SSL and TLS Theory and Practice is a pick for any college-level computer library strong in Internet security. It provides a basic and thorough introduction to SSL and TLS protocols, covering their design, development, and comparing them to other Internet security protocols. Tips on how to employ the
Information Security Theory and Practice
β Scribed by Gerhard P. Hancke, Ernesto Damiani
- Publisher
- Springer International Publishing
- Year
- 2018
- Tongue
- English
- Leaves
- 194
- Series
- Lecture Notes in Computer Science 10741
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017.
The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.β¦ Table of Contents
Front Matter ....Pages I-XII
Front Matter ....Pages 1-1
A Secure and Trusted Channel Protocol for UAVs Fleets (Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-FranΓ§ois Bonnefoi, Amina Cherif, Damien Sauveron et al.)....Pages 3-24
Philanthropy on the Blockchain (Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes)....Pages 25-38
Front Matter ....Pages 39-39
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database (Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello)....Pages 41-55
JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language (Hao Jiang, Ahmed Bouabdallah)....Pages 56-72
Front Matter ....Pages 73-73
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs (Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis)....Pages 75-92
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip (Sebanjila Kevin Bukasa, Ronan Lashermes, Hélène Le Bouder, Jean-Louis Lanet, Axel Legay)....Pages 93-109
Front Matter ....Pages 111-111
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications (Madeline Cheah, Hoang Nga Nguyen, Jeremy Bryans, Siraj A. Shaikh)....Pages 113-129
Examination of a New Defense Mechanism: Honeywords (Ziya Alper GenΓ§, SΓΌleyman KardaΕ, Mehmet Sabir Kiraz)....Pages 130-139
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics (Yonas Leguesse, Mark Vella, Joshua Ellul)....Pages 140-152
Front Matter ....Pages 153-153
A More Efficient 1βCheckable Secure Outsourcing Algorithm for Bilinear Maps (Γznur Kalkar, Mehmet Sabir Kiraz, Δ°sa Sertkaya, Osmanbey Uzunkol)....Pages 155-164
A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons (Pau Conejero-Alberola, M. Francisca Hinarejos, Josep-LluΓs Ferrer-Gomila)....Pages 165-176
Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough? (Nektaria Kaloudi, Aikaterini Mitrokotsa)....Pages 177-188
Back Matter ....Pages 189-189
β¦ Subjects
Computer Science; Systems and Data Security; Information Systems Applications (incl.Internet); Special Purpose and Application-Based Systems; Computer Communication Networks; Data Encryption
π SIMILAR VOLUMES
Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focus
Chapter 1: Why Study Information Security? -- Chapter 2: Information Security Principles of Success -- Chapter 3: Certification Programs and the Common Body of Knowledge -- Chapter 4: Governance and Risk Management -- Chapter 5: Security Architecture and Design -- Chapter 6: Business Continuity Plan
Chapter 1: Why Study Information Security? -- Chapter 2: Information Security Principles of Success -- Chapter 3: Certification Programs and the Common Body of Knowledge -- Chapter 4: Governance and Risk Management -- Chapter 5: Security Architecture and Design -- Chapter 6: Business Continuity Plan
Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focus