E-Books durchsuchen

Foundations and Practice of Security [2015]

1
On Acoustic Covert Channels Between Air-Gapped Systems
2
Location-Dependent EM Leakage of the ATxmega Microcontroller
3
Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
4
A Maximum Variance Approach for Graph Anonymization
5
Privacy by Design: On the Conformance Between Protocols and Architectures
6
Moving Target Defense Against Cross-Site Scripting Attacks (Position Paper)
7
Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks
8
Malware Message Classification by Dynamic Analysis
9
A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks
10
Optimizing TLS for Low Bandwidth Environments
11
Automating MAC Spoofer Evidence Gathering and Encoding for Investigations
12
HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control
13
Logical Method for Reasoning About Access Control and Data Flow Control Models
14
A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies
15
Debating Cybersecurity or Securing a Debate?
16
Formal Verification of e-Reputation Protocols
17
(In)Corruptibility of Routing Protocols
18
Decentralized CRT-Based Efficient Verifiable (<italic>n</italic>, <italic>t</italic>, <italic>n</italic>) Multi-secret Sharing Scheme
19
Composable Oblivious Extended Permutations
20
Benchmarking Encrypted Data Storage in HBase and Cassandra with YCSB
21
Data Confirmation for Botnet Traffic Analysis
22
Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps
23
A Responsive Defense Mechanism Against DDoS Attacks
24
Automated Extraction of Vulnerability Information for Home Computer Security
25
A Formal Approach to Automatic Testing of Security Policies Specified in XACML
Feedback