Security and privacy in communication networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012, revised selected papers /

This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The 21 revised papers included in the volume were carefully reviewed and selected from 73 submissions. T...

Full description

Saved in:
Bibliographic Details
Corporate Authors: SecureComm Padua, Italy); SpringerLink (Online service)
Group Author: Keromytis, Angelos; Di Pietro, Roberto (Computer scientist)
Published: Springer,
Publisher Address: Heidelberg :
Publication Dates: [2013]
Literature type: eBook
Language: English
Series: Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 106
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-642-36883-7
Summary: This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The 21 revised papers included in the volume were carefully reviewed and selected from 73 submissions. Topics covered include crypto and electronic money; wireless security; web security; intrusion detection and monitoring; and anonymity and privacy.
Carrier Form: 1 online resource (x, 367 pages) : illustrations.
Bibliography: Includes bibliographical references and index.
ISBN: 9783642368837 (electronic bk.)
3642368832 (electronic bk.)
Index Number: TK5102
CLC: TP393.08-532
Contents: DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem /
Improvement on Ahn et al.'s RSA P-Homomorphic Signature Scheme /
Building General-Purpose Security Services on EMV Payment Cards /
Anonymous Transferable Conditional E-cash /
Two Improvements of Random Key Predistribution for Wireless Sensor Networks /
A Detection Mechanism for SMS Flooding Attacks in Cellular Networks /
Set Difference Attacks in Wireless Sensor Networks /
JSGuard: Shellcode Detection in JavaScript /
Detection of Configuration Vulnerabilities in Distributed (Web) Environments /
BINSPECT: Holistic Analysis and Detection of Malicious Web Pages /
Improving the Resilience of an IDS against Performance Throttling Attacks /
The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent /
Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection /
Data Leak Detection as a Service /
Revealing Cooperating Hosts by Connection Graph Analysis /
New Multi-dimensional Sorting Based K-Anonymity Microaggregation for Statistical Disclosure Control /
More Anonymity through Trust Degree in Trust-Based Onion Routing /
Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing /
Random Host Mutation for Moving Target Defense /