|
Showing 1 - 4 of
4 matches in All Departments
|
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu
|
R1,636
Discovery Miles 16 360
|
Ships in 10 - 15 working days
|
This two-volume set LNICST 254-255 constitutes the post-conference
proceedings of the 14thInternational Conference on Security and
Privacy in Communication Networks, SecureComm 2018, held in
Singapore in August 2018. The 33 full and 18 short papers were
carefully reviewed and selected from 108 submissions. The papers
are organized in topical sections on IoT security, user and data
privacy, mobile security, wireless security, software security,
cloud security, social network and enterprise security, network
security, applied cryptography, and web security.
This book investigates tradeoff between security and usability in
designing leakage resilient password systems (LRP) and introduces
two practical LRP systems named Cover Pad and ShadowKey. It
demonstrates that existing LRP systems are subject to both brute
force attacks and statistical attacks and that these attacks cannot
be effectively mitigated without sacrificing the usability of LRP
systems. Quantitative analysis proves that a secure LRP system in
practical settings imposes a considerable amount of cognitive
workload unless certain secure channels are involved. The book
introduces a secure and practical LRP system, named Cover Pad, for
password entry on touch-screen mobile devices. Cover Pad leverages
a temporary secure channel between a user and a touch screen which
can be easily realized by placing a hand shielding gesture on the
touch screen. The temporary secure channel is used to deliver a
hidden message to the user for transforming each password symbol
before entering it on the touch screen. A user study shows the
impact of these testing conditions on the users' performance in
practice. Finally, this book introduces a new LRP system named
ShadowKey. Shadow Key is designed to achieve better usability for
leakage resilient password entry. It leverages either a permanent
secure channel, which naturally exists between a user and the
display unit of certain mobile devices, or a temporary secure
channel, which can be easily realized between a user and a touch
screen with a hand-shielding gesture. The secure channel protects
the mappings between original password symbols and associated
random symbols. Unlike previous LRP system users, Shadow Key users
do not need to remember anything except their passwords. Leakage
Resilient Password Systems is designed for professionals working in
the security industry. Advanced-level students studying computer
science and electrical engineering will find this brief full of
useful material.
As a fast-evolving new area, RFID security and privacy has quickly
grown from a hungry infant to an energetic teenager during recent
years. Much of the exciting development in this area is summarized
in this book with rigorous analyses and insightful comments. In
particular, a systematic overview on RFID security and privacy is
provided at both the physical and network level. At the physical
level, RFID security means that RFID devices should be identified
with assurance in the presence of attacks, while RFID privacy
requires that RFID devices should be identified without disclosure
of any valuable information about the devices. At the network
level, RFID security means that RFID information should be shared
with authorized parties only, while RFID privacy further requires
that RFID information should be shared without disclosure of
valuable RFID information to any honest-but-curious server which
coordinates information sharing. Not only does this book summarize
the past, but it also provides new research results, especially at
the network level. Several future directions are envisioned to be
promising for advancing the research in this area.
|
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu
|
R1,662
Discovery Miles 16 620
|
Ships in 10 - 15 working days
|
This two-volume set LNICST 254-255 constitutes the post-conference
proceedings of the 14thInternational Conference on Security and
Privacy in Communication Networks, SecureComm 2018, held in
Singapore in August 2018. The 33 full and 18 short papers were
carefully reviewed and selected from 108 submissions. The papers
are organized in topical sections on IoT security, user and data
privacy, mobile security, wireless security, software security,
cloud security, social network and enterprise security, network
security, applied cryptography, and web security.
|
You may like...
Aladdin
Robin Williams, Scott Weinger, …
Blu-ray disc
R206
Discovery Miles 2 060
Barbie
Margot Robbie, Ryan Gosling
Blu-ray disc
R266
Discovery Miles 2 660
|