menu
{ "item_title" : "Secure It Systems", "item_author" : [" Nils Gruschka "], "item_description" : "Privacy.- Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid.- Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps.- MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix-Zones.- AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications.- Cryptography.- Unifying Kleptographic Attacks.- Steady: A Simple End-to-End Secure Logging System.- Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation.- On Security Analysis of Generic Dynamic Authenticated Group Key Exchange.- A Blockchain-Assisted Hash-Based Signature Scheme.- The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants.- Verifiable Light-Weight Monitoring for Certificate Transparency Logs.- Network and Cloud Security.- CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs.- Detection of covert channels in TCP retransmissions.- What you can change and what you can't: human experience in computer network defenses.- Attack simulation for a realistic evaluation and comparison of network security techniques.- Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots using Virtual Machine Introspection.- Authorization Policies Specification and Consistency Management within Multi-Cloud Environments.- Cyber Security and Malware.- Cyber Hygiene: The Big Picture.- Estimating the Risk of Fraud against E-services.- PESTEL Analysis of Hacktivism Campaign Motivations.- Data Modelling for Predicting Exploits.- UpDroid: Updated Android Malware and Its Familial Classification.- Evaluation of Cyber Security Management of Critical Infrastructures: A Literature Review Guided by the NIST Cybersecurity Framework.- Next Generation Ransomware.- Security for Software and Software Development.- Hardware-Assisted Program Execution Integrity: HAPEI.- Protecting Instruction Set Randomization from Code Reuse Attacks.- A Uniform Information-Flow-Security Benchmark Suite for Source Code and Bytecode.- When Harry met Tinder: Security analysis of dating apps on Android.- Threat Poker: Solving Security and Privacy Threats in Agile Software Development.", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/3/03/003/637/3030036375_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Secure It Systems|Nils Gruschka

Secure It Systems : 23rd Nordic Conference, Nordsec 2018, Oslo, Norway, November 28-30, 2018, Proceedings

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Privacy.- Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid.- Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps.- MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix-Zones.- AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications.- Cryptography.- Unifying Kleptographic Attacks.- Steady: A Simple End-to-End Secure Logging System.- Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation.- On Security Analysis of Generic Dynamic Authenticated Group Key Exchange.- A Blockchain-Assisted Hash-Based Signature Scheme.- The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants.- Verifiable Light-Weight Monitoring for Certificate Transparency Logs.- Network and Cloud Security.- CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs.- Detection of covert channels in TCP retransmissions.- What you can change and what you can't: human experience in computer network defenses.- Attack simulation for a realistic evaluation and comparison of network security techniques.- Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots using Virtual Machine Introspection.- Authorization Policies Specification and Consistency Management within Multi-Cloud Environments.- Cyber Security and Malware.- Cyber Hygiene: The Big Picture.- Estimating the Risk of Fraud against E-services.- PESTEL Analysis of Hacktivism Campaign Motivations.- Data Modelling for Predicting Exploits.- UpDroid: Updated Android Malware and Its Familial Classification.- Evaluation of Cyber Security Management of Critical Infrastructures: A Literature Review Guided by the NIST Cybersecurity Framework.- Next Generation Ransomware.- Security for Software and Software Development.- Hardware-Assisted Program Execution Integrity: HAPEI.- Protecting Instruction Set Randomization from Code Reuse Attacks.- A Uniform Information-Flow-Security Benchmark Suite for Source Code and Bytecode.- When Harry met Tinder: Security analysis of dating apps on Android.- Threat Poker: Solving Security and Privacy Threats in Agile Software Development.

This item is Non-Returnable

Details

  • ISBN-13: 9783030036379
  • ISBN-10: 3030036375
  • Publisher: Springer
  • Publish Date: November 2018
  • Dimensions: 9.21 x 6.14 x 1.01 inches
  • Shipping Weight: 1.53 pounds
  • Page Count: 486

Related Categories

You May Also Like...

    1

BAM Customer Reviews