Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 |
Descrizione fisica | 1 online resource (X, 382 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Management information systems Computer science Computer communication systems Cryptology Operating Systems Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-540-49784-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fixed vs. variable-length patterns for detecting suspicious process behavior -- A tool for pro-active defense against the buffer overrun attack -- A kernelized architecture for multilevel secure application policies -- Dealing with multi-policy security in large open distributed systems -- A flexible method for information system security policy specification -- On the security of some variants of the RSA signature scheme -- Side channel cryptanalysis of product ciphers -- On the security of digital tachographs -- An authorization model and its formal semantics -- Authorization in CORBA security -- Rules for designing multilevel Object-Oriented Databases -- Byte code verification for Java smart cards based on model checking -- Towards formalizing the Java security architecture of JDK 1.2 -- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets -- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video -- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system -- The “ticket” concept for copy control based on embedded signalling -- Panel session: Watermarking -- Authentication and payment in future mobile systems -- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks -- A mix-mediated anonymity service and its payment -- A subjective metric of authentication -- A sound logic for analysing electronic commerce protocols -- Kerberos Version IV: Inductive analysis of the secrecy goals. |
Record Nr. | UNISA-996466151003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 |
Descrizione fisica | 1 online resource (X, 382 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Management information systems Computer science Computer communication systems Cryptology Operating Systems Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-540-49784-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fixed vs. variable-length patterns for detecting suspicious process behavior -- A tool for pro-active defense against the buffer overrun attack -- A kernelized architecture for multilevel secure application policies -- Dealing with multi-policy security in large open distributed systems -- A flexible method for information system security policy specification -- On the security of some variants of the RSA signature scheme -- Side channel cryptanalysis of product ciphers -- On the security of digital tachographs -- An authorization model and its formal semantics -- Authorization in CORBA security -- Rules for designing multilevel Object-Oriented Databases -- Byte code verification for Java smart cards based on model checking -- Towards formalizing the Java security architecture of JDK 1.2 -- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets -- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video -- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system -- The “ticket” concept for copy control based on embedded signalling -- Panel session: Watermarking -- Authentication and payment in future mobile systems -- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks -- A mix-mediated anonymity service and its payment -- A subjective metric of authentication -- A sound logic for analysing electronic commerce protocols -- Kerberos Version IV: Inductive analysis of the secrecy goals. |
Record Nr. | UNINA-9910768472703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security -- ESORICS 2002 [[electronic resource] ] : 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings / / edited by Dieter Gollmann, Günter Karjoth, Michael Waidner |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (CCCVIII, 298 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Computer communication systems Database management Cryptology Operating Systems Computer Communication Networks Database Management |
ISBN | 3-540-45853-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Computational Probabilistic Non-interference -- Bit-Slice Auction Circuit -- Confidentiality Policies and Their Enforcement for Controlled Query Evaluation -- Cardinality-Based Inference Control in Sum-Only Data Cubes -- Outbound Authentication for Programmable Secure Coprocessors -- Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense -- A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations -- Authentication for Distributed Web Caches -- Analysing a Stream Authentication Protocol Using Model Checking -- Equal To The Task? -- TINMAN: A Resource Bound Security Checking System for Mobile Code -- Confidentiality-Preserving Refinement is Compositional — Sometimes -- Formal Security Analysis with Interacting State Machines -- Decidability of Safety in Graph-Based Models for Access Control -- Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones -- Learning Fingerprints for a Database Intrusion Detection System. |
Record Nr. | UNINA-9910143897003321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security -- ESORICS 2002 [[electronic resource] ] : 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings / / edited by Dieter Gollmann, Günter Karjoth, Michael Waidner |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (CCCVIII, 298 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Computer communication systems Database management Cryptology Operating Systems Computer Communication Networks Database Management |
ISBN | 3-540-45853-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Computational Probabilistic Non-interference -- Bit-Slice Auction Circuit -- Confidentiality Policies and Their Enforcement for Controlled Query Evaluation -- Cardinality-Based Inference Control in Sum-Only Data Cubes -- Outbound Authentication for Programmable Secure Coprocessors -- Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense -- A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations -- Authentication for Distributed Web Caches -- Analysing a Stream Authentication Protocol Using Model Checking -- Equal To The Task? -- TINMAN: A Resource Bound Security Checking System for Mobile Code -- Confidentiality-Preserving Refinement is Compositional — Sometimes -- Formal Security Analysis with Interacting State Machines -- Decidability of Safety in Graph-Based Models for Access Control -- Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones -- Learning Fingerprints for a Database Intrusion Detection System. |
Record Nr. | UNISA-996465392703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security – ESORICS 2006 [[electronic resource] ] : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings / / edited by Eugene Asarin, Dieter Gollmann, Jan Meier, Andrei Sabelfeld |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XII, 550 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computers
Data encryption (Computer science) Operating systems (Computers) Computer communication systems Database management Management information systems Computer science Theory of Computation Cryptology Operating Systems Computer Communication Networks Database Management Management of Computing and Information Systems |
Soggetto non controllato | ESORICS |
ISBN | 3-540-44605-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. |
Record Nr. | UNISA-996465977103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security – ESORICS 2006 [[electronic resource] ] : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings / / edited by Eugene Asarin, Dieter Gollmann, Jan Meier, Andrei Sabelfeld |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XII, 550 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computers
Data encryption (Computer science) Operating systems (Computers) Computer communication systems Database management Management information systems Computer science Theory of Computation Cryptology Operating Systems Computer Communication Networks Database Management Management of Computing and Information Systems |
Soggetto non controllato | ESORICS |
ISBN | 3-540-44605-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. |
Record Nr. | UNINA-9910483259103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXI, 485 p. 106 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Computers Law and legislation Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Legal Aspects of Computing |
ISBN | 3-319-66402-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive. |
Record Nr. | UNINA-9910484050603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXI, 485 p. 106 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Computers Law and legislation Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Legal Aspects of Computing |
ISBN | 3-319-66402-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive. |
Record Nr. | UNISA-996465873203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXI, 573 p. 187 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Software engineering Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Software Engineering |
ISBN | 3-319-66399-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive. |
Record Nr. | UNISA-996466172703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXI, 573 p. 187 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Software engineering Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Software Engineering |
ISBN | 3-319-66399-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive. |
Record Nr. | UNINA-9910483897203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|