EC2ND 2006: Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis

Front Cover
Andrew Blyth, Iain Sutherland
Springer Science & Business Media, May 17, 2010 - Computers - 125 pages

This book contains the proceedings of the Second European Conference on Computer Network Defence that took place in December 2006 at the Faculty of Advanced Technology, University of Glamorgan, in the UK.

The theme of the conference was the protection of computer networks, with contributions from both national and international participants reporting on research developments, as well as providing valuable insights in this area.

The book also incorporates the proceedings of the First Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2006), held in conjunction with EC2ND 2006.

Topics and issues discussed include:

Computer Network Operations

Computer Network Attack

Network Application Security

Network Forensics

Web Security

Vulnerability Management and Tracking

Network Defence

Wireless and Mobile Security

Cryptography

Network Discovery and Mapping

Network Security

Intrusion Detection Systems

Incident Response and Management

Computer Forensics Practice

Malicious Software Analysis

Network Architectures and Management

Legal and Ethical Issues

The papers presented include contributions from leading figures in the fields of network security and computer forensics, and are a valuable source of reference for both researchers and practitioners.

 

Selected pages

Contents

Efficient Sampling of the Structure of Crypto Generators State Transition Graphs
3
Mandatory Access Control applications to web hosting
13
Outsourcing Security Services for Low Performance Portable Devices
23
Public Verifiable Multisender Identity Based Threshold Signcryption
33
A Discussion on the Role of Deception in Information Operations for the Defence of Computer Networksa
43
A New Approach to Understanding Information Assurance
53
Robust Public Key Cryptography A New Cryptosystem Surviving Private Key Compromise
61
Digital Forensics Incident Analysis
67
Review of Forensic Tools for Smartphones
68
Oscar Using Byte Pairs to Find File Type and Camera Make of Data Fragments
85
An empirical methodology derived from the analysis of information remaining on second hand hard disks
95
PKI Based Digital Evidence Verification Modeli
105
Professionalism in Computer Forensics
115
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information