| Título : |
15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Heng, Swee-Huay, ; López, Javier., |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2019 |
| Número de páginas: |
XIII, 490 p. 130 ilustraciones, 59 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-34339-2 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Computadoras y sociedad Ingeniería Informática y Redes Seguridad de datos e información Computadoras y civilización Red informática Protección de datos Ingeniería Informática |
| Índice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de la 15.ª Conferencia Internacional sobre Prácticas y Experiencias en Seguridad de la Información, ISPEC 2019, celebrada en Kuala Lumpur, Malasia, en noviembre de 2019. Los 21 artículos completos y 7 breves presentados en este volumen fueron cuidadosamente revisados y seleccionados entre 68 presentaciones. Se organizaron en las siguientes secciones temáticas: Criptografía I, Seguridad de sistemas y redes, Protocolo y herramienta de seguridad, Control de acceso y autenticación, Criptografía II, Privacidad de datos y usuarios, Documento breve I y Documento breve II. |
| Nota de contenido: |
Cryptography I -- Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model -- A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme -- Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme -- Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE -- System and Network Security -- KMO : Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism -- Peel the onion: Recognition of Android apps behind the Tor Network -- JSLess: A Tale of a Fileless Javascript Memory-Resident Malware -- Security Protocol and Tool -- A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation -- Secure Best Arm Identification in Multi-Armed Bandits -- CATCHA: When Cats Track Your Movements Online -- Designing a Code Vulnerability Meta-Scanner -- Access Control and Authentication -- Using IFTTT to Express and Enforce UCON Obligations -- Evaluation of Software PUF Based on Gyroscope -- White-Box Implementation of the KMAC Message Authentication Code -- Cryptography II -- Improving Signature Schemes With Tight Security Reductions -- Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings -- Identity-based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios -- Recovering Internal States of Grain-v1 -- Data and User Privacy -- GDPR-Compliant Reputation System Based on Self-Certifying Domain Signatures -- Defining a new composite cybersecurity rating scheme for SMEs in the U.K. -- Privacy Preserving Approach in Dynamic Social Network Data Publishing -- Short Paper I -- Using Freivalds' algorithm to accelerate Lattice-Based Signature Verifications -- Group-based Key Exchange Protocol based on Complete Decomposition Search Problem -- Development Activities, Tools and Techniques of Secure Microservices Compositions -- Generating Phishing Emails Using Graph Database.-Short Paper II -- Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection -- The (Persistent) Threat of Weak Passwords: Implementation of a Semi-Automatic Password-Cracking Algorithm -- A Novel and Comprehensive Evaluation Methodology for SIEM. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings [documento electrónico] / Heng, Swee-Huay, ; López, Javier., . - 1 ed. . - [s.l.] : Springer, 2019 . - XIII, 490 p. 130 ilustraciones, 59 ilustraciones en color. ISBN : 978-3-030-34339-2 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Computadoras y sociedad Ingeniería Informática y Redes Seguridad de datos e información Computadoras y civilización Red informática Protección de datos Ingeniería Informática |
| Índice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de la 15.ª Conferencia Internacional sobre Prácticas y Experiencias en Seguridad de la Información, ISPEC 2019, celebrada en Kuala Lumpur, Malasia, en noviembre de 2019. Los 21 artículos completos y 7 breves presentados en este volumen fueron cuidadosamente revisados y seleccionados entre 68 presentaciones. Se organizaron en las siguientes secciones temáticas: Criptografía I, Seguridad de sistemas y redes, Protocolo y herramienta de seguridad, Control de acceso y autenticación, Criptografía II, Privacidad de datos y usuarios, Documento breve I y Documento breve II. |
| Nota de contenido: |
Cryptography I -- Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model -- A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme -- Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme -- Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE -- System and Network Security -- KMO : Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism -- Peel the onion: Recognition of Android apps behind the Tor Network -- JSLess: A Tale of a Fileless Javascript Memory-Resident Malware -- Security Protocol and Tool -- A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation -- Secure Best Arm Identification in Multi-Armed Bandits -- CATCHA: When Cats Track Your Movements Online -- Designing a Code Vulnerability Meta-Scanner -- Access Control and Authentication -- Using IFTTT to Express and Enforce UCON Obligations -- Evaluation of Software PUF Based on Gyroscope -- White-Box Implementation of the KMAC Message Authentication Code -- Cryptography II -- Improving Signature Schemes With Tight Security Reductions -- Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings -- Identity-based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios -- Recovering Internal States of Grain-v1 -- Data and User Privacy -- GDPR-Compliant Reputation System Based on Self-Certifying Domain Signatures -- Defining a new composite cybersecurity rating scheme for SMEs in the U.K. -- Privacy Preserving Approach in Dynamic Social Network Data Publishing -- Short Paper I -- Using Freivalds' algorithm to accelerate Lattice-Based Signature Verifications -- Group-based Key Exchange Protocol based on Complete Decomposition Search Problem -- Development Activities, Tools and Techniques of Secure Microservices Compositions -- Generating Phishing Emails Using Graph Database.-Short Paper II -- Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection -- The (Persistent) Threat of Weak Passwords: Implementation of a Semi-Automatic Password-Cracking Algorithm -- A Novel and Comprehensive Evaluation Methodology for SIEM. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |