Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Secure IT systems = 25th Nordic Conf...
~
Nordic Conference on Secure IT Systems (2020 :)
Linked to FindBook
Google Book
Amazon
博客來
Secure IT systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Secure IT systems/ edited by Mikael Asplund, Simin Nadjm-Tehrani.
Reminder of title:
25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020 : proceedings /
remainder title:
NordSec 2020
other author:
Asplund, Mikael.
corporate name:
Nordic Conference on Secure IT Systems
Published:
Cham :Springer International Publishing : : 2021.,
Description:
xii, 263 p. :ill., digital ;24 cm.
[NT 15003449]:
Malware and attacks -- Persistence in Linux-Based IoT Malware -- Real-time triggering of Android memory dumps for stealthy attack investigation -- Using Features of Encrypted Network Traffic to Detect Malware -- Formal analysis -- Machine-checking the universal verifiability of ElectionGuard -- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures -- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme -- Applied cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms and training -- HoneyHash: Honeyword Generation Based on Transformed Hashes -- Agent-based File Extraction Using Virtual Machine Introspection -- Cyber range automation overview with a case study of CRATE -- Applications and privacy -- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU -- OnLITE: On-line Label for IoT Transparency Enhancement -- An Investigation of Comic-Based Permission Requests.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-030-70852-8
ISBN:
9783030708528
Secure IT systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020 : proceedings /
Secure IT systems
25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020 : proceedings /[electronic resource] :NordSec 2020edited by Mikael Asplund, Simin Nadjm-Tehrani. - Cham :Springer International Publishing :2021. - xii, 263 p. :ill., digital ;24 cm. - Lecture notes in computer science,125560302-9743 ;. - Lecture notes in computer science ;12556..
Malware and attacks -- Persistence in Linux-Based IoT Malware -- Real-time triggering of Android memory dumps for stealthy attack investigation -- Using Features of Encrypted Network Traffic to Detect Malware -- Formal analysis -- Machine-checking the universal verifiability of ElectionGuard -- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures -- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme -- Applied cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms and training -- HoneyHash: Honeyword Generation Based on Transformed Hashes -- Agent-based File Extraction Using Virtual Machine Introspection -- Cyber range automation overview with a case study of CRATE -- Applications and privacy -- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU -- OnLITE: On-line Label for IoT Transparency Enhancement -- An Investigation of Comic-Based Permission Requests.
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linkoping University, Sweden, and held online during November 23-24, 2020. The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
ISBN: 9783030708528
Standard No.: 10.1007/978-3-030-70852-8doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Secure IT systems = 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020 : proceedings /
LDR
:02866nmm a2200373 a 4500
001
2238066
003
DE-He213
005
20210306090712.0
006
m d
007
cr nn 008maaau
008
211111s2021 sz s 0 eng d
020
$a
9783030708528
$q
(electronic bk.)
020
$a
9783030708511
$q
(paper)
024
7
$a
10.1007/978-3-030-70852-8
$2
doi
035
$a
978-3-030-70852-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
N832 2020
111
2
$a
Nordic Conference on Secure IT Systems
$n
(25th :
$d
2020 :
$c
Online)
$3
3490850
245
1 0
$a
Secure IT systems
$h
[electronic resource] :
$b
25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020 : proceedings /
$c
edited by Mikael Asplund, Simin Nadjm-Tehrani.
246
3
$a
NordSec 2020
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xii, 263 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12556
490
1
$a
Security and cryptology
505
0
$a
Malware and attacks -- Persistence in Linux-Based IoT Malware -- Real-time triggering of Android memory dumps for stealthy attack investigation -- Using Features of Encrypted Network Traffic to Detect Malware -- Formal analysis -- Machine-checking the universal verifiability of ElectionGuard -- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures -- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme -- Applied cryptography -- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption -- TLV-to-MUC Express: Post-quantum MACsec in VXLAN -- On the Certi cate Revocation Problem in the Maritime Sector -- Security mechanisms and training -- HoneyHash: Honeyword Generation Based on Transformed Hashes -- Agent-based File Extraction Using Virtual Machine Introspection -- Cyber range automation overview with a case study of CRATE -- Applications and privacy -- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU -- OnLITE: On-line Label for IoT Transparency Enhancement -- An Investigation of Comic-Based Permission Requests.
520
$a
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linkoping University, Sweden, and held online during November 23-24, 2020. The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
1565452
650
2 4
$a
Legal Aspects of Computing.
$3
892641
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Asplund, Mikael.
$3
3490851
700
1
$a
Nadjm-Tehrani, Simin.
$3
3446142
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
12556.
$3
3490852
830
0
$a
Security and cryptology.
$3
3382517
856
4 0
$u
https://doi.org/10.1007/978-3-030-70852-8
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9399951
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login