top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (X, 382 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Management information systems
Computer science
Computer communication systems
Cryptology
Operating Systems
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-540-49784-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fixed vs. variable-length patterns for detecting suspicious process behavior -- A tool for pro-active defense against the buffer overrun attack -- A kernelized architecture for multilevel secure application policies -- Dealing with multi-policy security in large open distributed systems -- A flexible method for information system security policy specification -- On the security of some variants of the RSA signature scheme -- Side channel cryptanalysis of product ciphers -- On the security of digital tachographs -- An authorization model and its formal semantics -- Authorization in CORBA security -- Rules for designing multilevel Object-Oriented Databases -- Byte code verification for Java smart cards based on model checking -- Towards formalizing the Java security architecture of JDK 1.2 -- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets -- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video -- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system -- The “ticket” concept for copy control based on embedded signalling -- Panel session: Watermarking -- Authentication and payment in future mobile systems -- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks -- A mix-mediated anonymity service and its payment -- A subjective metric of authentication -- A sound logic for analysing electronic commerce protocols -- Kerberos Version IV: Inductive analysis of the secrecy goals.
Record Nr. UNISA-996466151003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (X, 382 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Management information systems
Computer science
Computer communication systems
Cryptology
Operating Systems
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-540-49784-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fixed vs. variable-length patterns for detecting suspicious process behavior -- A tool for pro-active defense against the buffer overrun attack -- A kernelized architecture for multilevel secure application policies -- Dealing with multi-policy security in large open distributed systems -- A flexible method for information system security policy specification -- On the security of some variants of the RSA signature scheme -- Side channel cryptanalysis of product ciphers -- On the security of digital tachographs -- An authorization model and its formal semantics -- Authorization in CORBA security -- Rules for designing multilevel Object-Oriented Databases -- Byte code verification for Java smart cards based on model checking -- Towards formalizing the Java security architecture of JDK 1.2 -- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets -- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video -- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system -- The “ticket” concept for copy control based on embedded signalling -- Panel session: Watermarking -- Authentication and payment in future mobile systems -- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks -- A mix-mediated anonymity service and its payment -- A subjective metric of authentication -- A sound logic for analysing electronic commerce protocols -- Kerberos Version IV: Inductive analysis of the secrecy goals.
Record Nr. UNINA-9910768472703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security -- ESORICS 2002 [[electronic resource] ] : 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings / / edited by Dieter Gollmann, Günter Karjoth, Michael Waidner
Computer Security -- ESORICS 2002 [[electronic resource] ] : 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings / / edited by Dieter Gollmann, Günter Karjoth, Michael Waidner
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (CCCVIII, 298 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Computer communication systems
Database management
Cryptology
Operating Systems
Computer Communication Networks
Database Management
ISBN 3-540-45853-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computational Probabilistic Non-interference -- Bit-Slice Auction Circuit -- Confidentiality Policies and Their Enforcement for Controlled Query Evaluation -- Cardinality-Based Inference Control in Sum-Only Data Cubes -- Outbound Authentication for Programmable Secure Coprocessors -- Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense -- A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations -- Authentication for Distributed Web Caches -- Analysing a Stream Authentication Protocol Using Model Checking -- Equal To The Task? -- TINMAN: A Resource Bound Security Checking System for Mobile Code -- Confidentiality-Preserving Refinement is Compositional — Sometimes -- Formal Security Analysis with Interacting State Machines -- Decidability of Safety in Graph-Based Models for Access Control -- Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones -- Learning Fingerprints for a Database Intrusion Detection System.
Record Nr. UNINA-9910143897003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security -- ESORICS 2002 [[electronic resource] ] : 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings / / edited by Dieter Gollmann, Günter Karjoth, Michael Waidner
Computer Security -- ESORICS 2002 [[electronic resource] ] : 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings / / edited by Dieter Gollmann, Günter Karjoth, Michael Waidner
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (CCCVIII, 298 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Computer communication systems
Database management
Cryptology
Operating Systems
Computer Communication Networks
Database Management
ISBN 3-540-45853-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computational Probabilistic Non-interference -- Bit-Slice Auction Circuit -- Confidentiality Policies and Their Enforcement for Controlled Query Evaluation -- Cardinality-Based Inference Control in Sum-Only Data Cubes -- Outbound Authentication for Programmable Secure Coprocessors -- Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense -- A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations -- Authentication for Distributed Web Caches -- Analysing a Stream Authentication Protocol Using Model Checking -- Equal To The Task? -- TINMAN: A Resource Bound Security Checking System for Mobile Code -- Confidentiality-Preserving Refinement is Compositional — Sometimes -- Formal Security Analysis with Interacting State Machines -- Decidability of Safety in Graph-Based Models for Access Control -- Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones -- Learning Fingerprints for a Database Intrusion Detection System.
Record Nr. UNISA-996465392703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2006 [[electronic resource] ] : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings / / edited by Eugene Asarin, Dieter Gollmann, Jan Meier, Andrei Sabelfeld
Computer Security – ESORICS 2006 [[electronic resource] ] : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings / / edited by Eugene Asarin, Dieter Gollmann, Jan Meier, Andrei Sabelfeld
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 550 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computers
Data encryption (Computer science)
Operating systems (Computers)
Computer communication systems
Database management
Management information systems
Computer science
Theory of Computation
Cryptology
Operating Systems
Computer Communication Networks
Database Management
Management of Computing and Information Systems
Soggetto non controllato ESORICS
ISBN 3-540-44605-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Record Nr. UNISA-996465977103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2006 [[electronic resource] ] : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings / / edited by Eugene Asarin, Dieter Gollmann, Jan Meier, Andrei Sabelfeld
Computer Security – ESORICS 2006 [[electronic resource] ] : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings / / edited by Eugene Asarin, Dieter Gollmann, Jan Meier, Andrei Sabelfeld
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 550 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computers
Data encryption (Computer science)
Operating systems (Computers)
Computer communication systems
Database management
Management information systems
Computer science
Theory of Computation
Cryptology
Operating Systems
Computer Communication Networks
Database Management
Management of Computing and Information Systems
Soggetto non controllato ESORICS
ISBN 3-540-44605-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Record Nr. UNINA-9910483259103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXI, 485 p. 106 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Legal Aspects of Computing
ISBN 3-319-66402-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
Record Nr. UNINA-9910484050603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXI, 485 p. 106 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Legal Aspects of Computing
ISBN 3-319-66402-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
Record Nr. UNISA-996465873203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXI, 573 p. 187 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Software engineering
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Software Engineering
ISBN 3-319-66399-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
Record Nr. UNISA-996466172703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXI, 573 p. 187 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Software engineering
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Software Engineering
ISBN 3-319-66399-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
Record Nr. UNINA-9910483897203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui