top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security and Cryptology : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers / / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung
Information Security and Cryptology : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers / / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XXI, 530 p. 84 illus.)
Disciplina 303.4834
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Computers and civilization
Computers
Law and legislation
Data mining
Systems and Data Security
Cryptology
Coding and Information Theory
Computers and Society
Legal Aspects of Computing
Data Mining and Knowledge Discovery
ISBN 3-319-75160-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910349460403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Cryptology [[electronic resource] ] : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers / / edited by Kefei Chen, Dongdai Lin, Moti Yung
Information Security and Cryptology [[electronic resource] ] : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers / / edited by Kefei Chen, Dongdai Lin, Moti Yung
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 544 p. 78 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Data encryption (Computer science)
Computers and civilization
Computer communication systems
Application software
Systems and Data Security
Software Engineering
Cryptology
Computers and Society
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-319-54705-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symmetric ciphers -- Public-key cryptosystems -- Signature and authentication -- Homomorphic encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves -- Security and implementation.
Record Nr. UNISA-996466335903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Cryptology : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers / / edited by Kefei Chen, Dongdai Lin, Moti Yung
Information Security and Cryptology : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers / / edited by Kefei Chen, Dongdai Lin, Moti Yung
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 544 p. 78 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Data encryption (Computer science)
Computers and civilization
Computer communication systems
Application software
Systems and Data Security
Software Engineering
Cryptology
Computers and Society
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-319-54705-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symmetric ciphers -- Public-key cryptosystems -- Signature and authentication -- Homomorphic encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves -- Security and implementation.
Record Nr. UNINA-9910483526403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Cryptology [[electronic resource] ] : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers / / edited by Dongdai Lin, XiaoFeng Wang, Moti Yung
Information Security and Cryptology [[electronic resource] ] : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers / / edited by Dongdai Lin, XiaoFeng Wang, Moti Yung
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 490 p. 102 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Algorithms
Computer science—Mathematics
Systems and Data Security
Cryptology
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-319-38898-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash function -- Signature schemes -- Symmetric ciphers -- Elliptic curve and cryptographic fundamentals -- Web and applications security -- Cloud security -- Key management and public key encryption -- Zero knowledge and secure computations -- Software and mobile security.
Record Nr. UNISA-996465675303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Cryptology : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers / / edited by Dongdai Lin, XiaoFeng Wang, Moti Yung
Information Security and Cryptology : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers / / edited by Dongdai Lin, XiaoFeng Wang, Moti Yung
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 490 p. 102 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Algorithms
Computer science—Mathematics
Systems and Data Security
Cryptology
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-319-38898-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash function -- Signature schemes -- Symmetric ciphers -- Elliptic curve and cryptographic fundamentals -- Web and applications security -- Cloud security -- Key management and public key encryption -- Zero knowledge and secure computations -- Software and mobile security.
Record Nr. UNINA-9910484215303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Cryptology [[electronic resource] ] : 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers / / edited by Dongdai Lin, Moti Yung, Jianying Zhou
Information Security and Cryptology [[electronic resource] ] : 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers / / edited by Dongdai Lin, Moti Yung, Jianying Zhou
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 547 p. 92 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Coding theory
Information theory
Algorithms
Computer science—Mathematics
Discrete mathematics
Data and Information Security
Cryptology
Coding and Information Theory
Discrete Mathematics in Computer Science
ISBN 3-319-16745-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Efficient Privacy-Preserving E-coupon System -- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature -- Revocation in Publicly Verifiable Outsourced Computation -- Private Aggregation with Custom Collusion Tolerance -- Ring Signatures of Constant Size Without Random Oracles -- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control -- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge -- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC -- Optimal Proximity Proofs -- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions -- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization -- Fully Homomorphic Encryption with Auxiliary Inputs -- Trapdoors for Ideal Lattices with Applications -- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails -- The Boomerang Attacks on BLAKE and BLAKE2 -- Second Preimage Analysis of Whirlwind -- Boomerang Attack on Step-Reduced SHA-512 -- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption -- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts -- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks -- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication -- A Note on Diem’s Proof -- Stand-by Attacks on E-ID Password Authentication -- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps -- A Lightweight Security Isolation Approach for Virtual Machines Deployment -- A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors.
Record Nr. UNISA-996200343703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Cryptology : 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers / / edited by Dongdai Lin, Moti Yung, Jianying Zhou
Information Security and Cryptology : 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers / / edited by Dongdai Lin, Moti Yung, Jianying Zhou
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 547 p. 92 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Coding theory
Information theory
Algorithms
Computer science—Mathematics
Discrete mathematics
Data and Information Security
Cryptology
Coding and Information Theory
Discrete Mathematics in Computer Science
ISBN 3-319-16745-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Efficient Privacy-Preserving E-coupon System -- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature -- Revocation in Publicly Verifiable Outsourced Computation -- Private Aggregation with Custom Collusion Tolerance -- Ring Signatures of Constant Size Without Random Oracles -- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control -- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge -- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC -- Optimal Proximity Proofs -- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions -- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization -- Fully Homomorphic Encryption with Auxiliary Inputs -- Trapdoors for Ideal Lattices with Applications -- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails -- The Boomerang Attacks on BLAKE and BLAKE2 -- Second Preimage Analysis of Whirlwind -- Boomerang Attack on Step-Reduced SHA-512 -- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption -- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts -- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks -- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication -- A Note on Diem’s Proof -- Stand-by Attacks on E-ID Password Authentication -- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps -- A Lightweight Security Isolation Approach for Virtual Machines Deployment -- A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors.
Record Nr. UNINA-9910484615003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Cryptology [[electronic resource] ] : 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers / / edited by Dongdai Lin, Shouhuai Xu, Moti Yung
Information Security and Cryptology [[electronic resource] ] : 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers / / edited by Dongdai Lin, Shouhuai Xu, Moti Yung
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XIII, 408 p. 51 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Coding theory
Information theory
Algorithms
Data and Information Security
Cryptology
Coding and Information Theory
ISBN 3-319-12087-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Boolean Function and Block Cipher -- Sequence and Stream Cipher -- Applications: Systems and Theory -- Computational Number Theory -- Public Key Cryptography -- Hash Function -- Side-Channel and Leakage -- Application and System Security.
Record Nr. UNISA-996213649103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Cryptology : 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers / / edited by Dongdai Lin, Shouhuai Xu, Moti Yung
Information Security and Cryptology : 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers / / edited by Dongdai Lin, Shouhuai Xu, Moti Yung
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XIII, 408 p. 51 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Coding theory
Information theory
Algorithms
Data and Information Security
Cryptology
Coding and Information Theory
ISBN 3-319-12087-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Boolean Function and Block Cipher -- Sequence and Stream Cipher -- Applications: Systems and Theory -- Computational Number Theory -- Public Key Cryptography -- Hash Function -- Side-Channel and Leakage -- Application and System Security.
Record Nr. UNINA-9910484427703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Cryptology [[electronic resource] ] : 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers / / edited by Chuan-Kun Wu, Moti Yung, Dongdai Lin
Information Security and Cryptology [[electronic resource] ] : 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers / / edited by Chuan-Kun Wu, Moti Yung, Dongdai Lin
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (X, 396 p. 56 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Coding theory
Information theory
Algorithms
Information technology—Management
Electronic commerce
Data and Information Security
Cryptology
Coding and Information Theory
Computer Application in Administrative Data Processing
e-Commerce and e-Business
ISBN 3-642-34704-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems -- Cryptanalysis vs. Provable Security -- Boosting Scalability in Anomaly-Based Packed Executable Filtering -- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs -- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming -- Adleman-Manders-Miller Root Extraction Method Revisited -- Multi-pixel Encryption Visual Cryptography -- An Improved Electronic Voting Scheme without a Trusted Random Number Generator -- Fault Attacks against the Miller Algorithm in Hessian Coordinates -- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion -- Improved Tradeoff between Encapsulation and Decapsulation of HK09 -- Non-interactive Deniable Authentication Protocols -- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3 -- Efficient Self-certified Signatures with Batch Verification -- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening -- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves -- Weak-Key Class of MISTY1 for Related-Key Differential Attack -- Cryptanalysis of Reduced-Round KLEIN Block Cipher -- An Efficient RSA Implementation without Precomputation -- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures -- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation -- Towards Attack Resilient Social Network Based Threshold Signing -- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings -- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model.
Record Nr. UNISA-996465661203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui