Narrow your search

Library

Odisee (6)

Thomas More Kempen (6)

Thomas More Mechelen (6)

UCLL (6)

VIVES (6)

AP (4)

KDG (4)

KU Leuven (4)

LUCA School of Arts (3)

ULB (3)

More...

Resource type

book (9)

digital (4)


Language

English (13)


Year
From To Submit

2018 (4)

2015 (2)

2014 (3)

2012 (1)

2011 (2)

More...
Listing 1 - 10 of 13 << page
of 2
>>
Sort by

Digital
Data and Applications Security and Privacy XXV : 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings
Author:
ISBN: 9783642223488 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Book
Data and Applications Security and Privacy XXV
Authors: ---
ISBN: 9783642223488 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.


Book
Radio frequency identification system security : RFIDsec' 12 Asia Workshop proceedings
Authors: ---
ISBN: 1283920328 161499143X 9781614991434 9781614991427 Year: 2012 Publisher: Amsterdam ; Washington, DC : IOS Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The revolution in information management, brought about in recent years by advances in computer science, has presented many challenges in the field of security and privacy technology.This book presents the proceedings of RFIDsec'12 Asia, the 2012 workshop on radio frequency identification (RFID) and the internet of things (IoT) Security held in Taipei, Taiwan, in November 2012. RFIDsec'12 Asia provides researchers, enterprises and governments with a platform to investigate, discuss and propose new solutions to security and privacy issues relating to RFID/IoT technologies and applications.Some of the topics covered in the nine papers included here are: entity relationship extraction and the design of secure API on IoT; practical relay attack implementation; path-checking protocol; secure EPC global Network Services; and the analysis of mutual authentication on RFID.This book will be of interest to all those involved in the field of information management and security.


Book
Leakage Resilient Password Systems
Authors: --- ---
ISBN: 9783319175034 3319175025 9783319175027 3319175033 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP systems. Quantitative analysis proves that a secure LRP system in practical settings imposes a considerable amount of cognitive workload unless certain secure channels are involved. The book introduces a secure and practical LRP system, named Cover Pad, for password entry on touch-screen mobile devices. Cover Pad leverages a temporary secure channel between a user and a touch screen which can be easily realized by placing a hand shielding gesture on the touch screen. The temporary secure channel is used to deliver a hidden message to the user for transforming each password symbol before entering it on the touch screen. A user study shows the impact of these testing conditions on the users' performance in practice. Finally, this book introduces a new LRP system named ShadowKey. Shadow Key is designed to achieve better usability for leakage resilient password entry. It leverages either a permanent secure channel, which naturally exists between a user and the display unit of certain mobile devices, or a temporary secure channel, which can be easily realized between a user and a touch screen with a hand-shielding gesture. The secure channel protects the mappings between original password symbols and associated random symbols. Unlike previous LRP system users, Shadow Key users do not need to remember anything except their passwords. Leakage Resilient Password Systems is designed for professionals working in the security industry. Advanced-level students studying computer science and electrical engineering will find this brief full of useful material.

Keywords

Computer Science. --- Systems and Data Security. --- Information Systems and Communication Service. --- Communications Engineering, Networks. --- Data Encryption. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Information systems. --- Telecommunication. --- Informatique --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Télécommunications --- Data encryption (Computer scienc. --- Engineering & Applied Sciences --- Computer Science --- Information storage and retrieval systems --- Systèmes d'information --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computers. --- Electrical engineering. --- Data protection --- Security systems --- Hacking --- Electric engineering --- Engineering --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Cryptology. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting


Book
RFID security and privacy
Authors: --- ---
ISBN: 9781627053266 9781627053259 Year: 2014 Publisher: San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) Morgan & Claypool

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Digital
Leakage Resilient Password Systems
Authors: --- ---
ISBN: 9783319175034 9783319175041 9783319175027 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP systems. Quantitative analysis proves that a secure LRP system in practical settings imposes a considerable amount of cognitive workload unless certain secure channels are involved. The book introduces a secure and practical LRP system, named Cover Pad, for password entry on touch-screen mobile devices. Cover Pad leverages a temporary secure channel between a user and a touch screen which can be easily realized by placing a hand shielding gesture on the touch screen. The temporary secure channel is used to deliver a hidden message to the user for transforming each password symbol before entering it on the touch screen. A user study shows the impact of these testing conditions on the users' performance in practice. Finally, this book introduces a new LRP system named ShadowKey. Shadow Key is designed to achieve better usability for leakage resilient password entry. It leverages either a permanent secure channel, which naturally exists between a user and the display unit of certain mobile devices, or a temporary secure channel, which can be easily realized between a user and a touch screen with a hand-shielding gesture. The secure channel protects the mappings between original password symbols and associated random symbols. Unlike previous LRP system users, Shadow Key users do not need to remember anything except their passwords. Leakage Resilient Password Systems is designed for professionals working in the security industry. Advanced-level students studying computer science and electrical engineering will find this brief full of useful material.


Book
RFID Security and Privacy
Authors: --- ---
ISBN: 3031023404 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.


Book
Security and Privacy in Communication Networks : 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II
Authors: --- --- ---
ISBN: 3030017044 3030017036 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security.


Book
Security and Privacy in Communication Networks : 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I
Authors: --- --- ---
ISBN: 303001701X 3030017001 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security.


Digital
Security and Privacy in Communication Networks : 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I
Authors: --- --- ---
ISBN: 9783030017019 Year: 2018 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security.

Listing 1 - 10 of 13 << page
of 2
>>
Sort by