: 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24–25, 2015 Proceedings
First Statement of Responsibility
\ Raja Naeem Akram, Sushil Jajodia (eds.)
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Cham
Name of Publisher, Distributor, etc.
: Springer
Date of Publication, Distribution, etc.
, 2015
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource (xii, 281 p.)
Other Physical Details
:ill.
SERIES
Series Title
Lecture notes in computer science
Series Title
LNCS sublibrary. SL 4, Security and cryptology
Volume Designation
; 9311
GENERAL NOTES
Text of Note
International conference proceedings
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Index
Text of Note
Bibliography
CONTENTS NOTE
Text of Note
Security and Privacy Services On Secrecy Amplification Protocols Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols Private Minutia-based Fingerprint Matching Secure Resource Sharing and Access Control Secure Resource Sharing for Embedded Protected Module Architectures Secure Obfuscation of Authoring Style DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption WSACd A Usable Access Control Framework for Smart Home Devices.-Secure Devices and Execution Environment Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques Practical and Privacy-Preserving TEE Migration Randomizing the Montgomery Powering Ladder Challenges of Security and Reliability How Current Android Malware Seeks to Evade Automated Code Analysis On linkability and malleability in self-blindable credentials Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality Short Papers Normalizing Security Events with a Hierarchical Knowledge Base Attack Tree Generation by Policy Invalidation Lightweight Password Hashing Scheme for Embedded Systems Secure and Authenticated Access to LLN Resources Through Policy Constraints