E-Book, Englisch, Band 12556, 263 Seiten, eBook
Asplund / Nadjm-Tehrani Secure IT Systems
1. Auflage 2021
ISBN: 978-3-030-70852-8
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings
E-Book, Englisch, Band 12556, 263 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-030-70852-8
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Malware and attacks.- Persistence in Linux-Based IoT Malware.- Real-time triggering of Android memory dumps for stealthy attack investigation.- Using Features of Encrypted Network Traffic to Detect Malware.- Formal analysis.- Machine-checking the universal verifiability of ElectionGuard.- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures.- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme.- Applied cryptography.- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption.- TLV-to-MUC Express: Post-quantum MACsec in VXLAN.- On the Certi cate Revocation Problem in the Maritime Sector.- Security mechanisms and training.- HoneyHash: Honeyword Generation Based on Transformed Hashes.- Agent-based File Extraction Using Virtual Machine Introspection.- Cyber range automation overview with a case study of CRATE.- Applications and privacy.- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU.- OnLITE: On-line Label for IoT Transparency Enhancement.- An Investigation of Comic-Based Permission Requests.