top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Fast Software Encryption [[electronic resource] ] : Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings / / edited by Dieter Gollmann
Fast Software Encryption [[electronic resource] ] : Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings / / edited by Dieter Gollmann
Edizione [1st ed. 1996.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1996
Descrizione fisica 1 online resource (CCXXXVI, 225 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Computers
Data encryption (Computer science)
Software engineering
Algorithms
Coding theory
Information theory
Combinatorics
Theory of Computation
Cryptology
Software Engineering/Programming and Operating Systems
Algorithm Analysis and Problem Complexity
Coding and Information Theory
ISBN 3-540-49652-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attacks on the HKM / HFX cryptosystem -- Truncated differentials of SAFER -- On the weak keys of blowfish -- High-bandwidth encryption with low-bandwidth smartcards -- ISAAC -- A note on the hash function of Tillich and zémor -- Cryptanalysis of MD4 -- RIPEMD-160: A strengthened version of RIPEMD -- Fast accumulated hashing -- Tiger: A fast new hash function -- The cipher SHARK -- Two practical and provably secure block ciphers: BEAR and LION -- Unbalanced Feistel networks and block cipher design -- A comparison of fast correlation attacks -- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes -- On the security of nonlinear filter generators -- Faster Luby-Rackoff ciphers -- New structure of block ciphers with provable security against differential and linear cryptanalysis.
Record Nr. UNISA-996465852503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1996
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
ICT Systems Security and Privacy Protection [[electronic resource] ] : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / / edited by Hannes Federrath, Dieter Gollmann
ICT Systems Security and Privacy Protection [[electronic resource] ] : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / / edited by Hannes Federrath, Dieter Gollmann
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVI, 646 p. 156 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer security
Management information systems
Computer science
Computer communication systems
Data encryption (Computer science)
Systems and Data Security
Management of Computing and Information Systems
Computer Communication Networks
Cryptology
ISBN 3-319-18467-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto O-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet’s Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.
Record Nr. UNINA-9910299227303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings / / edited by Petra Perner, Dieter Gollmann, Jianying Zhou
Information and Communications Security [[electronic resource] ] : 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings / / edited by Petra Perner, Dieter Gollmann, Jianying Zhou
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (X, 418 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computer science—Mathematics
Systems and Data Security
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-540-39927-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Fast Square Root Computation Using the Frobenius Mapping -- A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption -- Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents -- On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST -- A Policy Based Framework for Access Control -- Trading-Off Type-Inference Memory Complexity against Communication -- Security Remarks on a Group Signature Scheme with Member Deletion -- An Efficient Known Plaintext Attack on FEA-M -- An Efficient Public-Key Framework -- ROCEM: Robust Certified E-mail System Based on Server-Supported Signature -- Practical Service Charge for P2P Content Distribution -- ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback -- A Lattice Based General Blind Watermark Scheme -- Role-Based Access Control and the Access Control Matrix -- Broadcast Encryption Schemes Based on the Sectioned Key Tree -- Research on the Collusion Estimation -- Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains -- Protocols for Malicious Host Revocation -- A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code -- A Novel Two-Level Trust Model for Grid -- Practical t-out-n Oblivious Transfer and Its Applications -- Adaptive Collusion Attack to a Block Oriented Watermarking Scheme -- ID-Based Distributed “Magic Ink” Signature from Pairings -- A Simple Anonymous Fingerprinting Scheme Based on Blind Signature -- Compact Conversion Schemes for the Probabilistic OW-PCA Primitives -- A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems -- A Novel Efficient Group Signature Scheme with Forward Security -- Variations of Diffie-Hellman Problem -- A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine -- A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine -- UC-RBAC: A Usage Constrained Role-Based Access Control Model -- (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography -- An Optimized Multi-bits Blind Watermarking Scheme -- A Compound Intrusion Detection Model -- An Efficient Convertible Authenticated Encryption Scheme and Its Variant -- Space-Economical Reassembly for Intrusion Detection System -- A Functional Decomposition of Virus and Worm Programs.
Record Nr. UNINA-9910144035503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings / / edited by Petra Perner, Dieter Gollmann, Jianying Zhou
Information and Communications Security [[electronic resource] ] : 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings / / edited by Petra Perner, Dieter Gollmann, Jianying Zhou
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (X, 418 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computer science—Mathematics
Systems and Data Security
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-540-39927-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Fast Square Root Computation Using the Frobenius Mapping -- A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption -- Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents -- On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST -- A Policy Based Framework for Access Control -- Trading-Off Type-Inference Memory Complexity against Communication -- Security Remarks on a Group Signature Scheme with Member Deletion -- An Efficient Known Plaintext Attack on FEA-M -- An Efficient Public-Key Framework -- ROCEM: Robust Certified E-mail System Based on Server-Supported Signature -- Practical Service Charge for P2P Content Distribution -- ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback -- A Lattice Based General Blind Watermark Scheme -- Role-Based Access Control and the Access Control Matrix -- Broadcast Encryption Schemes Based on the Sectioned Key Tree -- Research on the Collusion Estimation -- Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains -- Protocols for Malicious Host Revocation -- A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code -- A Novel Two-Level Trust Model for Grid -- Practical t-out-n Oblivious Transfer and Its Applications -- Adaptive Collusion Attack to a Block Oriented Watermarking Scheme -- ID-Based Distributed “Magic Ink” Signature from Pairings -- A Simple Anonymous Fingerprinting Scheme Based on Blind Signature -- Compact Conversion Schemes for the Probabilistic OW-PCA Primitives -- A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems -- A Novel Efficient Group Signature Scheme with Forward Security -- Variations of Diffie-Hellman Problem -- A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine -- A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine -- UC-RBAC: A Usage Constrained Role-Based Access Control Model -- (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography -- An Optimized Multi-bits Blind Watermarking Scheme -- A Compound Intrusion Detection Model -- An Efficient Convertible Authenticated Encryption Scheme and Its Variant -- Space-Economical Reassembly for Intrusion Detection System -- A Functional Decomposition of Virus and Worm Programs.
Record Nr. UNISA-996465784903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings / / edited by Dieter Gollmann, Felix C. Freiling
Information Security [[electronic resource] ] : 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings / / edited by Dieter Gollmann, Felix C. Freiling
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XIV, 402 p. 87 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Seguridad informática
Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Special purpose computers
Computers and civilization
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
Math Applications in Computer Science
Special Purpose and Application-Based Systems
Computers and Society
ISBN 3-642-33383-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy-Preserving Speaker Authentication.- Differential Attacks on Reduced RIPEMD-160.- Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree.- Strong Authentication with Mobile Phone.- Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road.- Domain-Specific Pseudonymous Signatures for the German Identity Card.- Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms.- 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks -- Learning Fine-Grained Structured Input for Memory Corruption Detection.- Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.- An Empirical Study of Dangerous Behaviors in Firefox Extensions.- Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems.- Selective Document Retrieval from Encrypted Database.- Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.- Secure Hierarchical Identity-Based Identification without Random Oracles.- Efficient Two-Move Blind Signatures in the Common Reference String Model.- Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.- A Quantitative Approach for Inexact Enforcement of Security Policies.- OSDM: An Organizational Supervised Delegation Model for RBAC.- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library.- A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching.- Intended Actions: Risk Is Conflicting Incentives.- On the Self-similarity Nature of the Revocation Data.  Differential Attacks on Reduced RIPEMD-160.- Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree.- Strong Authentication with Mobile Phone.- Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road.- Domain-Specific Pseudonymous Signatures for the German Identity Card.- Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms.- 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks -- Learning Fine-Grained Structured Input for Memory Corruption Detection.- Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.- An Empirical Study of Dangerous Behaviors in Firefox Extensions.- Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems.- Selective Document Retrieval from Encrypted Database.- Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.- Secure Hierarchical Identity-Based Identification without Random Oracles.- Efficient Two-Move Blind Signatures in the Common Reference String Model.- Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.- A Quantitative Approach for Inexact Enforcement of Security Policies.- OSDM: An Organizational Supervised Delegation Model for RBAC.- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library.- A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching.- Intended Actions: Risk Is Conflicting Incentives.- On the Self-similarity Nature of the Revocation Data. .
Record Nr. UNISA-996465770203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems [[electronic resource] ] : 7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings / / edited by Lorenzo Cavallaro, Dieter Gollmann
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems [[electronic resource] ] : 7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings / / edited by Lorenzo Cavallaro, Dieter Gollmann
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 145 p. 29 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Architecture, Computer
Special purpose computers
Computer communication systems
Computer science
Systems and Data Security
Cryptology
Computer System Implementation
Special Purpose and Application-Based Systems
Computer Communication Networks
Computer Science, general
ISBN 3-642-38530-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography and Cryptanalysis -- Multiplicative Homomorphic E-Auction with Formally Provable Security -- Malleable Signatures for Resource Constrained Platforms -- Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks -- Mobile Security -- URANOS: User-Guided Rewriting for Plugin-Enabled Android ApplicatiOn Security -- Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone -- Smart Cards and Embedded Devices -- A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards -- A Forward Privacy Model for RFID Authentication Protocols -- On Secure Embedded Token Design: Quasi-looped Yao Circuits and Bounded Leakage -- Lightweight Authentication Protocol for Low-Cost RFID Tags.
