skip to content
Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings Preview this item
ClosePreview this item
Checking...

Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings

Author: Raja Naeem Akram; Sushil Jajodia
Publisher: Cham : Springer, 2015.
Series: Lecture notes in computer science, 9311.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory and Practices, WISTP 2015, held in Heraklion, Crete, Greece, in August 2015. The 14 revised full papers and 4 short papers presented together were carefully reviewed and selected from 52 submissions. WISTP 2015 sought original submissions from academia and industry  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Printed edition:
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Raja Naeem Akram; Sushil Jajodia
ISBN: 9783319240183 3319240188 331924017X 9783319240176
OCLC Number: 919255019
Notes: International conference proceedings.
Includes author index.
Description: 1 online resource (xii, 281 pages) : illustrations.
Contents: Security and Privacy Services --
On Secrecy Amplification Protocols --
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing --
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols --
Private Minutia-based Fingerprint Matching --
Secure Resource Sharing and Access Control --
Secure Resource Sharing for Embedded Protected Module Architectures --
Secure Obfuscation of Authoring Style --
DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption --
WSACd --
A Usable Access Control Framework for Smart Home Devices.-Secure Devices and Execution Environment --
Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques --
Practical and Privacy-Preserving TEE Migration --
Randomizing the Montgomery Powering Ladder --
Challenges of Security and Reliability --
How Current Android Malware Seeks to Evade Automated Code Analysis --
On linkability and malleability in self-blindable credentials --
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality --
Short Papers --
Normalizing Security Events with a Hierarchical Knowledge Base --
Attack Tree Generation by Policy Invalidation --
Lightweight Password Hashing Scheme for Embedded Systems --
Secure and Authenticated Access to LLN Resources Through Policy Constraints.
Series Title: Lecture notes in computer science, 9311.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: WISTP 2015
Responsibility: Raja Naeem Akram, Sushil Jajodia (eds.).

Abstract:

