Secure IT Systems : 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings (Security and Cryptology)

個数:

Secure IT Systems : 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings (Security and Cryptology)

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 263 p.
  • 言語 ENG
  • 商品コード 9783030708511
  • DDC分類 005.8

Full Description

This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linköping University, Sweden, and held online during November 23-24, 2020.The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.

Contents

Malware and attacks.- Persistence in Linux-Based IoT Malware.- Real-time triggering of Android memory dumps for stealthy attack investigation.- Using Features of Encrypted Network Traffic to Detect Malware.- Formal analysis.- Machine-checking the universal verifiability of ElectionGuard.- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures.- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme.- Applied cryptography.- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption.- TLV-to-MUC Express: Post-quantum MACsec in VXLAN.- On the Certi cate Revocation Problem in the Maritime Sector.- Security mechanisms and training.- HoneyHash: Honeyword Generation Based on Transformed Hashes.- Agent-based File Extraction Using Virtual Machine Introspection.- Cyber range automation overview with a case study of CRATE.- Applications and privacy.- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU.- OnLITE: On-line Label for IoT Transparency Enhancement.- An Investigation of Comic-Based Permission Requests.

最近チェックした商品