作者: Audun Jøsang , Torleiv Maseng , Svein J Knapskog , None
DOI:
关键词: Session (computer science) 、 Computer security 、 Security token 、 Information security 、 Temporal Key Integrity Protocol 、 Authentication 、 The Internet 、 Security analysis 、 Computer science 、 Access control
摘要: Session 1: Anonymity and Privacy.- On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from US Stock Market.- Facilitating Adoption Tor by Focusing on a Promising Target Group.- A Parallelism-Based Approach to Network Anonymization.- Security Usability Petname Systems.- 2: Modelling Design.- An Analysis Widget Security.- Trade-Offs Cryptographic Implementations Temporal Access Control.- Blunting Differential Attacks PIN Processing APIs.- 3: Layer Characterising Anomalous Events Using Change - Point Correlation Unsolicited Traffic.- Improved Attack TKIP.- 4: for Mobile Users.- ContikiSec: Secure Wireless Sensor Networks under Contiki Operating System.- Mechanism Identity Delegation at Authentication Level.- Introducing Sim-Based Tokens as Enabling Technology Real-Time Services.- Towards True Random Number Generation Environments.- 5: Embedded Systems Mechanisms.- Information with Key-Challenge Petri Nets.- Trust Norwegian E-Voting Pilot Project E-valg 2011.- Advanced SIM Capabilities Supporting Trust-Based Applications.- Practical Enforcement Theories.- 6: Protocols Protocol Analysis.- AN.ON's Payment Scheme.- Formal Estonian Mobile-ID Protocol.- Generating In-Line Monitors Rabin Automata.