This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located with the 25th European Symposium on Research in Computer Security, ESORICS 2020. The conference was planned to take place in Guildford, UK, but had to be moved to an online format due to the COVID-19 pandemic. The workshop took place during September 17-18, 2020. The 8 papers presented in this volume were carefully reviewed and selected from 20 submissions. They were organized in topical sections on security properties and attacks; confidentiality schema and security processes.…mehr
This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located with the 25th European Symposium on Research in Computer Security, ESORICS 2020. The conference was planned to take place in Guildford, UK, but had to be moved to an online format due to the COVID-19 pandemic. The workshop took place during September 17-18, 2020. The 8 papers presented in this volume were carefully reviewed and selected from 20 submissions. They were organized in topical sections on security properties and attacks; confidentiality schema and security processes.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Security Properties and Attacks.- Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties.- Reducing the Forensic Footprint with Android Accessibility Attacks.- A Novel Machine Learning Methodology for Detecting Phishing Attacks in Real Time.- Confidentiality Schema.- Revocable access to encrypted message boards.- Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0.- Security Processes.- Improved Feature Engineering for Free-Text Keystroke Dynamics.- Subversion-Resistant Commitment Schemes: Definitions and Constructions.- Challenges in IT Security Processes and Solution Approaches with Process Mining.
Security Properties and Attacks.- Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties.- Reducing the Forensic Footprint with Android Accessibility Attacks.- A Novel Machine Learning Methodology for Detecting Phishing Attacks in Real Time.- Confidentiality Schema.- Revocable access to encrypted message boards.- Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0.- Security Processes.- Improved Feature Engineering for Free-Text Keystroke Dynamics.- Subversion-Resistant Commitment Schemes: Definitions and Constructions.- Challenges in IT Security Processes and Solution Approaches with Process Mining.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826