Warehouse Stock Clearance Sale

Grab a bargain today!


Sign Up for Fishpond's Best Deals Delivered to You Every Day
Go
Identity and Privacy in ­the Internet Age
14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology)
By Audun Josang (Volume editor), Torleiv Maseng (Volume editor), Svein J. Knapskog (Volume editor)

Rating
Format
Paperback, 303 pages
Published
Germany, 1 September 2009

The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic countries - thereby establishing a forum for discussions and co-operation between universities, industry and computer societies. Since then, the workshop has developed into a fully fledged inter- tional information security conference, held in the Nordic countries on a round robin basis. The 14th Nordic Conference on Secure IT Systems was held in Oslo on 14-16 October 2009. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile n- works under an increasingly serious threat picture. Among the contemporary security issues discussed were security services modeling, Petri nets, attack graphs, electronic voting schemes, anonymous payment schemes, mobile ID-protocols, SIM cards, n- work embedded systems, trust, wireless sensor networks, privacy, privacy disclosure regulations, financial cryptography, PIN verification, temporal access control, random number generators, and some more. As a pre-cursor to the conference proper, the Nordic Security Day on Wednesday 14 October hosted talks by leading representatives from industry, academia and the g- ernment sector, and a press conference was given.


Session 1: Anonymity and Privacy.- On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market.- Facilitating the Adoption of Tor by Focusing on a Promising Target Group.- A Parallelism-Based Approach to Network Anonymization.- Security Usability of Petname Systems.- Session 2: Modelling and Design.- An Analysis of Widget Security.- Trade-Offs in Cryptographic Implementations of Temporal Access Control.- Blunting Differential Attacks on PIN Processing APIs.- Session 3: Network Layer Security.- Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic.- An Improved Attack on TKIP.- Session 4: Security for Mobile Users.- ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System.- A Mechanism for Identity Delegation at Authentication Level.- Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services.- Towards True Random Number Generation in Mobile Environments.- Session 5: Embedded Systems and Mechanisms.- Towards Modelling Information Security with Key-Challenge Petri Nets.- Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011.- Advanced SIM Capabilities Supporting Trust-Based Applications.- Towards Practical Enforcement Theories.- Session 6: Protocols and Protocol Analysis.- Security Analysis of AN.ON's Payment Scheme.- Formal Analysis of the Estonian Mobile-ID Protocol.- Generating In-Line Monitors for Rabin Automata.

Show more

Our Price
$128
Ships from local warehouse Estimated delivery date: 1st Apr - 4th Apr from local warehouse
  Include FREE SHIPPING on a Fishpond Premium Trial

Already Own It? Sell Yours
Buy Together
+
Buy together with Secure IT Systems at a great price!
Buy Together
$216.44

Product Description

The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic countries - thereby establishing a forum for discussions and co-operation between universities, industry and computer societies. Since then, the workshop has developed into a fully fledged inter- tional information security conference, held in the Nordic countries on a round robin basis. The 14th Nordic Conference on Secure IT Systems was held in Oslo on 14-16 October 2009. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile n- works under an increasingly serious threat picture. Among the contemporary security issues discussed were security services modeling, Petri nets, attack graphs, electronic voting schemes, anonymous payment schemes, mobile ID-protocols, SIM cards, n- work embedded systems, trust, wireless sensor networks, privacy, privacy disclosure regulations, financial cryptography, PIN verification, temporal access control, random number generators, and some more. As a pre-cursor to the conference proper, the Nordic Security Day on Wednesday 14 October hosted talks by leading representatives from industry, academia and the g- ernment sector, and a press conference was given.


Session 1: Anonymity and Privacy.- On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market.- Facilitating the Adoption of Tor by Focusing on a Promising Target Group.- A Parallelism-Based Approach to Network Anonymization.- Security Usability of Petname Systems.- Session 2: Modelling and Design.- An Analysis of Widget Security.- Trade-Offs in Cryptographic Implementations of Temporal Access Control.- Blunting Differential Attacks on PIN Processing APIs.- Session 3: Network Layer Security.- Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic.- An Improved Attack on TKIP.- Session 4: Security for Mobile Users.- ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System.- A Mechanism for Identity Delegation at Authentication Level.- Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services.- Towards True Random Number Generation in Mobile Environments.- Session 5: Embedded Systems and Mechanisms.- Towards Modelling Information Security with Key-Challenge Petri Nets.- Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011.- Advanced SIM Capabilities Supporting Trust-Based Applications.- Towards Practical Enforcement Theories.- Session 6: Protocols and Protocol Analysis.- Security Analysis of AN.ON's Payment Scheme.- Formal Analysis of the Estonian Mobile-ID Protocol.- Generating In-Line Monitors for Rabin Automata.

Show more
Product Details
EAN
9783642047657
ISBN
3642047653
Age Range
Other Information
X, 303 p.
Dimensions
23.4 x 15.5 x 1.8 centimetres (0.50 kg)

Table of Contents

Session 1: Anonymity and Privacy.- On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market.- Facilitating the Adoption of Tor by Focusing on a Promising Target Group.- A Parallelism-Based Approach to Network Anonymization.- Security Usability of Petname Systems.- Session 2: Modelling and Design.- An Analysis of Widget Security.- Trade-Offs in Cryptographic Implementations of Temporal Access Control.- Blunting Differential Attacks on PIN Processing APIs.- Session 3: Network Layer Security.- Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic.- An Improved Attack on TKIP.- Session 4: Security for Mobile Users.- ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System.- A Mechanism for Identity Delegation at Authentication Level.- Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services.- Towards True Random Number Generation in Mobile Environments.- Session 5: Embedded Systems and Mechanisms.- Towards Modelling Information Security with Key-Challenge Petri Nets.- Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011.- Advanced SIM Capabilities Supporting Trust-Based Applications.- Towards Practical Enforcement Theories.- Session 6: Protocols and Protocol Analysis.- Security Analysis of AN.ON’s Payment Scheme.- Formal Analysis of the Estonian Mobile-ID Protocol.- Generating In-Line Monitors for Rabin Automata.

Show more
Review this Product
What our customers have to say
Ask a Question About this Product More...
 
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 8% commission by selling Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology) on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond Retail Limited.

Back to top