Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance [[electronic resource] ] : 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, Neeraj Suri |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVIII, 343 p. 60 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Systems and Data Security Management of Computing and Information Systems Cryptology |
ISBN | 3-319-17016-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data privacy management -- Autonomous and spontaneous security -- Quantitative aspects in security assurance. |
Record Nr. | UNISA-996200343503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance [[electronic resource] ] : 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, Neeraj Suri |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVIII, 343 p. 60 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Systems and Data Security Management of Computing and Information Systems Cryptology |
ISBN | 3-319-17016-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data privacy management -- Autonomous and spontaneous security -- Quantitative aspects in security assurance. |
Record Nr. | UNINA-9910483321003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems [[electronic resource] ] : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012, Proceedings / / edited by Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XII, 225 p. 42 illus.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Management information systems Computer science Data encryption (Computer science) Data structures (Computer science) Computer security Computers and civilization Computer Communication Networks Management of Computing and Information Systems Cryptology Data Structures and Information Theory Systems and Data Security Computers and Society |
ISBN | 3-642-30955-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465283103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices [[electronic resource] ] : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings / / edited by Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIII, 386 p. 93 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Management information systems Computer science Data encryption (Computer science) Algorithms Computer security Computers and civilization Computer Communication Networks Management of Computing and Information Systems Cryptology Algorithm Analysis and Problem Complexity Systems and Data Security Computers and Society |
Soggetto genere / forma |
Kongress 2010
Kongress. Passau (2010) |
ISBN |
1-280-38621-5
9786613564139 3-642-12368-6 |
Classificazione |
DAT 179f
DAT 260f DAT 460f DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Embedded Security -- Efficient and Effective Buffer Overflow Protection on ARM Processors -- Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines -- A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones -- A Smart Card Implementation of the McEliece PKC -- Evaluation Metrics of Physical Non-invasive Security -- Protocols -- Trust in Peer-to-Peer Content Distribution Protocols -- Generic Constructions of Biometric Identity Based Encryption Systems -- Design and Analysis of a Generalized Canvas Protocol -- Highly Constrained Embedded Systems -- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures -- Practical Schemes for Privacy and Security Enhanced RFID -- MoteAODV – An AODV Implementation for TinyOS 2.0 -- Security -- Random Number Generation Based on Fingerprints -- Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML -- Fraud Detection for Voice over IP Services on Next-Generation Networks -- Smart Card Security -- Proxy Smart Card Systems -- Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract? -- Website Credential Storage and Two-Factor Web Authentication with a Java SIM -- Algorithms -- Attribute-Based Encryption with Break-Glass -- On the Security of a Two-Factor Authentication Scheme -- The Design of Secure and Efficient P2PSIP Communication Systems -- Hardware Implementations -- Novel FPGA-Based Signature Matching for Deep Packet Inspection -- Towards Electrical, Integrated Implementations of SIMPL Systems -- A Very Compact Hardware Implementation of the KASUMI Block Cipher -- Embedded Systems -- Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions -- Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions -- Security Analysis of Mobile Phones Used as OTP Generators -- An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks -- Anonymity/Database Security -- The Market Failure of Anonymity Services -- Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios -- Predicting and Preventing Insider Threat in Relational Database Systems. |
Record Nr. | UNISA-996465606403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices [[electronic resource] ] : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings / / edited by Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIII, 386 p. 93 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Management information systems Computer science Data encryption (Computer science) Algorithms Computer security Computers and civilization Computer Communication Networks Management of Computing and Information Systems Cryptology Algorithm Analysis and Problem Complexity Systems and Data Security Computers and Society |
Soggetto genere / forma |
Kongress 2010
Kongress. Passau (2010) |
ISBN |
1-280-38621-5
9786613564139 3-642-12368-6 |
Classificazione |
DAT 179f
DAT 260f DAT 460f DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Embedded Security -- Efficient and Effective Buffer Overflow Protection on ARM Processors -- Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines -- A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones -- A Smart Card Implementation of the McEliece PKC -- Evaluation Metrics of Physical Non-invasive Security -- Protocols -- Trust in Peer-to-Peer Content Distribution Protocols -- Generic Constructions of Biometric Identity Based Encryption Systems -- Design and Analysis of a Generalized Canvas Protocol -- Highly Constrained Embedded Systems -- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures -- Practical Schemes for Privacy and Security Enhanced RFID -- MoteAODV – An AODV Implementation for TinyOS 2.0 -- Security -- Random Number Generation Based on Fingerprints -- Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML -- Fraud Detection for Voice over IP Services on Next-Generation Networks -- Smart Card Security -- Proxy Smart Card Systems -- Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract? -- Website Credential Storage and Two-Factor Web Authentication with a Java SIM -- Algorithms -- Attribute-Based Encryption with Break-Glass -- On the Security of a Two-Factor Authentication Scheme -- The Design of Secure and Efficient P2PSIP Communication Systems -- Hardware Implementations -- Novel FPGA-Based Signature Matching for Deep Packet Inspection -- Towards Electrical, Integrated Implementations of SIMPL Systems -- A Very Compact Hardware Implementation of the KASUMI Block Cipher -- Embedded Systems -- Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions -- Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions -- Security Analysis of Mobile Phones Used as OTP Generators -- An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks -- Anonymity/Database Security -- The Market Failure of Anonymity Services -- Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios -- Predicting and Preventing Insider Threat in Relational Database Systems. |
Record Nr. | UNINA-9910483105903321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Trust Management [[electronic resource] ] : 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings / / edited by Ruben Rios, Joachim Posegga |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (153 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Computer networks Software engineering Application software Data mining Security Services Data and Information Security Computer Communication Networks Software Engineering Computer and Information Systems Applications Data Mining and Knowledge Discovery |
ISBN | 3-031-47198-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Impact of Consensus Protocols on the Efficiency of Registration and Authentication process in Self-Sovereign Identity -- Biometric-Based Password Management -- ‘State of the Union’: Evaluating Open Source Zero Trust Components -- Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things -- Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems -- Decentralized Global Trust Registry Platform for trust discovery and verification of e-Health credentials using TRAIN: COVID-19 Certificate use case -- Privacy-Preserving NN for IDS: A Study on the impact of TFHE restrictions -- Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System -- Consent as mechanism to preserve information privacy: Its origin, evolution, and current relevance. |
Record Nr. | UNINA-9910755083103321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Trust Management [[electronic resource] ] : 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings / / edited by Ruben Rios, Joachim Posegga |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (153 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Computer networks Software engineering Application software Data mining Security Services Data and Information Security Computer Communication Networks Software Engineering Computer and Information Systems Applications Data Mining and Knowledge Discovery |
ISBN | 3-031-47198-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Impact of Consensus Protocols on the Efficiency of Registration and Authentication process in Self-Sovereign Identity -- Biometric-Based Password Management -- ‘State of the Union’: Evaluating Open Source Zero Trust Components -- Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things -- Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems -- Decentralized Global Trust Registry Platform for trust discovery and verification of e-Health credentials using TRAIN: COVID-19 Certificate use case -- Privacy-Preserving NN for IDS: A Study on the impact of TFHE restrictions -- Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System -- Consent as mechanism to preserve information privacy: Its origin, evolution, and current relevance. |
Record Nr. | UNISA-996558464603316 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart Card Research and Advanced Applications [[electronic resource] ] : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XII, 360 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Computers and civilization Computer communication systems Operating systems (Computers) Cryptology Management of Computing and Information Systems Computers and Society Computer Communication Networks Operating Systems |
ISBN | 3-540-33312-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Smart Card Applications -- Design, Installation and Execution of a Security Agent for Mobile Stations -- Towards a Secure and Practical Multifunctional Smart Card -- Implementing Cryptography on TFT Technology for Secure Display Applications -- A Smart Card-Based Mental Poker System -- A Smart Card Solution for Access Control and Trust Management for Nomadic Users -- Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards -- Zero Footprint Secure Internet Authentication Using Network Smart Card -- An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items -- Side Channel Attacks -- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations -- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis -- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring -- Smart Card Networking -- Designing Smartcards for Emerging Wireless Networks -- Smartcard Firewalls Revisited -- Multi-stage Packet Filtering in Network Smart Cards -- Cryptographic Protocols -- Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability -- SEA: A Scalable Encryption Algorithm for Small Embedded Applications -- Low-Cost Cryptography for Privacy in RFID Systems -- Optimal Use of Montgomery Multiplication on Smart Cards -- Off-Line Group Signatures with Smart Cards -- RFID Security -- Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags -- Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags -- MARP: Mobile Agent for RFID Privacy Protection -- Formal Methods -- Certifying Native Java Card API by Formal Refinement -- A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods -- Automatic Test Generation on a (U)SIM Smart Card. |
Record Nr. | UNISA-996466113903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart Card Research and Advanced Applications [[electronic resource] ] : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XII, 360 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Computers and civilization Computer communication systems Operating systems (Computers) Cryptology Management of Computing and Information Systems Computers and Society Computer Communication Networks Operating Systems |
ISBN | 3-540-33312-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Smart Card Applications -- Design, Installation and Execution of a Security Agent for Mobile Stations -- Towards a Secure and Practical Multifunctional Smart Card -- Implementing Cryptography on TFT Technology for Secure Display Applications -- A Smart Card-Based Mental Poker System -- A Smart Card Solution for Access Control and Trust Management for Nomadic Users -- Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards -- Zero Footprint Secure Internet Authentication Using Network Smart Card -- An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items -- Side Channel Attacks -- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations -- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis -- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring -- Smart Card Networking -- Designing Smartcards for Emerging Wireless Networks -- Smartcard Firewalls Revisited -- Multi-stage Packet Filtering in Network Smart Cards -- Cryptographic Protocols -- Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability -- SEA: A Scalable Encryption Algorithm for Small Embedded Applications -- Low-Cost Cryptography for Privacy in RFID Systems -- Optimal Use of Montgomery Multiplication on Smart Cards -- Off-Line Group Signatures with Smart Cards -- RFID Security -- Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags -- Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags -- MARP: Mobile Agent for RFID Privacy Protection -- Formal Methods -- Certifying Native Java Card API by Formal Refinement -- A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods -- Automatic Test Generation on a (U)SIM Smart Card. |
Record Nr. | UNINA-9910483040603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Theorem Proving with Analytic Tableaux and Related Methods [[electronic resource] ] : 4th International Workshop, TABLEAUX-95, Schloß Rheinfels, St. Goar, Germany, May 7 - 10, 1995. Proceedings / / edited by Peter Baumgartner, Reiner Hähnle, Joachim Posegga |
Edizione | [1st ed. 1995.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1995 |
Descrizione fisica | 1 online resource (XI, 361 p.) |
Disciplina | 005.1/1 |
Collana | Lecture Notes in Artificial Intelligence |
Soggetto topico |
Artificial intelligence
Mathematical logic Computers Artificial Intelligence Mathematical Logic and Foundations Theory of Computation Mathematical Logic and Formal Languages |
ISBN | 3-540-49235-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Issues in theorem proving based on the connection method -- Rigid E-unification simplified -- Generating finite counter examples with semantic tableaux -- Semantic tableaus for inheritance nets -- Using connection method in modal logics: Some advantages -- Labelled tableaux for multi-modal logics -- Refutation systems for prepositional modal logics -- On transforming intuitionistic matrix proofs into standard-sequent proofs -- A connection based proof method for intuitionistic logic -- Tableau for intuitionistic predicate logic as metatheory -- Model building and interactive theory discovery -- Link deletion in model elimination -- Specifications of inference rules and their automatic translation -- Constraint model elimination and a PTTP-implementation -- Non-elementary speedups between different versions of tableaux -- Syntactic reduction of predicate tableaux to propositional tableaux -- Classical Lambek logic -- Linear logic with isabelle: Pruning the proof search tree -- Linear analytic tableaux -- Higher-order tableaux -- Propositional logics on the computer -- MacKE: Yet another proof assistant & automated pedagogic tool -- Using the theorem prover SETHEO for verifying the development of a communication protocol in FOCUS -A Case Study-. |
Record Nr. | UNISA-996466129903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1995 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|