close
1.

電子ブック

EB
James J. Park, Javier Lopez, Javier L?pez, Taeshik Shon, David Taniar, Sang-Soo Yeo
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
2.

電子ブック

EB
Sushil Jajodia, Takeo Kanade, Javier Lopez, Javier L?pez
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
3.

電子ブック

EB
Javier Lopez, Takeo Kanade, Javier L?pez
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
4.

電子ブック

EB
Javier Lopez, Bernhard M. H?mmerli, Takeo Kanade
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
5.

電子ブック

EB
Alessandro;Lopez, Javier;Martinelli, Fabio Aldini, Javier Lopez, Fabio Martinelli
出版情報: Springer eBooks Computer Science , Springer International Publishing, 2016
所蔵情報: loading…
6.

電子ブック

EB
Sokratis Katsikas, Takeo Kanade, Javier Lopez, Miguel Soriano
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Invited Talk
Usage Control, Risk and Trust / Leanid Krautsevich ; Aliaksandr Lazouski ; Fabio Martinelli ; Paolo Mori ; Artsiom Yautsiukhin
Prevention Systems
Attacking Image Recognition CAPTCHAS: A Naive but Effective Approach / Christoph Fritsch ; Michael Netter ; Andreas Reisser ; Günther Pernul
An Insider Threat Prediction Model / Miltiadis Kandias ; Alexios Mylonas ; Nikos Virvilis ; Marianthi Theoharidou ; Dimitris Gritzalis
A Call Conference Room Interception Attack and its Detection / Nikos Vrakas ; Dimitris Geneiatakis ; Costas Lambrinoudakis
Safe and Efficient Strategies for Updating Firewall Policies / Ahmed Zeeshan ; Abdessamad Imine ; Michaël Rusinowitch
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression / Javier Parra-Arnau ; David Rebollo-Monedero ; Jordi FornéPrivacy I:
Context-Aware Privacy Design Pattern Selection / Siani Pearson ; Yun Shen
Real-Time Remote Attestation with Privacy Protection / Aimin Yu ; Dengguo Feng
Private Searching on MapReduce / Huafei Zhu ; Feng Bao
In Search of Search Privacy / Martin S. Olivier ; Wesley BrandiPrivacy II:
Untraceability and Profiling Are Not Mutually Exclusive / Sébastien Canard ; Amandine Jambert
Privacy Policy Referencing / Audun Jøsang ; Lothar Fritsch ; Tobias Mahler
Access Control
Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol / Almudena Alcaide ; Esther Palomar ; Ana I. González-Tablas ; Arturo Ribagorda
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation / Gina Kounga ; Marco Casassa Mont ; Pete Bramhall
An Agent Based Back-End RFID Tag Management System / Evangelos Rekleitis ; Panagiotis Rizomiliotis ; Stefanos Gritzalis
Security and Trust Concepts
Assessing the Usability of End-User Security Software / Tarik Ibrahim ; Steven M. Furnell ; Maria Papadaki ; Nathan L. Clarke
Building ISMS through the Reuse of Knowledge / Luis Enrique Sánchez ; Antonio Santos-Olmo ; Eduardo Fernández-Medina ; Mario Piattini
Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness / Soude Fazeli ; Alireza Zarghami ; Nima Dokoohaki ; Mihhail Matskin
Security for Dynamic Collaborations
Security for Dynamic Service-Oriented eCollaboration: Architectural Alternatives and Proposed Solution
Analyzing Information Security Awareness through Networks of Association / Aggeliki Tsohou ; Maria Karyda ; Spyros Kokolakis ; Evangelos Kiountouzis
Efficiency Improvement Of Homomorphic E-Auction / Kun Peng
Author Index
Invited Talk
Usage Control, Risk and Trust / Leanid Krautsevich ; Aliaksandr Lazouski ; Fabio Martinelli ; Paolo Mori ; Artsiom Yautsiukhin
Prevention Systems
7.

電子ブック

EB
Javier Lopez, Takeo Kanade, Gene Tsudik
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
8.

電子ブック

EB
Jos? A. Onieva, Javier Lopez, Jose A. Onieva, Jianying Zhou
出版情報: Springer eBooks Computer Science , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction
Introduction to E-commerce
Multi-party Non-Repudiation Protocols: Analysis
New Design Approaches for MNR
Multi-Party Non-Repudiation and Its Applications
Scenarios Supported by MNR Services
Index
Preface
Introduction
Introduction to E-commerce
9.

電子ブック

EB
Dimitris Gritzalis, Javier Lopez
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Identification and Authentication I
Flexible and Transparent User Authentication for Mobile Devices / Nathan Clarke ; Sevasti Karatzouni ; Steven Furnell
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable / Amir Herzberg
Audio CAPTCHA for SIP-Based VoIP / Yannis Soupionis ; George Tountas ; Dimitris Gritzalis
Threats and Attacks
Roving Bugnet: Distributed Surveillance Threat and Mitigation / Ryan Farley ; Xinyuan Wang
On Robust Covert Channels Inside DNS / Lucas Nussbaum ; Pierre Neyron ; Olivier Richard
Discovering Application-Level Insider Attacks Using Symbolic Execution / Karthik Pattabiraman ; Nithin Nakka ; Zbigniew Kalbarczyk ; Ravishankar Iyer
Identification and Authentication II
Custom JPEG Quantization for Improved Iris Recognition Accuracy / Gerald Stefan Kostmajer ; Herbert Stögner ; Andreas Uhl
On the IPP Properties of Reed-Solomon Codes / Marcel Fernandez ; Joseph Cotrina ; Miguel Soriano ; Neus Domingo
A Generic Authentication LoA Derivation Model / Li Yao ; Ning Zhang
Applications of Cryptography and Information Hiding
Media-Break Resistant eSignatures in eGovernment: An Austrian Experience / Herbert Leitold ; Reinhard Posch ; Thomas Rössler
How to Bootstrap Security for Ad-Hoc Network: Revisited / Wook Shin ; Carl A. Gunter ; Shinsaku Kiyomoto ; Kazuhide Fukushima ; Toshiaki Tanaka
Steganalysis of Hydan / Jorge Blasco ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Arturo Ribagorda ; Miguel A. Orellana-Quiros
Trusted Computing
On the Impossibility of Detecting Virtual Machine Monitors / Shay Gueron ; Jean-Pierre Seifert
Implementation of a Trusted Ticket System / Andreas Leicher ; Nicolai Kuntze ; Andreas U. Schmidt
Security Policies
A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor / Guillermo Navarro-Arribas ; Joaquin Garcia-Alfaro
A Policy Language for Modelling Recommendations / Anas Abou El Kalam ; Philippe Balbiani
Validation, Verification, Evaluation
On the Security Validation of Integrated Security Solutions / Andreas Fuchs ; Sigrid Gürgens ; Carsten Rudolph
Verification of Security Policy Enforcement in Enterprise Systems / Puneet Gupta ; Scott D. Stoller
Optimization of the Controlled Evaluation of Closed Relational Queries / Joachim Biskup ; Jan-Hendrik Lochner ; Sebastian Sonntag
Privacy Protection - Security Assessment
Collaborative Privacy - A Community-Based Privacy Infrastructure / Jan Kolter ; Thomas Kernchen ; Günther Pernul
Security and Privacy Improvements for the Belgian eID Technology / Pieter Verhaeghe ; Jorn Lapon ; Bart De Decker ; Vincent Naessens ; Kristof Verslype
A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components / Thomas Brandstetter ; Konstantin Knorr ; Ute Rosenbaum
Role Mining and Content Protection
Mining Stable Roles in RBAC / Alessandro Colantonio ; Roberto Di Pietro ; Alberto Ocello ; Nino Vincenzo Verde
Privacy-Preserving Content-Based Publish/Subscribe Networks / Abdullatif Shikfa ; Melek Önen ; Refik Molva
Broadcast Encryption for Differently Privileged / Hongxia Jin ; Jeffery Lotspiech
Ontology-Based Secure XML Content Distribution / Mohammad Ashiqur Rahaman ; Yves Roudier ; Philip Miseldine ; Andreas Schaad
Security Protocols
NGBPA Next Generation BotNet Protocol Analysis / Felix S. Leder ; Peter Martini
Non-repudiation Analysis with LYSA / Mayla Brusò ; Agostino Cortesi
A Provably Secure Secret Handshake with Dynamic Controlled Matching / Alessandro Sorniotti
Towards a Theory of White-Box Security / Haya Shulman ; Amitabh Saxena ; Bruno Crispo
Access Control
On a Taxonomy of Delegation / Quan Pham ; Jason Reid ; Adrian McCullagh ; Ed Dawson
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios / Carlo Blundo ; Stelvio Cimato ; Sabrina De Capitani di Vimercati ; Alfredo De Santis ; Sara Foresti ; Stefano Paraboschi ; Pierangela Samarati
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications
Automating Access Control Logics in Simple Type Theory with LEO-II / Christoph Benzmüller
Internet and Web Applications Security
In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security / Yianna Danidou ; Burkhard Schafer
Persona: Network Layer Anonymity and Accountability for Next Generation Internet / Yannis Mallios ; Sudeep Modi ; Aditya Agarwala ; Christina Johns
Jason: A Scalable Reputation System for the Semantic Web / Sandra Steinbrecher ; Stephan Gro? ; Markus Meichau
Which Web Browsers Process SSL Certificates in a Standardized Way? / Ahmad Samer Wazan ; Romain Laborde ; David W. Chadwick ; François Barrere ; AbdelMalek Benzekri
Author Index
Identification and Authentication I
Flexible and Transparent User Authentication for Mobile Devices / Nathan Clarke ; Sevasti Karatzouni ; Steven Furnell
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable / Amir Herzberg
10.

電子ブック

EB
ISC 2005, Takeo Kanade, Jianying Zhou, Robert H. Deng, Javier Lopez
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