000 | 03665nam a22005295i 4500 | ||
---|---|---|---|
001 | vtls000545459 | ||
003 | RU-ToGU | ||
005 | 20210922083359.0 | ||
007 | cr nn 008mamaa | ||
008 | 160915s2014 gw | s |||| 0|eng d | ||
020 |
_a9783662438268 _9978-3-662-43826-8 |
||
024 | 7 |
_a10.1007/978-3-662-43826-8 _2doi |
|
035 | _ato000545459 | ||
040 |
_aSpringer _cSpringer _dRU-ToGU |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security Theory and Practice. Securing the Internet of Things _helectronic resource _b8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedings / _cedited by David Naccache, Damien Sauveron. |
260 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2014. |
||
300 |
_aXVIII, 201 p. 47 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8501 |
|
505 | 0 | _aSweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations -- Towards More Practical Time-Driven Cache Attacks -- Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Built in Protection against Side-Channel and Fault Attacks -- New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards -- A Pre-processing Composition for Secret Key Recovery on Android Smartphone -- Usable Privacy for Mobile Sensing Applications -- A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection -- End-to-End Secure and Privacy Preserving Mobile Chat Application -- S-box, SET, Match: A Toolbox for S-box Analysis -- Policy-Based Access Control for Body Sensor Networks -- Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider -- CAN Bus Risk Analysis Revisit -- AU2EU: Privacy-Preserving Matching of DNA Sequences -- Early DDoS Detection Based on Data Mining Techniques. | |
520 | _aThis volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy. | ||
650 | 0 |
_aComputer Science. _9155490 |
|
650 | 0 |
_aComputer network architectures. _9566231 |
|
650 | 0 |
_aData protection. _9303937 |
|
650 | 0 |
_aData encryption (Computer science). _9566260 |
|
650 | 1 | 4 |
_aComputer Science. _9155490 |
650 | 2 | 4 |
_aSystems and Data Security. _9303939 |
650 | 2 | 4 |
_aData Encryption. _9566261 |
650 | 2 | 4 |
_aComputer Systems Organization and Communication Networks. _9566233 |
700 | 1 |
_aNaccache, David. _eeditor. _9326268 |
|
700 | 1 |
_aSauveron, Damien. _eeditor. _9328403 |
|
710 | 2 |
_aSpringerLink (Online service) _9143950 |
|
773 | 0 | _tSpringer eBooks | |
830 | 0 |
_aLecture Notes in Computer Science, _9279505 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-662-43826-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
999 | _c403380 |