Record Nr. UNINA-9910484002403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems [[electronic resource] ] : 7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings / / edited by Lorenzo Cavallaro, Dieter Gollmann
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems [[electronic resource] ] : 7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings / / edited by Lorenzo Cavallaro, Dieter Gollmann
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 145 p. 29 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Architecture, Computer
Special purpose computers
Computer communication systems
Computer science
Systems and Data Security
Cryptology
Computer System Implementation
Special Purpose and Application-Based Systems
Computer Communication Networks
Computer Science, general
ISBN 3-642-38530-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography and Cryptanalysis -- Multiplicative Homomorphic E-Auction with Formally Provable Security -- Malleable Signatures for Resource Constrained Platforms -- Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks -- Mobile Security -- URANOS: User-Guided Rewriting for Plugin-Enabled Android ApplicatiOn Security -- Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone -- Smart Cards and Embedded Devices -- A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards -- A Forward Privacy Model for RFID Authentication Protocols -- On Secure Embedded Token Design: Quasi-looped Yao Circuits and Bounded Leakage -- Lightweight Authentication Protocol for Low-Cost RFID Tags.
Record Nr. UNISA-996466287803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Proceedings of the Ninth International Conference on Mathematics and Computing [[electronic resource] ] : ICMC 2023 / / edited by Debasis Giri, Dieter Gollmann, S. Ponnusamy, Sakurai Kouichi, Predrag S. Stanimirović, J. K. Sahoo
Proceedings of the Ninth International Conference on Mathematics and Computing [[electronic resource] ] : ICMC 2023 / / edited by Debasis Giri, Dieter Gollmann, S. Ponnusamy, Sakurai Kouichi, Predrag S. Stanimirović, J. K. Sahoo
Autore Giri Debasis
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (433 pages)
Disciplina 004.0151
Altri autori (Persone) GollmannDieter
PonnusamyS
KouichiSakurai
StanimirovićPredrag S
SahooJ. K
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Computer networks - Security measures
Cloud Computing
Blockchains (Databases)
Data protection
Computational Intelligence
Artificial Intelligence
Mobile and Network Security
Blockchain
Data and Information Security
ISBN 981-9930-80-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Verifiable Delay Function Based on Non-linear Hybrid Cellular Automata -- Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack -- MILP Modeling of S-Box: Divide and Merge Approach -- A Relation between Properties of S-Box and Linear Inequalities of DDT -- Damage Level Estimation of Rubble-Mound Breakwaters using Deep Artificial Neural Network -- Facial Image Manipulation Detection using Cellular Automata and Transfer Learning -- Language Independent Fake News Detection Over Social Media Networks using Centrality Aware Graph Convolution Network -- Private Blockchain Enabled Security Framework for IoT-Based Healthcare System -- GradeChain: A Hyperledger Fabric Blockchain Based Students’ Grading System for Educational Institute -- Object-Background Partitioning on Images: A Ratio Based Division -- More on Semipositive Tensor and Tensor Complementarity Problem.
Record Nr. UNINA-9910736017803321
Giri Debasis  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure IT Systems [[electronic resource] ] : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings / / edited by Hanne Riis Nielsen, Dieter Gollmann
Secure IT Systems [[electronic resource] ] : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings / / edited by Hanne Riis Nielsen, Dieter Gollmann
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 321 p. 64 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Algorithms
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
ISBN 3-642-41488-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber-Physical Systems -- Security Policies -- Information Flow -- Security Experiences -- Cyber-Physical Systems -- Web Security -- Security Policies -- Network Security.
Record Nr. UNINA-9910484951803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure IT Systems [[electronic resource] ] : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings / / edited by Hanne Riis Nielsen, Dieter Gollmann
Secure IT Systems [[electronic resource] ] : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings / / edited by Hanne Riis Nielsen, Dieter Gollmann
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 321 p. 64 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Algorithms
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
ISBN 3-642-41488-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber-Physical Systems -- Security Policies -- Information Flow -- Security Experiences -- Cyber-Physical Systems -- Web Security -- Security Policies -- Network Security.
Record Nr. UNISA-996465497703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui