Security and Trust Management: 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings

Author:   Sjouke Mauw ,  Mauro Conti
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2019
Volume:   11738
ISBN:  

9783030315108


Pages:   169
Publication Date:   17 September 2019
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Security and Trust Management: 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings


Add your own review!

Overview

This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.

Full Product Details

Author:   Sjouke Mauw ,  Mauro Conti
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2019
Volume:   11738
Weight:   0.454kg
ISBN:  

9783030315108


ISBN 10:   303031510
Pages:   169
Publication Date:   17 September 2019
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Improving Identity and Authentication Assurance in Research and Education Federations.- Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations.- Is a Smarter Grid Also Riskier.- BioID: a Privacy-Friendly Identity Document.- On the Statistical Detection of Adversarial Instances over Encrypted Data.- Understanding Attestation: Analyzing Protocols that use Quotes.- Challenges of Using Trusted Computing for Collaborative Data Processing.- Secure Trust Evaluation Using Multipath and Referral Chain Methods.- Personal Cross-Platform Reputation.- An OBDD-based Technique for the Efficient Synthesis of Garbled Circuits.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

ls

Shopping Cart
Your cart is empty
Shopping cart
Mailing List