Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings

Author:   Bart De Decker ,  André Zúquete
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2014 ed.
Volume:   8735
ISBN:  

9783662448847


Pages:   157
Publication Date:   05 September 2014
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $118.77 Quantity:  
Add to Cart

Share |

Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014. The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security.

Full Product Details

Author:   Bart De Decker ,  André Zúquete
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2014 ed.
Volume:   8735
Dimensions:   Width: 15.50cm , Height: 0.90cm , Length: 23.50cm
Weight:   2.701kg
ISBN:  

9783662448847


ISBN 10:   366244884
Pages:   157
Publication Date:   05 September 2014
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Malicious MPLS Policy Engine Reconnaissance.- USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizations.- Free Typed Text Using Keystroke Dynamics for Continuous Authentication.- Secure Storage on Android with Context-Aware Access Control.- A Study on Advanced Persistent Threats.- Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems.- Touchpad Input for Continuous Biometric Authentication.- A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption.- D–Shuffle for Prêt à Voter.- An Approach to Information Security Policy Modeling for Enterprise Networks.- Introduction to Attribute Based Searchable Encryption.- Risk Analysis of Physically Unclonable Functions.- Decentralized Bootstrap for Social Overlay Networks.- Enhancing Privacy with Quantum Networks.- The Fundamental Principle of BreachPrevention. 

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List