E-Books durchsuchen
Foundations and Practice of Security [2015]
- 1
-
On Acoustic Covert Channels Between Air-Gapped Systems
- 2
-
Location-Dependent EM Leakage of the ATxmega Microcontroller
- 3
-
Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
- 4
-
A Maximum Variance Approach for Graph Anonymization
- 5
-
Privacy by Design: On the Conformance Between Protocols and Architectures
- 6
-
Moving Target Defense Against Cross-Site Scripting Attacks (Position Paper)
- 7
-
Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks
- 8
-
Malware Message Classification by Dynamic Analysis
- 9
-
A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks
- 10
-
Optimizing TLS for Low Bandwidth Environments
- 11
-
Automating MAC Spoofer Evidence Gathering and Encoding for Investigations
- 12
-
HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control
- 13
-
Logical Method for Reasoning About Access Control and Data Flow Control Models
- 14
-
A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies
- 15
-
Debating Cybersecurity or Securing a Debate?
- 16
-
Formal Verification of e-Reputation Protocols
- 17
-
(In)Corruptibility of Routing Protocols
- 18
-
Decentralized CRT-Based Efficient Verifiable (<italic>n</italic>, <italic>t</italic>, <italic>n</italic>) Multi-secret Sharing Scheme
- 19
-
Composable Oblivious Extended Permutations
- 20
-
Benchmarking Encrypted Data Storage in HBase and Cassandra with YCSB
- 21
-
Data Confirmation for Botnet Traffic Analysis
- 22
-
Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps
- 23
-
A Responsive Defense Mechanism Against DDoS Attacks
- 24
-
Automated Extraction of Vulnerability Information for Home Computer Security
- 25
-
A Formal Approach to Automatic Testing of Security Policies Specified in XACML