000
|
|
nam5i |
001
|
|
2210080934352 |
003
|
|
DE-He213 |
005
|
|
20250321105356 |
007
|
|
cr nn 008mamaa |
008
|
|
240617s2024 sz | s |||| 0|eng d |
020
|
|
▼a9783031603914▼9978-3-031-60391-4 |
024
|
|
▼a10.1007/978-3-031-60391-4▼2doi |
040
|
|
▼a221008 |
050
|
|
▼aQA76.9.A25 |
072
|
|
▼aUR▼2bicssc |
072
|
|
▼aUTN▼2bicssc |
072
|
|
▼aCOM053000▼2bisacsh |
072
|
|
▼aUR▼2thema |
072
|
|
▼aUTN▼2thema |
082
|
|
▼a005.8▼223 |
245
|
00 |
▼aInformation Security Theory and Practice▼h[electronic resource] :▼b14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 – March 1, 2024, Proceedings /▼cedited by Samia Bouzefrane, Damien Sauveron. |
250
|
|
▼a1st ed. 2024. |
264
|
|
▼aCham :▼bSpringer Nature Switzerland :▼bImprint: Springer,▼c2024. |
300
|
|
▼aX, 195 p. 65 illus., 46 illus. in color.▼bonline resource. |
336
|
|
▼atext▼btxt▼2rdacontent |
337
|
|
▼acomputer▼bc▼2rdamedia |
338
|
|
▼aonline resource▼bcr▼2rdacarrier |
347
|
|
▼atext file▼bPDF▼2rda |
490
|
|
▼aLecture Notes in Computer Science,▼x1611-3349 ;▼v14625 |
505
|
|
▼a -- SPAWN: Seamless Proximity-based Authentication by Utilizing the Existent WiFi Environment. -- MQfilTTr: Strengthening Smart Home Privacy through MQTT Traffic Manipulation. -- Combining Cryptography and Discrete-Event Systems to Study Sensor and Actuator Cyberattacks. -- Towards Interconnected Quantum Networks: A Requirements Analysis. -- A similarity approach for the classification of mitigations in public cybersecurity repositories into NIST-SP 800-53 catalog. -- Top Cyber Threats: The rise of Ransomware. -- Enhancing security in Blockchain enabled IoT networks empowered with zk -SNARKs and Physically Unclonable Functions. -- Security Challenges and Countermeasures in Blockchain's Peer-to-Peer Architecture. -- A Bitcoin-based Digital Identity Model for the Internet of Things. -- Towards a Time-dependent Approach for User Privacy Expression and Enforcement. -- Privacy preserving Federated Learning : A novel approach for combining Differential Privacy and Homomorphic Encryption. -- Distributed Backdoor Attacks in Federated Learning Generated by Dynamic Triggers. |
520
|
|
▼aThis volume constitutes the refereed proceedings of the 14th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2024, held in Paris, France. The 12 full papers presented were carefully reviewed and selected from 30 submissions. The papers presented in this proceedings focus on emerging trends in security and privacy, including experimental studies of fielded systems while exploring the application of security technology, and highlighting successful system implementations. |
650
|
|
▼aData protection. |
650
|
|
▼aCryptography. |
650
|
|
▼aData encryption (Computer science). |
650
|
|
▼aComputer networks▼xSecurity measures. |
650
|
|
▼aComputer networks . |
650
|
|
▼aApplication software. |
650
|
|
▼aData and Information Security. |
650
|
|
▼aCryptology. |
650
|
|
▼aMobile and Network Security. |
650
|
|
▼aComputer Communication Networks. |
650
|
|
▼aComputer and Information Systems Applications. |
700
|
|
▼aBouzefrane, Samia.▼eeditor.▼0(orcid)0000-0002-0979-1289▼1https://orcid.org/0000-0002-0979-1289▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aSauveron, Damien.▼eeditor.▼0(orcid)0000-0001-7948-6143▼1https://orcid.org/0000-0001-7948-6143▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
710
|
|
▼aSpringerLink (Online service) |
773
|
|
▼tSpringer Nature eBook |
776
|
|
▼iPrinted edition:▼z9783031603907 |
776
|
|
▼iPrinted edition:▼z9783031603921 |
830
|
|
▼aLecture Notes in Computer Science,▼x1611-3349 ;▼v14625 |
856
|
|
▼uhttps://doi.org/10.1007/978-3-031-60391-4 |
912
|
|
▼aZDB-2-SCS |
912
|
|
▼aZDB-2-SXCS |
912
|
|
▼aZDB-2-LNC |
950
|
|
▼aComputer Science (SpringerNature-11645) |
950
|
|
▼aComputer Science (R0) (SpringerNature-43710) |