Security and Trust Management: 20th International Workshop, STM 2024, Bydgoszcz, Poland, September 19–20, 2024, Proceedings

Author:   Fabio Martinelli ,  Ruben Rios
Publisher:   Springer International Publishing AG
Edition:   2024 ed.
Volume:   15235
ISBN:  

9783031763700


Pages:   153
Publication Date:   21 December 2024
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Security and Trust Management: 20th International Workshop, STM 2024, Bydgoszcz, Poland, September 19–20, 2024, Proceedings


Overview

This book constitutes the refereed proceedings of the 20th International Workshop on Security and Trust Management (ERCIM STM 2024), held in Bydgoszcz, Poland, during September 19–20, 2024 and co-located with ESORICS 2024 conference. The 6 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 22 submissions.  They were organized in topical sections as follows: Trust, Anonymity and Identity; Cryptography, Secure Computation and Formal Methods; Operating Systems and Application Security.

Full Product Details

Author:   Fabio Martinelli ,  Ruben Rios
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   2024 ed.
Volume:   15235
ISBN:  

9783031763700


ISBN 10:   303176370
Pages:   153
Publication Date:   21 December 2024
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

.- Trust, Anonymity and Identity. .- DrATC: Dynamic routing Algorithm based on Trust Characteristics. .- Distributed Dynamic Self-Control Anonymity Management Model. .- Machines Have Identities Too! Extending NIST’s SP 800-63 for Device Identity. .- Cryptography, Secure Computation and Formal Methods. .- On β−separating sets and deterministic factoring. .- Statistically secure multiparty computation of a biased coin. .- A Formal Approach For Modelling And Analysing Surgical Procedures. .- Operating Systems and Application Security. .- Flexible and Secure Process Confinement with eBPF. .- Dynamic Analysis for Explainable Fine-grained Android Malware Detection. .- A portable research honeypot for corporate network. .- Unleashing AI in Ethical Hacking.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List