Secure IT Systems [E-Book]: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 – November 2, 2012. Proceedings / edited by Audun Jøsang, Bengt Carlsson.
Carlsson, Bengt.
Jøsang, Audun.
Berlin, Heidelberg : Springer Berlin Heidelberg : 2012
Imprint: Springer,
X, 247 p. 62 illus. digital.
Lecture notes in computer science ; 7617
Full Text
Table of Contents:
  • Designed to Fail: A USB-Connected Reader for Online Banking
  • Security Add-Ons for Mobile Platforms
  • THAPS: Automated Vulnerability Scanning of PHP Applications
  • Cyber security exercises and competitions as a platform for cyber security experiments
  • The Development of Cyber Security Warning, Advice & Report Points
  • Towards an Empirical Examination of IT Security Infrastructures in SME
  • How to Select a Security Requirements Method? A comparative study with students and practitioners
  • There is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication
  • Coinductive Unwinding of Security-Relevant
  • Retooling and Securing Systemic Debugging
  • Cracking Associative Passwords
  • A Hybrid Approach for Highly Available & Secure Storage of Pseudo-SSO Credentials
  • Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links
  • Everything but the Kitchen Sink: Determining the effect of multiple attacks on privacy preserving technology users
  • Can We Identify Manipulative Behavior and the Corresponding Suspects on Review Websites using Supervised Learning?
  • Privacy-Friendly Cloud Storage for the Data Track..