Markus Jakobsson - Böcker
Visar alla böcker från författaren Markus Jakobsson. Handla med fri frakt och snabb leverans.
9 produkter
9 produkter
Phishing and Countermeasures
Understanding the Increasing Problem of Electronic Identity Theft
Inbunden, Engelska, 2007
1 379 kr
Skickas inom 7-10 vardagar
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures.
978 kr
Skickas inom 5-8 vardagar
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, loss of security) and how they are related. It also discusses the primary countermeasures and how to implement them.
551 kr
Skickas inom 10-15 vardagar
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine authentication without understanding both humans and machines. Mobile security is not simply security ported to a handset. Handsets have different constraints than traditional computers, and are used in a different way. Text entry is more frustrating, and therefore, it is tempting to use shorter and less complex passwords. It is also harder to detect spoofing. We need to design with this in mind. We also need to determine how exactly to integrate biometric readers to reap the maximum benefits from them. This book addresses all of these issues, and more.
1 095 kr
Skickas inom 10-15 vardagar
This book describes trends in email scams and offers tools and techniquesto identify such trends.
1 204 kr
Skickas inom 10-15 vardagar
This book describes trends in email scams and offers tools and techniquesto identify such trends.
551 kr
Skickas inom 10-15 vardagar
This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy.
Del 10323 - Lecture Notes in Computer Science
Financial Cryptography and Data Security
FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers
Häftad, Engelska, 2017
535 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017.The 39 full papers presented were carefully reviewed and selected from 96 submissions. They feature the outcome of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC 2017, and the First Workshop on Targeted Attacks, TA 2017.The papers are grouped in topical sections named: encrypted computing and applied homomorphic cryptography; bitcoin and blockchain research; advances in secure electronic voting schemes; trusted smart contracts; targeted attacks.
Applied Cryptography and Network Security
Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings
Häftad, Engelska, 2004
1 095 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the Second International Conference on Applied Cryptography and Network Security, ACNS 2004, held in Yellow Mountain, China, in June 2004.The 36 revised full papers presented were carefully reviewed and selected from 297 submissions. The papers are organized in topical sections on security and storage, provably secure constructions, Internet security, digital signatures, security modeling, authenticated key exchange, security of deployed systems, cryptosystems design and analysis, cryptographic protocols, side channels and protocol analysis, intrusion detection and DoS, and cryptographic algorithms.
551 kr
Skickas inom 10-15 vardagar
For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields.