This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.Fingerprint recognition has the best efficiency/price ratio and is therefore the best candidate for mobile devices. ... For encryption purposes, an encryption module such as implemented in Applea#39;s iPhone 3GS, is required . Todaya#39;s mobileanbsp;...
|Title||:||Information Security and Privacy Research|
|Author||:||Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou|
|Publisher||:||Springer - 2012-06-06|