001437596 000__ 05775cam\a2200613\i\4500 001437596 001__ 1437596 001437596 003__ OCoLC 001437596 005__ 20230309004156.0 001437596 006__ m\\\\\o\\d\\\\\\\\ 001437596 007__ cr\cn\nnnunnun 001437596 008__ 210625s2021\\\\sz\a\\\\o\\\\\101\0\eng\d 001437596 020__ $$a9783030781200$$q(electronic bk.) 001437596 020__ $$a3030781208$$q(electronic bk.) 001437596 020__ $$z9783030781194$$q(print) 001437596 0247_ $$a10.1007/978-3-030-78120-0$$2doi 001437596 035__ $$aSP(OCoLC)1257553257 001437596 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dEBLCP$$dOCLCF$$dN$T$$dBRX$$dUKAHL$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001437596 049__ $$aISEA 001437596 050_4 $$aQA76.9.A25 001437596 08204 $$a005.8$$223 001437596 1112_ $$aIFIP TC11 International Information Security Conference$$n(36th :$$d2021 :$$cOnline) 001437596 24510 $$aICT systems security and privacy protection :$$b36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings /$$cAudun Jøsang, Lynn Futcher, Janne Hagen (eds.). 001437596 2463_ $$aSEC 2021 001437596 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2021] 001437596 300__ $$a1 online resource (xvi, 448 pages) :$$billustrations (some color) 001437596 336__ $$atext$$btxt$$2rdacontent 001437596 337__ $$acomputer$$bc$$2rdamedia 001437596 338__ $$aonline resource$$bcr$$2rdacarrier 001437596 4901_ $$aIFIP Advances in Information and Communication Technology,$$x1868-4238 ;$$v625 001437596 500__ $$aIncludes author index. 001437596 5050_ $$aDigital Signatures -- XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany -- Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials -- SIUV: A Smart car Identity management and Usage control system based on Verifiable credentials -- Vulnerability Management -- A Performance Assessment of Free-to-use Vulnerability Scanners -- Revisited -- QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection -- Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware -- Covert Channels and Cryptography -- ESQABE: Predicting Encrypted Search Queries -- Reconnection-based Covert Channels in Wireless Networks -- Minecraft Altered Skin Channel (MASC) -- Lattice-based weak curve fault attack on ECDSA -- Application and System Security -- HyperSec: Visual Analytics for blockchain security monitoring -- 100 Popular Open-Source Infosec Tools -- RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators -- Privacy -- Accept All: The Landscape of Cookie Banners in Greece & the UK -- The AppChk Crowd-Sourcing Platform: Which third parties are iOS apps talking to? -- Compiling Personal Data and Subject Categories from App Data Models -- Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App -- Perceived Privacy Problems within Digital Contact Tracing: A Study Among Swedish Citizens -- Network Security -- Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC security -- Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption -- Advanced Cowrie Configuration to Increase Honeypot Deceptiveness -- Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-based Software Systems -- Machine Learning for Security -- TAR: Generalized Forensic Framework to Detect Deepfakes using Weakly Supervised Learning -- Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles -- Revitalizing Self-Organizing Map: Anomaly Detection using Forecasting Error Patterns -- Security Management -- What is lurking in your backups? -- How Do Users Chain Email Accounts Together? -- Tensions that hinder the implementation of digital. 001437596 506__ $$aAccess limited to authorized users. 001437596 520__ $$aThis book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.* The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management. *The conference was held virtually. 001437596 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed June 25, 2021). 001437596 650_0 $$aComputer security$$vCongresses. 001437596 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001437596 650_0 $$aInternet$$xSecurity measures$$vCongresses. 001437596 650_6 $$aSécurité informatique$$vCongrès. 001437596 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures$$vCongrès. 001437596 650_6 $$aInternet$$xSécurité$$xMesures$$vCongrès. 001437596 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001437596 655_7 $$aConference papers and proceedings.$$2lcgft 001437596 655_7 $$aActes de congrès.$$2rvmgf 001437596 655_0 $$aElectronic books. 001437596 7001_ $$aJøsang, Audun,$$eeditor$$1https://orcid.org/0000-0001-6337-2264 001437596 7001_ $$aFutcher, Lynn,$$eeditor$$0(orcid)0000-0003-0406-8718$$1https://orcid.org/0000-0003-0406-8718 001437596 7001_ $$aHagen, Janne,$$eeditor$$0(orcid)0000-0001-5900-7061$$1https://orcid.org/0000-0001-5900-7061 001437596 830_0 $$aIFIP advances in information and communication technology ;$$v625.$$x1868-4238 001437596 852__ $$bebk 001437596 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-78120-0$$zOnline Access$$91397441.1 001437596 909CO $$ooai:library.usi.edu:1437596$$pGLOBAL_SET 001437596 980__ $$aBIB 001437596 980__ $$aEBOOK 001437596 982__ $$aEbook 001437596 983__ $$aOnline 001437596 994__ $$a92$$bISE