Security and Privacy in Communication Networks [E-Book] : 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II / edited by Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung.
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were care...
Saved in:
Full text |
|
Personal Name(s): | Debar, Hervé, editor |
Garcia-Alfaro, Joaquin, editor / Li, Shujun, editor / Poovendran, Radha, editor / Yung, Moti, editor | |
Edition: |
1st edition 2021. |
Imprint: |
Cham :
Springer,
2021
|
Physical Description: |
XVII, 527 pages 138 illustrations, 96 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783030900229 |
DOI: |
10.1007/978-3-030-90022-9 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;
399 |
Subject (LOC): |
- Anonymous Short Communications over Social Networks
- A Sybil detection method in OSN based on DistilBERT and Double-SN-LSTM for text analysis
- ePayment Security 31 An Empirical Study on Mobile Payment Credential Leaks and Their Exploits
- System-Wide Security for Offline Payment Terminals
- Horus: A Security Assessment Framework for Android Crypto Wallets
- Systems Security
- Leakuidator: Leaky resource attacks and countermeasures
- Jabbic lookups: a backend telemetry-based system for malware triage Octavian
- Facilitating Parallel Fuzzing with Mutually-exclusive Task Distribution
- Flowrider: Fast On-Demand Key Provisioning for CloudNetworks
- Mobile Security & Privacy
- Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google Douglas Leith
- Who's Accessing My Data? Application-Level Access Control for Bluetooth Low Energy
- HTPD: Secure and Flexible Message-Based Communication for Mobile Apps
- Smartphone Location Spoofing Attack in Wireless Networks
- IoT Security & Privacy 42 Compromised through Compression
- iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-physical Systems.