Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers /

This book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Rochelle, France, in October 2013. The 25 revised full papers presented together with a keynote address were carefully reviewed and selected from 65 submis...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Danger, Jean Luc (Επιμελητής έκδοσης), Debbabi, Mourad (Επιμελητής έκδοσης), Marion, Jean-Yves (Επιμελητής έκδοσης), Garcia-Alfaro, Joaquin (Επιμελητής έκδοσης), Zincir Heywood, Nur (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2014.
Σειρά:Lecture Notes in Computer Science, 8352
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case
  • On the Feasibility of a Censorship Resistant Decentralized Naming System
  • A General Framework for Group Authentication and Key Exchange Protocols
  • Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange
  • Model-Based Specification and Validation of Security and Dependability Patterns
  • Enforcing Information Flow by Combining Static and Dynamic Analysis
  • Fault Injection to Reverse Engineer DES-like Cryptosystems
  • Software Camouflage
  • Investigation of Parameters Influencing the Success of Optical Fault Attacks
  • ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework
  • Quantitative Evaluation of Enforcement Strategies
  • Collusion Resistant Inference Control for Cadastral Databases
  • Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model
  • Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations
  • Computational Soundness of Symbolic Blind Signatures under Active Attacker
  • Improved Davies-Murphys Attack on DES Revisited
  • Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts
  • A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs
  • A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks
  • On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs
  • CheR: Cheating Resilience in the Cloud via Smart Resource Allocation
  • Evaluation of Software-Oriented Block Ciphers on Smartphones
  • Don’t Push it: Breaking iButton Security
  • Discovering Flaws in IDS through Analysis of their Inputs
  • On the Reverse Engineering of the Citadel Botnet
  • The Carna Botnet Through the Lens of a Network Telescope.