Logo - springer
Slogan - springer

Computer Science - Software Engineering | Foundations and Practice of Security - 5th International Symposium on Foundations and Practice

Foundations and Practice of Security

5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers

Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A., Tawbi, N. (Eds.)

2013, XIV, 383 p. 90 illus.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


ISBN 978-3-642-37119-6

digitally watermarked, no DRM

The eBook version of this title will be available soon

learn more about Springer eBooks

add to marked items


Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-642-37118-9

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days

add to marked items

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

This book constitutes the carefully refereed and revised selected papers of the 5th International Symposium on Foundations and Practice of Security, FPS 2012, held in Montreal, QC, Canada, in October 2012.

The book contains a revised version of 22 full papers, accompanied by 3 short papers. The papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical section on cryptography and information theory, key management and cryptographic protocols, privacy and trust, policies and applications security, and network and adaptive security.

Content Level » Research

Keywords » attacks - security protocols - social Web - threat analysis - trust management

Related subjects » Business Information Systems - Database Management & Information Retrieval - Image Processing - Information Systems and Applications - Software Engineering

Table of contents 

Cryptography and Information Theory.- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption.- Proofs of Retrievability via Fountain Code.- MARC: Modified ARC4.- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements.- Key Management and Cryptographic Protocols.- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes.- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities.- COMPASS: Authenticated Group Key Agreement from Signcryption.- Privacy and Trust.- Classifying Online Social Network Users through the Social Graph.- A Formal Derivation of Composite Trust.- Policies and Applications Security.- Policy Administration in Tag-Based Authorization.- Enabling Dynamic Security Policy in the Java Security Manager.- A Novel Obfuscation: Class Hierarchy Flattening.- RESource: A Framework for Online Matching of Assembly with Open Source Code.- Touchjacking Attacks on Web in Android, iOS, and Windows Phone.- Network and Adaptive Security.- Short-Term Linkable Group Signatures with Categorized Batch Verification.- GHUMVEE: Efficient, Effective, and Flexible Replication.- Extracting Attack Scenarios Using Intrusion Semantics.- On Securely Manipulating XML Data.- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks.- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs.- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC.- Short Papers.- Towards Modelling Adaptive Attacker’s Behaviour.- Scalable Deniable Group Key Establishment.- Information-Theoretic Foundations of Differential Privacy.

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Software Engineering.