|
![]() |
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014. The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security. Full Product DetailsAuthor: Bart De Decker , André ZúquetePublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2014 ed. Volume: 8735 Dimensions: Width: 15.50cm , Height: 0.90cm , Length: 23.50cm Weight: 2.701kg ISBN: 9783662448847ISBN 10: 366244884 Pages: 157 Publication Date: 05 September 2014 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsMalicious MPLS Policy Engine Reconnaissance.- USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizations.- Free Typed Text Using Keystroke Dynamics for Continuous Authentication.- Secure Storage on Android with Context-Aware Access Control.- A Study on Advanced Persistent Threats.- Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems.- Touchpad Input for Continuous Biometric Authentication.- A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption.- D–Shuffle for Prêt à Voter.- An Approach to Information Security Policy Modeling for Enterprise Networks.- Introduction to Attribute Based Searchable Encryption.- Risk Analysis of Physically Unclonable Functions.- Decentralized Bootstrap for Social Overlay Networks.- Enhancing Privacy with Quantum Networks.- The Fundamental Principle of BreachPrevention.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |