Proceedings : third International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2008 : Malaga, Spain, 9 October 2008 |
Pubbl/distr/stampa | [Place of publication not identified], : CPS Conference Pub Services, 2008 |
Disciplina | 005.8 |
Soggetto topico |
Digital forensic science
Engineering & Applied Sciences Computer Science |
ISBN | 1-5090-7895-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145667903321 |
[Place of publication not identified], : CPS Conference Pub Services, 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Public Key Infrastructure [[electronic resource] ] : First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings / / edited by Sokratis K. Katsikas, Stefanos Gritzalis |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XIV, 386 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Algorithms Information storage and retrieval Application software Computers and civilization Management information systems Computer science Cryptology Algorithm Analysis and Problem Complexity Information Storage and Retrieval Information Systems Applications (incl. Internet) Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-25980-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | to the Belgian EID Card -- The EuroPKI Experience -- CERVANTES – A Certificate Validation Test-Bed -- Flexible and Scalable Public Key Security for SSH -- What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved -- Identity-Based Cryptography in Public Key Management -- Pre-production Methods of a Response to Certificates with the Common Status –Design and Theoretical Evaluation– -- Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures -- A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications -- Using LDAP Directories for Management of PKI Processes -- Recursive Certificate Structures for X.509 Systems -- A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions -- A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation -- TACAR: a Simple and Fast Way for Building Trust among PKIs -- On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments -- A Socially Inspired Reputation Model -- Using EMV Cards for Single Sign-On -- Distributing Security-Mediated PKI -- Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography -- ÆTHER: an Authorization Management Architecture for Ubiquitous Computing -- Trustworthy Accounting for Wireless LAN Sharing Communities -- Mobile Qualified Electronic Signatures and Certification on Demand -- Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks -- A Credential Conversion Service for SAML-based Scenarios -- A New Design of Privilege Management Infrastructure with Binding Signature Semantics -- How to Qualify Electronic Signatures and Time Stamps -- An Efficient Revocation Scheme for Stateless Receivers -- On the Use of Weber Polynomials in Elliptic Curve Cryptography -- Threshold Password-Based Authentication Using Bilinear Pairings -- An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications. |
Record Nr. | UNINA-9910144154203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Public Key Infrastructure [[electronic resource] ] : First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings / / edited by Sokratis K. Katsikas, Stefanos Gritzalis |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XIV, 386 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Algorithms Information storage and retrieval Application software Computers and civilization Management information systems Computer science Cryptology Algorithm Analysis and Problem Complexity Information Storage and Retrieval Information Systems Applications (incl. Internet) Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-25980-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | to the Belgian EID Card -- The EuroPKI Experience -- CERVANTES – A Certificate Validation Test-Bed -- Flexible and Scalable Public Key Security for SSH -- What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved -- Identity-Based Cryptography in Public Key Management -- Pre-production Methods of a Response to Certificates with the Common Status –Design and Theoretical Evaluation– -- Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures -- A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications -- Using LDAP Directories for Management of PKI Processes -- Recursive Certificate Structures for X.509 Systems -- A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions -- A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation -- TACAR: a Simple and Fast Way for Building Trust among PKIs -- On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments -- A Socially Inspired Reputation Model -- Using EMV Cards for Single Sign-On -- Distributing Security-Mediated PKI -- Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography -- ÆTHER: an Authorization Management Architecture for Ubiquitous Computing -- Trustworthy Accounting for Wireless LAN Sharing Communities -- Mobile Qualified Electronic Signatures and Certification on Demand -- Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks -- A Credential Conversion Service for SAML-based Scenarios -- A New Design of Privilege Management Infrastructure with Binding Signature Semantics -- How to Qualify Electronic Signatures and Time Stamps -- An Efficient Revocation Scheme for Stateless Receivers -- On the Use of Weber Polynomials in Elliptic Curve Cryptography -- Threshold Password-Based Authentication Using Bilinear Pairings -- An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications. |
Record Nr. | UNISA-996466235703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Trust Management [[electronic resource] ] : 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedings / / edited by Sokratis K. Katsikas, Cristina Alcaraz |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (VII, 139 p. 19 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Computer communication systems Computer logic Application software Computers Systems and Data Security Software Engineering Computer Communication Networks Logics and Meanings of Programs Information Systems Applications (incl. Internet) Computing Milieux |
ISBN | 3-030-01141-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptosystems and Applied Cryptography -- Modelling and Risk Assessment -- Trust Computing. |
