×







We sell 100% Genuine & New Books only!

Foundations and Practice of Security 5th International Symposium on Foundations and Practice of Security at Meripustak

Foundations and Practice of Security 5th International Symposium on Foundations and Practice of Security by Joaquin Garcia-Alfaro, Frederic Cuppens , Springer

Books from same Author: Joaquin Garcia-Alfaro, Frederic Cuppens

Books from same Publisher: Springer

Related Category: Author List / Publisher List


  • Price: ₹ 16834.00/- [ 7.00% off ]

    Seller Price: ₹ 15655.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Joaquin Garcia-Alfaro, Frederic Cuppens
    PublisherSpringer
    ISBN9783642371189
    Pages383
    BindingPaperback
    LanguageEnglish
    Publish YearApril 2013

    Description

    Springer Foundations and Practice of Security 5th International Symposium on Foundations and Practice of Security by Joaquin Garcia-Alfaro, Frederic Cuppens

    This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012. _x000D_The book contains a revised version of 21 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security._x000D_ Table of contents :- _x000D_ Cryptography and Information Theory.- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption.- Proofs of Retrievability via Fountain Code.- MARC: Modified ARC4.- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements.- Key Management and Cryptographic Protocols.- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes.- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities.- COMPASS: Authenticated Group Key Agreement from Signcryption.- Privacy and Trust.- Classifying Online Social Network Users through the Social Graph.- A Formal Derivation of Composite Trust.- Policies and Applications Security.- Policy Administration in Tag-Based Authorization.- Enabling Dynamic Security Policy in the Java Security Manager.- A Novel Obfuscation: Class Hierarchy Flattening.- RESource: A Framework for Online Matching of Assembly with Open Source Code.- Touchjacking Attacks on Web in Android, iOS, and Windows Phone.- Network and Adaptive Security.- Short-Term Linkable Group Signatures with Categorized Batch Verification.- GHUMVEE: Efficient, Effective, and Flexible Replication.- Extracting Attack Scenarios Using Intrusion Semantics.- On Securely Manipulating XML Data.- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks.- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs.- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC.- Short Papers.- Towards Modelling Adaptive Attacker's Behaviour.- Scalable Deniable Group Key Establishment.- Information-Theoretic Foundations of Differential Privacy._x000D_



    Book Successfully Added To Your Cart