This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory and Practices, WISTP 2015, held in Heraklion,  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/919255019> # Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "919255019" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/sz> ;
    schema:about <http://dewey.info/class/005.82/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/2618697268#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/2618697268#Topic/ubiquitous_computing> ; # Ubiquitous computing
    schema:alternateName "WISTP 2015" ;
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/2618697268#Meeting/wistp_conference_9th_2015_erakleion_greece> ; # WISTP (Conference) (9th : 2015 : Ērakleion, Greece)
    schema:datePublished "2015" ;
    schema:description "This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory and Practices, WISTP 2015, held in Heraklion, Crete, Greece, in August 2015. The 14 revised full papers and 4 short papers presented together were carefully reviewed and selected from 52 submissions. WISTP 2015 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of elded systems, the application of security technology, the implementation of systems, and lessons learned. We encouraged submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues."@en ;
    schema:description "Security and Privacy Services -- On Secrecy Amplification Protocols -- Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing -- Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols -- Private Minutia-based Fingerprint Matching -- Secure Resource Sharing and Access Control -- Secure Resource Sharing for Embedded Protected Module Architectures -- Secure Obfuscation of Authoring Style -- DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption -- WSACd -- A Usable Access Control Framework for Smart Home Devices.-Secure Devices and Execution Environment -- Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques -- Practical and Privacy-Preserving TEE Migration -- Randomizing the Montgomery Powering Ladder -- Challenges of Security and Reliability -- How Current Android Malware Seeks to Evade Automated Code Analysis -- On linkability and malleability in self-blindable credentials -- Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality -- Short Papers -- Normalizing Security Events with a Hierarchical Knowledge Base -- Attack Tree Generation by Policy Invalidation -- Lightweight Password Hashing Scheme for Embedded Systems -- Secure and Authenticated Access to LLN Resources Through Policy Constraints."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/2618697268#Person/jajodia_sushil> ; # Sushil Jajodia
    schema:editor <http://experiment.worldcat.org/entity/work/data/2618697268#Person/akram_raja_naeem> ; # Raja Naeem Akram
    schema:exampleOfWork <http://worldcat.org/entity/work/id/2618697268> ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/2618697268#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary. SL 4, Security and cryptology
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/2618697268#Series/lncs_sublibrary> ; # LNCS sublibrary.
    schema:isSimilarTo <http://worldcat.org/entity/work/data/2618697268#CreativeWork/> ;
    schema:name "Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings"@en ;
    schema:productID "919255019" ;
    schema:url <https://grinnell.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-24018-3> ;
    schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-319-24017-6> ;
    schema:url <http://gate.lib.buffalo.edu/login?url=https://link.springer.com/book/10.1007/978-3-319-24018-3> ;
    schema:url <https://link.springer.com/10.1007/978-3-319-24018-3> ;
    schema:url <http://proxy.library.carleton.ca/login?url=http://books.scholarsportal.info/viewdoc.html?id=/ebooks/ebooks3/springer/2017-08-17/8/9783319240183> ;
    schema:url <http://link.springer.com/10.1007/978-3-319-24018-3> ;
    schema:url <https://link.springer.com/openurl?genre=book&isbn=978-3-319-24017-6> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/book/10.1007/978-3-319-24018-3> ;
    schema:url <http://proxy.library.carleton.ca/login?url=http://link.springer.com/10.1007/978-3-319-24018-3> ;
    schema:url <http://dx.doi.org/10.1007/978-3-319-24018-3> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-319-24018-3> ;
    schema:workExample <http://worldcat.org/isbn/9783319240183> ;
    schema:workExample <http://worldcat.org/isbn/9783319240176> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/919255019> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/2618697268#Meeting/wistp_conference_9th_2015_erakleion_greece> # WISTP (Conference) (9th : 2015 : Ērakleion, Greece)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/2618697268#Place/erakleion_greece> ; # Ērakleion, Greece)
    schema:name "WISTP (Conference) (9th : 2015 : Ērakleion, Greece)" ;
    .

<http://experiment.worldcat.org/entity/work/data/2618697268#Person/akram_raja_naeem> # Raja Naeem Akram
    a schema:Person ;
    schema:familyName "Akram" ;
    schema:givenName "Raja Naeem" ;
    schema:name "Raja Naeem Akram" ;
    .

<http://experiment.worldcat.org/entity/work/data/2618697268#Person/jajodia_sushil> # Sushil Jajodia
    a schema:Person ;
    schema:familyName "Jajodia" ;
    schema:givenName "Sushil" ;
    schema:name "Sushil Jajodia" ;
    .

<http://experiment.worldcat.org/entity/work/data/2618697268#Place/erakleion_greece> # Ērakleion, Greece)
    a schema:Place ;
    schema:name "Ērakleion, Greece)" ;
    .

<http://experiment.worldcat.org/entity/work/data/2618697268#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/919255019> ; # Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings
    schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/2618697268#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary. SL 4, Security and cryptology
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/919255019> ; # Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings
    schema:name "LNCS sublibrary. SL 4, Security and cryptology" ;
    .

<http://experiment.worldcat.org/entity/work/data/2618697268#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2618697268#Topic/ubiquitous_computing> # Ubiquitous computing
    a schema:Intangible ;
    schema:name "Ubiquitous computing"@en ;
    .

<http://worldcat.org/entity/work/data/2618697268#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/919255019> ; # Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings
    .

<http://worldcat.org/isbn/9783319240176>
    a schema:ProductModel ;
    schema:isbn "331924017X" ;
    schema:isbn "9783319240176" ;
    .

<http://worldcat.org/isbn/9783319240183>
    a schema:ProductModel ;
    schema:isbn "3319240188" ;
    schema:isbn "9783319240183" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/919255019> ; # Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/919255019>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/919255019> ; # Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings
    schema:dateModified "2018-08-10" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.