Ict Systems Security And Privacy Protection: 31st Ifip Tc 11 International Conference, Sec 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedi by Jaap-Henk HoepmanIct Systems Security And Privacy Protection: 31st Ifip Tc 11 International Conference, Sec 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedi by Jaap-Henk Hoepman

Ict Systems Security And Privacy Protection: 31st Ifip Tc 11 International Conference, Sec 2016…

byJaap-Henk HoepmanEditorStefan Katzenbeisser

Hardcover | May 11, 2016

Pricing and Purchase Info

$170.50 online 
$180.95 list price save 5%
Earn 853 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

Title:Ict Systems Security And Privacy Protection: 31st Ifip Tc 11 International Conference, Sec 2016…Format:HardcoverDimensions:414 pages, 23.5 × 15.5 × 0.25 inPublished:May 11, 2016Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3319336290

ISBN - 13:9783319336299

Look for similar items by category:

Reviews

Table of Contents

Coercion-Resistant Proxy Voting.- A Posteriori Openable Public Key Encryption.-Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid.- Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research.- Evaluating CVSS Base Score Using Vulnerability Rewards Programs.- Defining Objectives For Preventing Cyberstalking.- Using Process Invariants to Detect Cyber Attacks on a Water Treatment System.- Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud.- Software Defined Networking Reactive Stateful Firewall.- Teaching Phishing-Security: Which Way is Best?.- On Gender Specific Perception of Data Sharing in Japan.- TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.- SybilRadar: A Graph-Structure Based Framework for Sybil Detection in Online Social Networks.- 
Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence.- Automated Source Code Instrumentation for Verifying Potential Vulnerabilities.- An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities.- Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Scanners.- A Utility-Based Reputation Model for the Internet of Things.- Advanced Remote Firmware Upgrades Using TPM 2.0.- RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks.- Uncertain? No, it's Very Certain! Recovering the Key from Guessing Entropy Enhanced CPA.- 
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware.- NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries.- A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor.- Deducing User Presence from Inter-Message Intervals in Home Automation Systems.- Privacy by Design Principles in Design of New Generation Cognitive
Assistive Technologies.- A Trustless Privacy-Preserving Reputation System.