Foundations and practice of security : 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012 revised selected papers

This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 22 full papers, accompanied by 3 short papers. The pape...

Description complète

Enregistré dans:
Détails bibliographiques
Auteurs principaux : Garcia-Alfaro Joaquin (Directeur de publication), Cuppens Frederic (Directeur de publication), Cuppens-Boulahia Nora (Directeur de publication), Miri Ali (Directeur de publication), Tawbi Nadia (Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Foundations and practice of security : 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012 : revised selected papers / edited by Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , 2013
Cham : Springer Nature
Collection : Security and Cryptology ; 7743
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Note sur l'URL : Accès sur la plateforme de l'éditeur
Accès sur la plateforme Istex
Condition d'utilisation et de reproduction : Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017
Sujets :
Documents associés : Autre format: Foundations and Practice of Security
Autre format: Foundations and Practice of Security
LEADER 05616clm a2200733 4500
001 PPN169139964
003 http://www.sudoc.fr/169139964
005 20241001155300.0
010 |a 978-3-642-37119-6 
017 7 0 |a 10.1007/978-3-642-37119-6  |2 DOI 
035 |a (OCoLC)846890138 
035 |a Springer978-3-642-37119-6 
035 |a SPRINGER_EBOOKS_LN_PLURI_10.1007/978-3-642-37119-6 
035 |a Springer-11645-978-3-642-37119-6 
100 |a 20130507d2013 u |0frey0103 ba 
101 0 |a eng  |2 639-2 
102 |a DE 
135 |a dr||||||||||| 
181 |6 z01  |c txt  |2 rdacontent 
181 1 |6 z01  |a i#  |b xxxe## 
182 |6 z01  |c c  |2 rdamedia 
182 1 |6 z01  |a b 
183 |6 z01  |a ceb  |2 RDAfrCarrier 
200 1 |a Foundations and practice of security  |e 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012  |e revised selected papers  |f edited by Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi 
214 0 |a Berlin, Heidelberg  |c Springer Berlin Heidelberg 
214 2 |a Cham  |c Springer Nature  |d 2013 
225 0 |a Security and Cryptology  |x 2946-1863  |v 7743 
330 |a This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security. 
359 1 |a Cryptography and Information Theory -- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic Protocols -- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities -- COMPASS: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network Users through the Social Graph -- A Formal Derivation of Composite Trust -- Policies and Applications Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy in the Java Security Manager -- A Novel Obfuscation: Class Hierarchy Flattening -- RESource: A Framework for Online Matching of Assembly with Open Source Code -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone -- Network and Adaptive Security -- Short-Term Linkable Group Signatures with Categorized Batch Verification -- GHUMVEE: Efficient, Effective, and Flexible Replication -- Extracting Attack Scenarios Using Intrusion Semantics -- On Securely Manipulating XML Data -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC -- Short Papers -- Towards Modelling Adaptive Attacker s Behaviour -- Scalable Deniable Group Key Establishment -- Information-Theoretic Foundations of Differential Privacy. 
371 0 |a Accès en ligne pour les établissements français bénéficiaires des licences nationales 
371 0 |a Accès soumis à abonnement pour tout autre établissement 
371 1 |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales  |c chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 
410 | |t Security and Cryptology  |x 2946-1863  |v 7743 
452 | |t Foundations and Practice of Security  |b Texte imprimé  |y 9783642371189 
452 | |t Foundations and Practice of Security  |b Texte imprimé  |y 9783642371202 
610 2 |a Business Information Systems 
610 1 |a Computer Science 
610 2 |a Information Systems Applications (incl. Internet) 
610 2 |a Computer Appl. in Administrative Data Processing 
610 2 |a Management of Computing and Information Systems 
610 2 |a Software Engineering 
610 2 |a Computer Imaging, Vision, Pattern Recognition and Graphics 
610 2 |a IT in Business 
610 2 |a Computer Application in Administrative Data Processing 
610 2 |a IT Operations 
610 2 |a Computer and Information Systems Applications 
615 |a @Computer Science  |n 11645  |2 Springer 
676 |a 005.1  |v 23 
680 |a QA76.758 
700 1 |a Garcia-Alfaro  |b Joaquin  |4 651 
701 1 |a Cuppens  |b Frederic  |4 651 
701 1 |a Cuppens-Boulahia  |b Nora  |4 651 
701 1 |a Miri  |b Ali  |4 651 
701 1 |a Tawbi  |b Nadia  |4 651 
801 3 |a FR  |b Abes  |c 20240814  |g AFNOR 
801 1 |a DE  |b Springer  |c 20231204  |g AACR2 
856 4 |q PDF  |u https://doi.org/10.1007/978-3-642-37119-6  |z Accès sur la plateforme de l'éditeur 
856 4 |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-CM8KQXRK-8  |z Accès sur la plateforme Istex 
856 4 |5 441099901:830857931  |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-37119-6 
915 |5 441099901:830857931  |b SPRING13-00812 
930 |5 441099901:830857931  |b 441099901  |j g 
991 |5 441099901:830857931  |a Exemplaire créé en masse par ITEM le 30-09-2024 16:14 
997 |a NUM  |b SPRING13-00812  |d NUMpivo  |e EM  |s d 
998 |a 978642