Fr. 70.00

Security and Trust Management - 20th International Workshop, STM 2024, Bydgoszcz, Poland, September 19-20, 2024, Proceedings

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This book constitutes the refereed proceedings of the 20th International Workshop on Security and Trust Management (ERCIM STM 2024), held in Bydgoszcz, Poland, during September 19-20, 2024 and co-located with ESORICS 2024 conference.
The 6 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 22 submissions. 
They were organized in topical sections as follows: Trust, Anonymity and Identity; Cryptography, Secure Computation and Formal Methods; Operating Systems and Application Security.

List of contents

.- Trust, Anonymity and Identity.
.- DrATC: Dynamic routing Algorithm based on Trust Characteristics.
.- Distributed Dynamic Self-Control Anonymity Management Model.
.- Machines Have Identities Too! Extending NIST's SP 800-63 for Device Identity.
.- Cryptography, Secure Computation and Formal Methods.
.- On beta-separating sets and deterministic factoring.
.- Statistically secure multiparty computation of a biased coin.
.- A Formal Approach For Modelling And Analysing Surgical Procedures.
.- Operating Systems and Application Security.
.- Flexible and Secure Process Confinement with eBPF.
.- Dynamic Analysis for Explainable Fine-grained Android Malware Detection.
.- A portable research honeypot for corporate network.
.- Unleashing AI in Ethical Hacking.

Product details

Assisted by Fabio Martinelli (Editor), Rios (Editor), Ruben Rios (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.12.2024
 
EAN 9783031763700
ISBN 978-3-0-3176370-0
No. of pages 153
Dimensions 155 mm x 9 mm x 235 mm
Weight 260 g
Illustrations X, 153 p. 32 illus., 23 illus. in color.
Series Lecture Notes in Computer Science
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

Netzwerksicherheit, Software Engineering, Data Mining, angewandte informatik, Security, Privacy, Identity, Netzwerk-Hardware, Wissensbasierte Systeme, Expertensysteme, Malware, Trust, Intrusion Detection, cryptography, Data and Information Security, Computer and Information Systems Applications, Computer Communication Networks, Data Mining and Knowledge Discovery, Security Services, formal methods, Confinement, secure computation, Anonymity

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.