Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Secure IT Systems = 25th Nordic Conf...
~
Nadjm-Tehrani, Simin.
Secure IT Systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Secure IT Systems/ edited by Mikael Asplund, Simin Nadjm-Tehrani.
Reminder of title:
25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /
other author:
Asplund, Mikael.
Description:
XII, 263 p. 60 illus., 33 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-3-030-70852-8
ISBN:
9783030708528
Secure IT Systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /
Secure IT Systems
25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /[electronic resource] :edited by Mikael Asplund, Simin Nadjm-Tehrani. - 1st ed. 2021. - XII, 263 p. 60 illus., 33 illus. in color.online resource. - Security and Cryptology ;12556. - Security and Cryptology ;9241.
Malware and attacks -- Persistence in Linux-Based IoT Malware -- Real-time triggering of Android memory dumps for stealthy attack investigation -- Using Features of Encrypted Network Traffic to Detect Malware -- Formal analysis -- Machine-checking the universal verifiability of ElectionGuard -- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures -- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme -- Applied cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms and training -- HoneyHash: Honeyword Generation Based on Transformed Hashes -- Agent-based File Extraction Using Virtual Machine Introspection -- Cyber range automation overview with a case study of CRATE -- Applications and privacy -- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU -- OnLITE: On-line Label for IoT Transparency Enhancement -- An Investigation of Comic-Based Permission Requests.
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linköping University, Sweden, and held online during November 23-24, 2020. The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
ISBN: 9783030708528
Standard No.: 10.1007/978-3-030-70852-8doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Secure IT Systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /
LDR
:03132nam a22004215i 4500
001
1046462
003
DE-He213
005
20210826131232.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030708528
$9
978-3-030-70852-8
024
7
$a
10.1007/978-3-030-70852-8
$2
doi
035
$a
978-3-030-70852-8
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Secure IT Systems
$h
[electronic resource] :
$b
25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /
$c
edited by Mikael Asplund, Simin Nadjm-Tehrani.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XII, 263 p. 60 illus., 33 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
12556
505
0
$a
Malware and attacks -- Persistence in Linux-Based IoT Malware -- Real-time triggering of Android memory dumps for stealthy attack investigation -- Using Features of Encrypted Network Traffic to Detect Malware -- Formal analysis -- Machine-checking the universal verifiability of ElectionGuard -- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures -- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme -- Applied cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms and training -- HoneyHash: Honeyword Generation Based on Transformed Hashes -- Agent-based File Extraction Using Virtual Machine Introspection -- Cyber range automation overview with a case study of CRATE -- Applications and privacy -- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU -- OnLITE: On-line Label for IoT Transparency Enhancement -- An Investigation of Comic-Based Permission Requests.
520
$a
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linköping University, Sweden, and held online during November 23-24, 2020. The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
650
0
$a
Computer security.
$3
557122
650
0
$a
Application software.
$3
528147
650
0
$a
Computers.
$3
565115
650
0
$a
Law and legislation.
$3
1069250
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Legal Aspects of Computing.
$3
669901
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Mobile and Network Security.
$3
1211619
700
1
$a
Asplund, Mikael.
$e
editor.
$1
https://orcid.org/0000-0003-1916-3398
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1350007
700
1
$a
Nadjm-Tehrani, Simin.
$e
editor.
$1
https://orcid.org/0000-0002-1485-0802
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1323248
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030708511
776
0 8
$i
Printed edition:
$z
9783030708535
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-70852-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login