You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management systems. After a short chapter that explains the context and objectives of the book, in Chap. 2 the author introduces terminology for exams and the foundations required to formulate their security requirements. He describes the tasks that occur during an exam, taking account of the levels of detail and abstraction of an exam specification and the threats that arise out of the different exam roles. He also presents a taxonomy th...
This open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on Electronic Voting, E-Vote-ID 2022, held in Bregenz, Austria, in October 2022. The 10 full papers presented were carefully reviewed and selected from 39 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others.
This book constitutes the refereed post-conference proceedings of the 10th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2020, held as a virtual event, in September 2020. The 8 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions and are organized in the following topical sections: personality and behavior; behavior in face of adversaries; smart environments; decentralized systems and digital ledgers; and reflections on socio-technical aspects of security. The Chapter “Statistical Reliability of 10 Years of Cyber Security User Studies” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
None
This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted to topics such as secure operating system architectures, applications programming and security testing, intrusion and attack detection, cybersecurity intelligence, access control, cryptographic techniques, cryptocurrencies, ransomware, anonymity, trust, recommendation systems, as well machine learning problems. Due to the Corona pandemic the event was held virtually.
This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015. The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.
This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Collaborating with the Enemy".
This book constitutes the refereed proceedings of the 24th IFIP WG 6.1 International Conference on Coordination Models and Language, COORDINATION 2022, held in Lucca, Italy, in June 2022, as part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022. The 11 regular papers and one short paper presented in this book were carefully reviewed and selected from 22 submissions. COORDINATION provides a well-established forum for the growing community of researchers interested in coordination models and languages, architectures, verification and implementation techniques necessary to cope with the complexity induced by the demands of today's software development.
This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021. The 10 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: web and apps; context and modelling; and from the present to the future.
This book constitutes the refereed proceedings of the 11th International Joint Conference on E-Business and Telecommunications, ICETE 2014, held in Vienna, Austria, in August 2014. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 27 full papers presented were carefully reviewed and selected from 328 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless information networks and systems.