top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Proceedings : third International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2008 : Malaga, Spain, 9 October 2008
Proceedings : third International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2008 : Malaga, Spain, 9 October 2008
Pubbl/distr/stampa [Place of publication not identified], : CPS Conference Pub Services, 2008
Disciplina 005.8
Soggetto topico Digital forensic science
Engineering & Applied Sciences
Computer Science
ISBN 1-5090-7895-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910145667903321
[Place of publication not identified], : CPS Conference Pub Services, 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public Key Infrastructure [[electronic resource] ] : First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings / / edited by Sokratis K. Katsikas, Stefanos Gritzalis
Public Key Infrastructure [[electronic resource] ] : First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings / / edited by Sokratis K. Katsikas, Stefanos Gritzalis
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XIV, 386 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Algorithms
Information storage and retrieval
Application software
Computers and civilization
Management information systems
Computer science
Cryptology
Algorithm Analysis and Problem Complexity
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-25980-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto to the Belgian EID Card -- The EuroPKI Experience -- CERVANTES – A Certificate Validation Test-Bed -- Flexible and Scalable Public Key Security for SSH -- What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved -- Identity-Based Cryptography in Public Key Management -- Pre-production Methods of a Response to Certificates with the Common Status –Design and Theoretical Evaluation– -- Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures -- A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications -- Using LDAP Directories for Management of PKI Processes -- Recursive Certificate Structures for X.509 Systems -- A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions -- A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation -- TACAR: a Simple and Fast Way for Building Trust among PKIs -- On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments -- A Socially Inspired Reputation Model -- Using EMV Cards for Single Sign-On -- Distributing Security-Mediated PKI -- Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography -- ÆTHER: an Authorization Management Architecture for Ubiquitous Computing -- Trustworthy Accounting for Wireless LAN Sharing Communities -- Mobile Qualified Electronic Signatures and Certification on Demand -- Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks -- A Credential Conversion Service for SAML-based Scenarios -- A New Design of Privilege Management Infrastructure with Binding Signature Semantics -- How to Qualify Electronic Signatures and Time Stamps -- An Efficient Revocation Scheme for Stateless Receivers -- On the Use of Weber Polynomials in Elliptic Curve Cryptography -- Threshold Password-Based Authentication Using Bilinear Pairings -- An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications.
Record Nr. UNINA-9910144154203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public Key Infrastructure [[electronic resource] ] : First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings / / edited by Sokratis K. Katsikas, Stefanos Gritzalis
Public Key Infrastructure [[electronic resource] ] : First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings / / edited by Sokratis K. Katsikas, Stefanos Gritzalis
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XIV, 386 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Algorithms
Information storage and retrieval
Application software
Computers and civilization
Management information systems
Computer science
Cryptology
Algorithm Analysis and Problem Complexity
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-25980-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto to the Belgian EID Card -- The EuroPKI Experience -- CERVANTES – A Certificate Validation Test-Bed -- Flexible and Scalable Public Key Security for SSH -- What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved -- Identity-Based Cryptography in Public Key Management -- Pre-production Methods of a Response to Certificates with the Common Status –Design and Theoretical Evaluation– -- Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures -- A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications -- Using LDAP Directories for Management of PKI Processes -- Recursive Certificate Structures for X.509 Systems -- A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions -- A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation -- TACAR: a Simple and Fast Way for Building Trust among PKIs -- On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments -- A Socially Inspired Reputation Model -- Using EMV Cards for Single Sign-On -- Distributing Security-Mediated PKI -- Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography -- ÆTHER: an Authorization Management Architecture for Ubiquitous Computing -- Trustworthy Accounting for Wireless LAN Sharing Communities -- Mobile Qualified Electronic Signatures and Certification on Demand -- Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks -- A Credential Conversion Service for SAML-based Scenarios -- A New Design of Privilege Management Infrastructure with Binding Signature Semantics -- How to Qualify Electronic Signatures and Time Stamps -- An Efficient Revocation Scheme for Stateless Receivers -- On the Use of Weber Polynomials in Elliptic Curve Cryptography -- Threshold Password-Based Authentication Using Bilinear Pairings -- An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications.
Record Nr. UNISA-996466235703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Trust Management [[electronic resource] ] : 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedings / / edited by Sokratis K. Katsikas, Cristina Alcaraz
Security and Trust Management [[electronic resource] ] : 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedings / / edited by Sokratis K. Katsikas, Cristina Alcaraz
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (VII, 139 p. 19 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Computer communication systems
Computer logic
Application software
Computers
Systems and Data Security
Software Engineering
Computer Communication Networks
Logics and Meanings of Programs
Information Systems Applications (incl. Internet)
Computing Milieux
ISBN 3-030-01141-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptosystems and Applied Cryptography -- Modelling and Risk Assessment -- Trust Computing.
Record Nr. UNINA-9910349399803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Trust Management [[electronic resource] ] : 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedings / / edited by Sokratis K. Katsikas, Cristina Alcaraz
Security and Trust Management [[electronic resource] ] : 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedings / / edited by Sokratis K. Katsikas, Cristina Alcaraz
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (VII, 139 p. 19 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Computer communication systems
Computer logic
Application software
Computers
Systems and Data Security
Software Engineering
Computer Communication Networks
Logics and Meanings of Programs
Information Systems Applications (incl. Internet)
Computing Milieux
ISBN 3-030-01141-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptosystems and Applied Cryptography -- Modelling and Risk Assessment -- Trust Computing.
Record Nr. UNISA-996466428903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security in Computer and Information Sciences : First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers / / edited by Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokratis K. Katsikas, Ioannis Komnios, Luigi Romano, Dimitrios Tzovaras
Security in Computer and Information Sciences : First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers / / edited by Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokratis K. Katsikas, Ioannis Komnios, Luigi Romano, Dimitrios Tzovaras
Edizione [First edition, 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 159 pages, 33 illustrations)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Application software
Cryptography
Data encryption (Computer science)
Computers, Special purpose
Computer networks
Data and Information Security
Computer and Information Systems Applications
Cryptology
Special Purpose and Application-Based Systems
Computer Communication Networks
ISBN 3-319-95189-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security of distributed interconnected systems -- Security of software systems -- Security of the Internet of Things.
Record Nr. UNINA-9910299288103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedings / / edited by Stefanos Gritzalis, Edgar R. Weippl, Sokratis K. Katsikas, Gabriele Anderst-Kotsis, A Min Tjoa, Ismail Khalil
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedings / / edited by Stefanos Gritzalis, Edgar R. Weippl, Sokratis K. Katsikas, Gabriele Anderst-Kotsis, A Min Tjoa, Ismail Khalil
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 177 p. 34 illus., 27 illus. in color.)
Disciplina 658.478
Collana Security and Cryptology
Soggetto topico Computer security
Application software
Computers and civilization
Systems and Data Security
Information Systems Applications (incl. Internet)
Computer Appl. in Social and Behavioral Sciences
Computers and Society
ISBN 3-030-27813-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing -- I Agree: Customize your Personal Data Processing with the CoRe User Interface -- I Did Not Accept That: Demonstrating Consent in Online Collection of Personal Data -- Privacy Policy Specification Framework for Addressing End-Users' Privacy Requirements -- A data utility-driven benchmark for de-identification methods -- DEFeND Architecture: a Privacy by Design Platform for GDPR Compliance -- General Data Protection Regulation and ISO/IEC 27001:2013: Synergies of activities towards organisations' compliance -- The interrelation of game elements and privacy requirements for the design of a system: A metamodel -- Decentralised and Collaborative Auditing of Workflows -- Gender Inference for Facebook Picture Owners -- Unifying cyber threat intelligence.
Record Nr. UNINA-9910349304003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedings / / edited by Stefanos Gritzalis, Edgar R. Weippl, Sokratis K. Katsikas, Gabriele Anderst-Kotsis, A Min Tjoa, Ismail Khalil
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedings / / edited by Stefanos Gritzalis, Edgar R. Weippl, Sokratis K. Katsikas, Gabriele Anderst-Kotsis, A Min Tjoa, Ismail Khalil
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 177 p. 34 illus., 27 illus. in color.)
Disciplina 658.478
Collana Security and Cryptology
Soggetto topico Computer security
Application software
Computers and civilization
Systems and Data Security
Information Systems Applications (incl. Internet)
Computer Appl. in Social and Behavioral Sciences
Computers and Society
ISBN 3-030-27813-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing -- I Agree: Customize your Personal Data Processing with the CoRe User Interface -- I Did Not Accept That: Demonstrating Consent in Online Collection of Personal Data -- Privacy Policy Specification Framework for Addressing End-Users' Privacy Requirements -- A data utility-driven benchmark for de-identification methods -- DEFeND Architecture: a Privacy by Design Platform for GDPR Compliance -- General Data Protection Regulation and ISO/IEC 27001:2013: Synergies of activities towards organisations' compliance -- The interrelation of game elements and privacy requirements for the design of a system: A metamodel -- Decentralised and Collaborative Auditing of Workflows -- Gender Inference for Facebook Picture Owners -- Unifying cyber threat intelligence.
Record Nr. UNISA-996466455003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust, Privacy, and Security in Digital Business [[electronic resource] ] : 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings / / edited by Claudia Eckert, Sokratis K. Katsikas, Günther Pernul
Trust, Privacy, and Security in Digital Business [[electronic resource] ] : 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings / / edited by Claudia Eckert, Sokratis K. Katsikas, Günther Pernul
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XIV, 191 p. 44 illus.)
Disciplina 658.478
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Systems and Data Security
Management of Computing and Information Systems
Cryptology
ISBN 3-319-09770-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trust management -- Trust metrics and evaluation models -- Privacy and trust in cloud computing -- Security management.- Security, trust, and privacy in mobile and pervasive environments.
Record Nr. UNISA-996202532303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust, Privacy, and Security in Digital Business [[electronic resource] ] : 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings / / edited by Claudia Eckert, Sokratis K. Katsikas, Günther Pernul
Trust, Privacy, and Security in Digital Business [[electronic resource] ] : 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings / / edited by Claudia Eckert, Sokratis K. Katsikas, Günther Pernul
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XIV, 191 p. 44 illus.)
Disciplina 658.478
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Systems and Data Security
Management of Computing and Information Systems
Cryptology
ISBN 3-319-09770-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trust management -- Trust metrics and evaluation models -- Privacy and trust in cloud computing -- Security management.- Security, trust, and privacy in mobile and pervasive environments.
Record Nr. UNINA-9910483457003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui