Buch, Englisch, Band 15235, 153 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 260 g
20th International Workshop, STM 2024, Bydgoszcz, Poland, September 19-20, 2024, Proceedings
Buch, Englisch, Band 15235, 153 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 260 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-76370-0
Verlag: Springer Nature Switzerland
This book constitutes the refereed proceedings of the 20th International Workshop on Security and Trust Management (ERCIM STM 2024), held in Bydgoszcz, Poland, during September 19–20, 2024 and co-located with ESORICS 2024 conference.
The 6 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 22 submissions.
They were organized in topical sections as follows: Trust, Anonymity and Identity; Cryptography, Secure Computation and Formal Methods; Operating Systems and Application Security.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Wissensbasierte Systeme, Expertensysteme
- Mathematik | Informatik EDV | Informatik Angewandte Informatik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Data Mining
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
Weitere Infos & Material
.- Trust, Anonymity and Identity.
.- DrATC: Dynamic routing Algorithm based on Trust Characteristics.
.- Distributed Dynamic Self-Control Anonymity Management Model.
.- Machines Have Identities Too! Extending NIST’s SP 800-63 for Device Identity.
.- Cryptography, Secure Computation and Formal Methods.
.- On ß-separating sets and deterministic factoring.
.- Statistically secure multiparty computation of a biased coin.
.- A Formal Approach For Modelling And Analysing Surgical Procedures.
.- Operating Systems and Application Security.
.- Flexible and Secure Process Confinement with eBPF.
.- Dynamic Analysis for Explainable Fine-grained Android Malware Detection.
.- A portable research honeypot for corporate network.
.- Unleashing AI in Ethical Hacking.