語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Secure IT Systems = 25th Nordic Conf...
~
Nadjm-Tehrani, Simin.
Secure IT Systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Secure IT Systems/ edited by Mikael Asplund, Simin Nadjm-Tehrani.
其他題名:
25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /
其他作者:
Nadjm-Tehrani, Simin.
面頁冊數:
XII, 263 p. 60 illus., 33 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Mobile and Network Security. -
電子資源:
https://doi.org/10.1007/978-3-030-70852-8
ISBN:
9783030708528
Secure IT Systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /
Secure IT Systems
25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /[electronic resource] :edited by Mikael Asplund, Simin Nadjm-Tehrani. - 1st ed. 2021. - XII, 263 p. 60 illus., 33 illus. in color.online resource. - Security and Cryptology ;12556. - Security and Cryptology ;9241.
Malware and attacks -- Persistence in Linux-Based IoT Malware -- Real-time triggering of Android memory dumps for stealthy attack investigation -- Using Features of Encrypted Network Traffic to Detect Malware -- Formal analysis -- Machine-checking the universal verifiability of ElectionGuard -- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures -- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme -- Applied cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms and training -- HoneyHash: Honeyword Generation Based on Transformed Hashes -- Agent-based File Extraction Using Virtual Machine Introspection -- Cyber range automation overview with a case study of CRATE -- Applications and privacy -- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU -- OnLITE: On-line Label for IoT Transparency Enhancement -- An Investigation of Comic-Based Permission Requests.
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linköping University, Sweden, and held online during November 23-24, 2020. The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
ISBN: 9783030708528
Standard No.: 10.1007/978-3-030-70852-8doiSubjects--Topical Terms:
1211619
Mobile and Network Security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Secure IT Systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /
LDR
:03132nam a22004215i 4500
001
1046462
003
DE-He213
005
20210826131232.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030708528
$9
978-3-030-70852-8
024
7
$a
10.1007/978-3-030-70852-8
$2
doi
035
$a
978-3-030-70852-8
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Secure IT Systems
$h
[electronic resource] :
$b
25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings /
$c
edited by Mikael Asplund, Simin Nadjm-Tehrani.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XII, 263 p. 60 illus., 33 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
12556
505
0
$a
Malware and attacks -- Persistence in Linux-Based IoT Malware -- Real-time triggering of Android memory dumps for stealthy attack investigation -- Using Features of Encrypted Network Traffic to Detect Malware -- Formal analysis -- Machine-checking the universal verifiability of ElectionGuard -- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures -- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme -- Applied cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms and training -- HoneyHash: Honeyword Generation Based on Transformed Hashes -- Agent-based File Extraction Using Virtual Machine Introspection -- Cyber range automation overview with a case study of CRATE -- Applications and privacy -- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU -- OnLITE: On-line Label for IoT Transparency Enhancement -- An Investigation of Comic-Based Permission Requests.
520
$a
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linköping University, Sweden, and held online during November 23-24, 2020. The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Legal Aspects of Computing.
$3
669901
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Law and legislation.
$3
1069250
650
0
$a
Computers.
$3
565115
650
0
$a
Application software.
$3
528147
650
0
$a
Computer security.
$3
557122
700
1
$a
Nadjm-Tehrani, Simin.
$e
editor.
$1
https://orcid.org/0000-0002-1485-0802
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1323248
700
1
$a
Asplund, Mikael.
$e
editor.
$1
https://orcid.org/0000-0003-1916-3398
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1350007
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030708511
776
0 8
$i
Printed edition:
$z
9783030708535
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-70852-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入