Communications and Multimedia Security - Bart de Decker
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtreSoyez informé(e) par e-mail dès l'arrivée de cet article
Créer une alerte prix- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Communications And Multimedia Security de Bart de Decker Format Broché - Livre
0 avis sur Communications And Multimedia Security de Bart de Decker Format Broché - Livre
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
Présentation Communications And Multimedia Security de Bart de Decker Format Broché
- Livre
Résumé :
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014. The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security.
Sommaire: Malicious MPLS Policy Engine Reconnaissance.-?USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations.-?Free Typed Text Using Keystroke Dynamics for Continuous Authentication.-?Secure Storage on Android with Context-Aware Access Control.-?A Study on Advanced Persistent Threats.-?Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems.-?Touchpad Input for Continuous Biometric Authentication.-?A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption.-?D-Shuffle for Pr?t?? Voter.-?An Approach to Information Security Policy Modeling for Enterprise Networks.-?Introduction to Attribute Based Searchable Encryption.-?Risk Analysis of Physically Unclonable Functions.-?Decentralized Bootstrap for Social Overlay Networks.-?Enhancing Privacy with Quantum Networks.-?The Fundamental Principle of BreachPrevention.?