000 | 04594nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-030-90022-9 | ||
003 | DE-He213 | ||
005 | 20240423125509.0 | ||
007 | cr nn 008mamaa | ||
008 | 211103s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030900229 _9978-3-030-90022-9 |
||
024 | 7 |
_a10.1007/978-3-030-90022-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity and Privacy in Communication Networks _h[electronic resource] : _b17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II / _cedited by Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXVII, 527 p. 138 illus., 96 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v399 |
|
505 | 0 | _aAnonymous Short Communications over Social Networks -- A Sybil detection method in OSN based on DistilBERT and Double-SN-LSTM for text analysis -- ePayment Security 31 An Empirical Study on Mobile Payment Credential Leaks and Their Exploits -- System-Wide Security for Offline Payment Terminals -- Horus: A Security Assessment Framework for Android Crypto Wallets -- Systems Security -- Leakuidator: Leaky resource attacks and countermeasures -- Jabbic lookups: a backend telemetry-based system for malware triage Octavian -- Facilitating Parallel Fuzzing with Mutually-exclusive Task Distribution -- Flowrider: Fast On-Demand Key Provisioning for CloudNetworks -- Mobile Security & Privacy -- Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google Douglas Leith -- Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy -- HTPD: Secure and Flexible Message-Based Communication for Mobile Apps -- Smartphone Location Spoofing Attack in Wireless Networks -- IoT Security & Privacy 42 Compromised through Compression -- iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-physical Systems. | |
520 | _aThis two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aMobile and Network Security. |
700 | 1 |
_aGarcia-Alfaro, Joaquin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLi, Shujun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPoovendran, Radha. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aDebar, Hervé. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aYung, Moti. _eeditor. _0(orcid) _10000-0003-0848-0873 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030900212 |
776 | 0 | 8 |
_iPrinted edition: _z9783030900236 |
830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v399 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-90022-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNS | ||
942 | _cSPRINGER | ||
999 |
_c178565 _d178565 |