|
Showing 1 - 6 of
6 matches in All Departments
This book makes the case that traditional security design does not
take the end-user into consideration, and therefore, fails. This
book goes on to explain, using a series of examples, how to rethink
security solutions to take users into consideration. By
understanding the limitations and habits of users - including
malicious users, aiming to corrupt the system - this book
Illustrates how better security technologies are made possible.
Traditional security books focus on one of the following areas:
cryptography, security protocols, or existing standards. They
rarely consider the end user as part of the security equation, and
when they do, it is in passing. This book considers the end user as
the most important design consideration, and then shows how to
build security and privacy technologies that are both secure and
which offer privacy. This reduces the risk for social engineering
and, in general, abuse. Advanced-level students interested in
software engineering, security and HCI (Human Computer Interaction)
will find this book useful as a study guide. Engineers and security
practitioners concerned with abuse and fraud will also benefit from
the methodologies and techniques in this book.
This book describes trends in email scams and offers tools and
techniques to identify such trends. It also describes automated
countermeasures based on an understanding of the type of persuasive
methods used by scammers. It reviews both consumer-facing scams and
enterprise scams, describing in-depth case studies relating to
Craigslist scams and Business Email Compromise Scams. This book
provides a good starting point for practitioners, decision makers
and researchers in that it includes alternatives and complementary
tools to the currently deployed email security tools, with a focus
on understanding the metrics of scams. Both professionals working
in security and advanced-level students interested in privacy or
applications of computer science will find this book a useful
reference.
This book describes trends in email scams and offers tools and
techniques to identify such trends. It also describes automated
countermeasures based on an understanding of the type of persuasive
methods used by scammers. It reviews both consumer-facing scams and
enterprise scams, describing in-depth case studies relating to
Craigslist scams and Business Email Compromise Scams. This book
provides a good starting point for practitioners, decision makers
and researchers in that it includes alternatives and complementary
tools to the currently deployed email security tools, with a focus
on understanding the metrics of scams. Both professionals working
in security and advanced-level students interested in privacy or
applications of computer science will find this book a useful
reference.
"Mobile Authentication: Problems and Solutions" looks at
human-to-machine authentication, with a keen focus on the mobile
scenario. Human-to-machine authentication is a startlingly complex
issue. In the old days of computer security-before 2000, the human
component was all but disregarded. It was either assumed that
people should and would be able to follow instructions, or that end
users were hopeless and would always make mistakes. The truth, of
course, is somewhere in between, which is exactly what makes this
topic so enticing. We cannot make progress with human-to-machine
authentication without understanding both humans and machines.
Mobile security is not simply security ported to a handset.
Handsets have different constraints than traditional computers, and
are used in a different way. Text entry is more frustrating, and
therefore, it is tempting to use shorter and less complex
passwords. It is also harder to detect spoofing. We need to design
with this in mind. We also need to determine how exactly to
integrate biometric readers to reap the maximum benefits from them.
This book addresses all of these issues, and more.
The second International Conference on Applied Cryptography and
Network Security (ACNS 2004) was sponsored and organized by ICISA
(the International Communications and Information Security
Association). It was held in Yellow Mountain, China, June 8-11,
2004. The conference proceedings, representing papers from the
academic track, are published in this volume of the Lecture Notes
in Computer Science (LNCS) of Springer-Verlag. The area of research
that ACNS covers has been gaining importance in recent years due to
the development of the Internet, which, in turn, implies global
exposure of computing resources. Many ?elds of research were
covered by the program of this track, presented in this proceedings
volume. We feel that the papers herein indeed re?ect the state of
the art in security and cryptography research, worldwide. The
program committee of the conference received a total of 297
submissions from all over the world, of which 36 submissions were
selected for presentation during the academic track. In addition to
this track, the conference also hosted a technical/industrial track
of presentations that were carefully selected as well. All
submissions were reviewed by experts in the relevant areas.
|
Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, …
|
R3,545
Discovery Miles 35 450
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of 5 workshops held
at the 21st International Conference on Financial Cryptography and
Data Security, FC 2017, in Sliema, Malta, in April 2017.The 39 full
papers presented were carefully reviewed and selected from 96
submissions. They feature the outcome of the 5th Workshop on
Encrypted Computing and Applied Homomorphic Cryptography, WAHC
2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN
2017, the Second Workshop on Secure Voting Systems, VOTING 2017,
the First Workshop on Trusted Smart Contracts, WTSC 2017, and the
First Workshop on Targeted Attacks, TA 2017.The papers are grouped
in topical sections named: encrypted computing and applied
homomorphic cryptography; bitcoin and blockchain research; advances
in secure electronic voting schemes; trusted smart contracts;
targeted attacks.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|