Information security theory and practice securing the internet of things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014 : proceedings /
This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were car...
Corporate Authors: | WISTP (Workshop) Ērakleion, Greece) |
---|---|
Other Authors: | WISTP (Workshop), Naccache, David, 1967-, Sauveron, Damien,, SpringerLink (Online service) |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer,
[2014]
|
Physical Description: |
1 online resource (xviii, 199 pages) : illustrations. |
Series: |
Lecture notes in computer science ;
8501. LNCS sublibrary. Security and cryptology. |
Subjects: |
LEADER | 06292cam a2201117 i 4500 | ||
---|---|---|---|
001 | 882282275 | ||
003 | OCoLC | ||
005 | 20240223121953.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 140701s2014 sz a ob 101 0 eng d | ||
016 | 7 | |a 016809243 |2 Uk | |
020 | |a 9783662438268 |q (electronic bk.) | ||
020 | |a 3662438267 |q (electronic bk.) | ||
020 | |z 9783662438251 |q (print) | ||
020 | |z 3662438259 |q (print) | ||
024 | 7 | |a 10.1007/978-3-662-43826-8 |2 doi | |
035 | |a (OCoLC)882282275 | ||
040 | |a NLGGC |b eng |e rda |e pn |c NLGGC |d OCLCO |d GW5XE |d COO |d YDXCP |d UKMGB |d OCLCF |d UPM |d OHI |d OCLCO |d OCL |d OCLCO |d EBLCP |d DIBIB |d OCLCO |d OCLCQ |d ESU |d IOG |d NJR |d OCLCA |d BUF |d OCLCQ |d CEF |d DEHBZ |d OCLCQ |d U3W |d AU@ |d WYU |d YOU |d OCLCQ |d WURST |d LUN |d AJS |d OCLCQ |d OCLCO |d COM |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
049 | |a COM6 | ||
050 | 4 | |a QA76.9.A25 | |
082 | 0 | 4 | |a 005.8/2 |2 23 |
084 | |a 54.62 |2 bcl | ||
084 | |a 54.32 |2 bcl | ||
084 | |a 54.80 |2 bcl | ||
111 | 2 | |a WISTP (Workshop) |n (8th : |d 2014 : |c Ērakleion, Greece) | |
245 | 1 | 0 | |a Information security theory and practice : |b securing the internet of things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014 : proceedings / |c David Naccache, Damien Sauveron (Eds.). |
246 | 3 | |a WISTP 2014. | |
264 | 1 | |a Cham : |b Springer, |c [2014] | |
264 | 4 | |c ©2014. | |
300 | |a 1 online resource (xviii, 199 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
347 | |a text file |b PDF |2 rda. | ||
490 | 1 | |a Lecture Notes in Computer Science, |x 0302-9743 ; |v 8501. | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology. | |
500 | |a International conference proceedings. | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Online resource; title from PDF title page (SpringerLink, viewed July 7, 2014). | |
505 | 0 | |a Sweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations -- Towards More Practical Time-Driven Cache Attacks -- Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Built in Protection against Side-Channel and Fault Attacks -- New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards -- A Pre-processing Composition for Secret Key Recovery on Android Smartphone -- Usable Privacy for Mobile Sensing Applications -- A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection -- End-to-End Secure and Privacy Preserving Mobile Chat Application -- S-box, SET, Match: A Toolbox for S-box Analysis -- Policy-Based Access Control for Body Sensor Networks -- Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider -- CAN Bus Risk Analysis Revisit -- AU2EU: Privacy-Preserving Matching of DNA Sequences -- Early DDoS Detection Based on Data Mining Techniques. | |
520 | |a This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy. | ||
650 | 0 | |a Computer security |v Congresses. | |
650 | 0 | |a Ubiquitous computing |v Congresses. | |
650 | 6 | |a Sécurité informatique |v Congrès. | |
650 | 6 | |a Informatique omniprésente |v Congrès. | |
650 | 7 | |a Computer security. |2 fast. | |
650 | 7 | |a Ubiquitous computing. |2 fast. | |
653 | 0 | 0 | |a computerwetenschappen. |
653 | 0 | 0 | |a computer sciences. |
653 | 0 | 0 | |a gegevensbeheer. |
653 | 0 | 0 | |a data management. |
653 | 0 | 0 | |a computernetwerken. |
653 | 0 | 0 | |a computer networks. |
653 | 1 | 0 | |a Information and Communication Technology (General) |
653 | 1 | 0 | |a Informatie- en communicatietechnologie (algemeen) |
655 | 2 | |a Congress. | |
655 | 7 | |a proceedings (reports) |2 aat. | |
655 | 7 | |a Conference papers and proceedings. |2 fast. | |
655 | 7 | |a Conference papers and proceedings. |2 lcgft. | |
655 | 7 | |a Actes de congrès. |2 rvmgf. | |
700 | 1 | |a Naccache, David, |d 1967- |1 https://id.oclc.org/worldcat/entity/E39PBJycMkf4yfYB6mhhHx8wG3, |e editor. | |
700 | 1 | |a Sauveron, Damien, |e editor. | |
710 | 2 | |a SpringerLink (Online service) | |
776 | 0 | 8 | |i Printed edition: |z 9783662438251. |
830 | 0 | |a Lecture notes in computer science ; |v 8501. |x 1611-3349. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
907 | |a .b42440658 |b multi |c - |d 140718 |e 240320 | ||
998 | |a (3)cue |a cu |b 240227 |c m |d z |e - |f eng |g sz |h 0 |i 2 | ||
948 | |a MARCIVE Overnight, in 2024.03 | ||
948 | |a MARCIVE Comp, in 2022.12 | ||
948 | |a MARCIVE Over, 07/2021 | ||
948 | |a MARCIVE Comp, 2019.12 | ||
948 | |a MARCIVE Comp, 2019.05 | ||
948 | |a MARCIVE Comp, 2018.05 | ||
948 | |a MARCIVE Comp, 2017.10 | ||
948 | |a MARCIVE August, 2017 | ||
948 | |a MARCIVE extract Aug 5, 2017 | ||
994 | |a 92 |b COM | ||
995 | |a Loaded with m2btab.ltiac in 2024.03 | ||
995 | |a Loaded with m2btab.elec in 2024.02 | ||
995 | |a Loaded with m2btab.ltiac in 2022.12 | ||
995 | |a Loaded with m2btab.ltiac in 2021.07 | ||
995 | |a Loaded with m2btab.elec in 2021.06 | ||
995 | |a Loaded with m2btab.ltiac in 2019.12 | ||
995 | |a Loaded with m2btab.ltiac in 2019.05 | ||
995 | |a Loaded with m2btab.ltiac in 2018.06 | ||
995 | |a Loaded with m2btab.ltiac in 2017.10 | ||
995 | |a Loaded with m2btab.ltiac in 2017.10 | ||
995 | |a Loaded with m2btab.ltiac in 2017.08 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a OCLC offline update by CMU | ||
999 | |e z | ||
999 | |a cue | ||
989 | |d cueme |e - - |f - - |g - |h 0 |i 0 |j 200 |k 240227 |l $0.00 |m |n - - |o - |p 0 |q 0 |t 0 |x 0 |w SpringerLink |1 .i150385596 |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-662-43826-8 |3 SpringerLink |z Click here for access |