps (Γ–znur Kalkar, Mehmet Sabir Kiraz, Δ°sa Sertkaya, Osmanbey Uzunkol)....Pages 155-164
A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons (Pau Conejero-Alberola, M. Francisca Hinarejos, Josep-LluΓ­s Ferrer-Gomila)....Pages 165-176
Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough? (Nektaria Kaloudi, Aikaterini Mitrokotsa)....Pages 177-188
Back Matter ....Pages 189-189

✦ Subjects


Computer Science; Systems and Data Security; Information Systems Applications (incl.Internet); Special Purpose and Application-Based Systems; Computer Communication Networks; Data Encryption


πŸ“œ SIMILAR VOLUMES


SSL and TLS: Theory and Practice (Inform
✍ Rolf Oppliger πŸ“‚ Library πŸ“… 2009 πŸ› Artech House Publishers 🌐 English

SSL and TLS Theory and Practice is a pick for any college-level computer library strong in Internet security. It provides a basic and thorough introduction to SSL and TLS protocols, covering their design, development, and comparing them to other Internet security protocols. Tips on how to employ the

Information Security : Principles and Pr
✍ Mark Stamp πŸ“‚ Library πŸ“… 2005 🌐 English

Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focus

Information security: principles and pra
✍ Breithaupt, Jim;Merkow, Mark S πŸ“‚ Library πŸ“… 2014 πŸ› Pearson Education Limited (US titles) 🌐 English

Chapter 1: Why Study Information Security? -- Chapter 2: Information Security Principles of Success -- Chapter 3: Certification Programs and the Common Body of Knowledge -- Chapter 4: Governance and Risk Management -- Chapter 5: Security Architecture and Design -- Chapter 6: Business Continuity Plan

Information security: principles and pra
✍ Breithaupt, Jim;Merkow, Mark S πŸ“‚ Library πŸ“… 2014 πŸ› Pearson 🌐 English

Chapter 1: Why Study Information Security? -- Chapter 2: Information Security Principles of Success -- Chapter 3: Certification Programs and the Common Body of Knowledge -- Chapter 4: Governance and Risk Management -- Chapter 5: Security Architecture and Design -- Chapter 6: Business Continuity Plan

Information Security Principles and Prac
✍ Mark Stamp πŸ“‚ Library πŸ“… 2005 πŸ› Wiley-Interscience 🌐 English

Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focus