Record Nr. | UNINA-9910349399803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Trust Management [[electronic resource] ] : 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedings / / edited by Sokratis K. Katsikas, Cristina Alcaraz |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (VII, 139 p. 19 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Computer communication systems Computer logic Application software Computers Systems and Data Security Software Engineering Computer Communication Networks Logics and Meanings of Programs Information Systems Applications (incl. Internet) Computing Milieux |
ISBN | 3-030-01141-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptosystems and Applied Cryptography -- Modelling and Risk Assessment -- Trust Computing. |
Record Nr. | UNISA-996466428903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security in Computer and Information Sciences : First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers / / edited by Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokratis K. Katsikas, Ioannis Komnios, Luigi Romano, Dimitrios Tzovaras |
Edizione | [First edition, 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 159 pages, 33 illustrations) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Application software Cryptography Data encryption (Computer science) Computers, Special purpose Computer networks Data and Information Security Computer and Information Systems Applications Cryptology Special Purpose and Application-Based Systems Computer Communication Networks |
ISBN | 3-319-95189-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security of distributed interconnected systems -- Security of software systems -- Security of the Internet of Things. |
Record Nr. | UNINA-9910299288103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedings / / edited by Stefanos Gritzalis, Edgar R. Weippl, Sokratis K. Katsikas, Gabriele Anderst-Kotsis, A Min Tjoa, Ismail Khalil |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 177 p. 34 illus., 27 illus. in color.) |
Disciplina | 658.478 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Application software Computers and civilization Systems and Data Security Information Systems Applications (incl. Internet) Computer Appl. in Social and Behavioral Sciences Computers and Society |
ISBN | 3-030-27813-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing -- I Agree: Customize your Personal Data Processing with the CoRe User Interface -- I Did Not Accept That: Demonstrating Consent in Online Collection of Personal Data -- Privacy Policy Specification Framework for Addressing End-Users' Privacy Requirements -- A data utility-driven benchmark for de-identification methods -- DEFeND Architecture: a Privacy by Design Platform for GDPR Compliance -- General Data Protection Regulation and ISO/IEC 27001:2013: Synergies of activities towards organisations' compliance -- The interrelation of game elements and privacy requirements for the design of a system: A metamodel -- Decentralised and Collaborative Auditing of Workflows -- Gender Inference for Facebook Picture Owners -- Unifying cyber threat intelligence. |
Record Nr. | UNINA-9910349304003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedings / / edited by Stefanos Gritzalis, Edgar R. Weippl, Sokratis K. Katsikas, Gabriele Anderst-Kotsis, A Min Tjoa, Ismail Khalil |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 177 p. 34 illus., 27 illus. in color.) |
Disciplina | 658.478 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Application software Computers and civilization Systems and Data Security Information Systems Applications (incl. Internet) Computer Appl. in Social and Behavioral Sciences Computers and Society |
ISBN | 3-030-27813-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing -- I Agree: Customize your Personal Data Processing with the CoRe User Interface -- I Did Not Accept That: Demonstrating Consent in Online Collection of Personal Data -- Privacy Policy Specification Framework for Addressing End-Users' Privacy Requirements -- A data utility-driven benchmark for de-identification methods -- DEFeND Architecture: a Privacy by Design Platform for GDPR Compliance -- General Data Protection Regulation and ISO/IEC 27001:2013: Synergies of activities towards organisations' compliance -- The interrelation of game elements and privacy requirements for the design of a system: A metamodel -- Decentralised and Collaborative Auditing of Workflows -- Gender Inference for Facebook Picture Owners -- Unifying cyber threat intelligence. |
Record Nr. | UNISA-996466455003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust, Privacy, and Security in Digital Business [[electronic resource] ] : 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings / / edited by Claudia Eckert, Sokratis K. Katsikas, Günther Pernul |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XIV, 191 p. 44 illus.) |
Disciplina | 658.478 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Systems and Data Security Management of Computing and Information Systems Cryptology |
ISBN | 3-319-09770-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Trust management -- Trust metrics and evaluation models -- Privacy and trust in cloud computing -- Security management.- Security, trust, and privacy in mobile and pervasive environments. |
Record Nr. | UNISA-996202532303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust, Privacy, and Security in Digital Business [[electronic resource] ] : 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings / / edited by Claudia Eckert, Sokratis K. Katsikas, Günther Pernul |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XIV, 191 p. 44 illus.) |
Disciplina | 658.478 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Systems and Data Security Management of Computing and Information Systems Cryptology |
ISBN | 3-319-09770-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Trust management -- Trust metrics and evaluation models -- Privacy and trust in cloud computing -- Security management.- Security, trust, and privacy in mobile and pervasive environments. |
Record Nr. | UNINA-9910483457003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|