Advances in cryptology - ASIACRYPT 2021 . Part I. : 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6- 10, 2021, proceedings / / Mehdi Tibouchi and Huaxiong Wang, editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (715 pages) |
Disciplina | 001.5436 |
Collana | Lecture notes in computer science, security and cryptology |
Soggetto topico |
Cryptography
Computer security |
ISBN | 3-030-92062-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464513103316 |
Cham, Switzerland : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in cryptology - ASIACRYPT 2021 . Part IV. : 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6- 10, 2021, proceedings / / Mehdi Tibouchi, Huaxiong Wang, editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (784 pages) |
Disciplina | 001.5436 |
Collana | Lecture notes in computer science, security and cryptology |
Soggetto topico |
Cryptography
Computer security |
ISBN | 3-030-92068-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464405603316 |
Cham, Switzerland : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in cryptology -- ASIACRYPT 2021 . Part II : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings / / Mehdi Tibouchi, Huaxiong Wang (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (739 pages) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Soggetto topico |
Data encryption (Computer science)
Computer security |
ISBN | 3-030-92075-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910512310003321 |
Cham, Switzerland : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in cryptology -- ASIACRYPT 2021 . Part II : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings / / Mehdi Tibouchi, Huaxiong Wang (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (739 pages) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Soggetto topico |
Data encryption (Computer science)
Computer security |
ISBN | 3-030-92075-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464488403316 |
Cham, Switzerland : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Coding and Cryptology [[electronic resource] ] : Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings / / edited by Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, Huaxiong Wang, Chaoping Xing |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (VIII, 295 p.) |
Disciplina | 003/.54 |
Collana | Security and Cryptology |
Soggetto topico |
Coding theory
Information theory Data encryption (Computer science) Computer science—Mathematics Computer communication systems Coding and Information Theory Cryptology Discrete Mathematics in Computer Science Computer Communication Networks |
ISBN | 3-642-20901-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465276303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Coding and Cryptology [[electronic resource] ] : Second International Workshop, IWCC 2009 / / edited by Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (VIII, 275 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Coding theory Information theory Computer science—Mathematics Computer communication systems Cryptology Coding and Information Theory Discrete Mathematics in Computer Science Computer Communication Networks |
Soggetto genere / forma |
Kongress.
Zhangjiajie (2009) |
ISBN | 3-642-01877-7 |
Classificazione |
DAT 465f
DAT 580f SS 4800 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity -- Separation and Witnesses -- Binary Covering Arrays and Existentially Closed Graphs -- A Class of Three-Weight and Four-Weight Codes -- Equal-Weight Fingerprinting Codes -- Problems on Two-Dimensional Synchronization Patterns -- A New Client-to-Client Password-Authenticated Key Agreement Protocol -- Elliptic Twin Prime Conjecture -- Hunting for Curves with Many Points -- List Decoding of Binary Codes–A Brief Survey of Some Recent Results -- Recent Developments in Low-Density Parity-Check Codes -- On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks -- On Weierstrass Semigroups of Some Triples on Norm-Trace Curves -- ERINDALE: A Polynomial Based Hashing Algorithm -- A Survey of Algebraic Unitary Codes -- New Family of Non-Cartesian Perfect Authentication Codes -- On the Impossibility of Strong Encryption Over -- Minimum Distance between Bent and Resilient Boolean Functions -- Unconditionally Secure Approximate Message Authentication -- Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences -- On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction. |
Record Nr. | UNISA-996465845203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Coding and Cryptology [[electronic resource] ] : Second International Workshop, IWCC 2009 / / edited by Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (VIII, 275 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Coding theory Information theory Computer science—Mathematics Computer communication systems Cryptology Coding and Information Theory Discrete Mathematics in Computer Science Computer Communication Networks |
Soggetto genere / forma |
Kongress.
Zhangjiajie (2009) |
ISBN | 3-642-01877-7 |
Classificazione |
DAT 465f
DAT 580f SS 4800 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity -- Separation and Witnesses -- Binary Covering Arrays and Existentially Closed Graphs -- A Class of Three-Weight and Four-Weight Codes -- Equal-Weight Fingerprinting Codes -- Problems on Two-Dimensional Synchronization Patterns -- A New Client-to-Client Password-Authenticated Key Agreement Protocol -- Elliptic Twin Prime Conjecture -- Hunting for Curves with Many Points -- List Decoding of Binary Codes–A Brief Survey of Some Recent Results -- Recent Developments in Low-Density Parity-Check Codes -- On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks -- On Weierstrass Semigroups of Some Triples on Norm-Trace Curves -- ERINDALE: A Polynomial Based Hashing Algorithm -- A Survey of Algebraic Unitary Codes -- New Family of Non-Cartesian Perfect Authentication Codes -- On the Impossibility of Strong Encryption Over -- Minimum Distance between Bent and Resilient Boolean Functions -- Unconditionally Secure Approximate Message Authentication -- Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences -- On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction. |
Record Nr. | UNINA-9910483965103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptology and Network Security [[electronic resource] ] : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings / / edited by Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XII, 352 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Operating systems (Computers) Management information systems Computer science Computers and civilization Algorithms Computer Communication Networks Cryptology Operating Systems Management of Computing and Information Systems Computers and Society Algorithm Analysis and Problem Complexity |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -- An Immune-Based Model for Computer Virus Detection -- A New Model for Dynamic Intrusion Detection -- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection -- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time -- Authentication and Signature -- ID-Based Aggregate Signatures from Bilinear Pairings -- Efficient Identity-Based Signatures and Blind Signatures -- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures -- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange -- Signcryption -- Two Proxy Signcryption Schemes from Bilinear Pairings -- Constructing Secure Warrant-Based Proxy Signcryption Schemes -- E-mail Security -- Design and Implementation of an Inline Certified E-mail Service -- Efficient Identity-Based Protocol for Fair Certified E-mail Delivery -- Cryptosystems -- Similar Keys of Multivariate Quadratic Public Key Cryptosystems -- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems -- Constructions of Almost Resilient Functions -- Privacy and Tracing -- A Novel Method to Maintain Privacy in Mobile Agent Applications -- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring -- Information Hiding -- Revaluation of Error Correcting Coding in Watermarking Channel -- Firewalls, Denial of Service and DNS Security -- On the Performance and Analysis of DNS Security Extensions -- On Securing RTP-Based Streaming Content with Firewalls -- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling -- Trust Management -- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles. |
Record Nr. | UNISA-996465378403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptology and Network Security [[electronic resource] ] : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings / / edited by Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XII, 352 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Operating systems (Computers) Management information systems Computer science Computers and civilization Algorithms Computer Communication Networks Cryptology Operating Systems Management of Computing and Information Systems Computers and Society Algorithm Analysis and Problem Complexity |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -- An Immune-Based Model for Computer Virus Detection -- A New Model for Dynamic Intrusion Detection -- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection -- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time -- Authentication and Signature -- ID-Based Aggregate Signatures from Bilinear Pairings -- Efficient Identity-Based Signatures and Blind Signatures -- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures -- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange -- Signcryption -- Two Proxy Signcryption Schemes from Bilinear Pairings -- Constructing Secure Warrant-Based Proxy Signcryption Schemes -- E-mail Security -- Design and Implementation of an Inline Certified E-mail Service -- Efficient Identity-Based Protocol for Fair Certified E-mail Delivery -- Cryptosystems -- Similar Keys of Multivariate Quadratic Public Key Cryptosystems -- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems -- Constructions of Almost Resilient Functions -- Privacy and Tracing -- A Novel Method to Maintain Privacy in Mobile Agent Applications -- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring -- Information Hiding -- Revaluation of Error Correcting Coding in Watermarking Channel -- Firewalls, Denial of Service and DNS Security -- On the Performance and Analysis of DNS Security Extensions -- On Securing RTP-Based Streaming Content with Firewalls -- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling -- Trust Management -- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles. |
Record Nr. | UNINA-9910483449803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security and Privacy [[electronic resource] ] : 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings / / edited by Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XIV, 498 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Operating systems (Computers) Algorithms Computers and civilization Computer communication systems Cryptology Management of Computing and Information Systems Operating Systems Algorithm Analysis and Problem Complexity Computers and Society Computer Communication Networks |
ISBN | 3-540-27800-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Broadcast Encryption and Traitor Tracing -- Multi-service Oriented Broadcast Encryption -- Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme -- Linear Code Implies Public-Key Traitor Tracing with Revocation -- TTS without Revocation Capability Secure Against CCA2 -- Private Information Retrieval and Oblivious Transfer -- Single Database Private Information Retrieval with Logarithmic Communication -- Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions -- Trust and Secret Sharing -- Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing -- NGSCB: A Trusted Open System -- Cryptanalysis (I) -- The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers -- Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2 -- The Related-Key Rectangle Attack – Application to SHACAL-1 -- Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1 -- The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders -- Cryptanalysis (II) -- Analysis of a Conference Scheme Under Active and Passive Attacks -- Cryptanalysis of Two Password-Authenticated Key Exchange Protocols -- Analysis and Improvement of Micali’s Fair Contract Signing Protocol -- Digital Signatures (I) -- Digital Signature Schemes with Domain Parameters -- Generic Construction of Certificateless Signature -- Cryptosystems (I) -- A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model -- How to Re-use Round Function in Super-Pseudorandom Permutation -- How to Remove MAC from DHIES -- Symmetric Key Authentication Services Revisited -- Fast Computation -- Improvements to the Point Halving Algorithm -- Theoretical Analysis of XL over Small Fields -- A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks -- Mobile Agents Security -- A Mobile Agent System Providing Offer Privacy -- Digital Signatures (II) -- Identity-Based Strong Designated Verifier Signature Schemes -- Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups -- A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups -- Convertible Nominative Signatures -- Protocols -- Protocols with Security Proofs for Mobile Applications -- Secure Bilinear Diffie-Hellman Bits -- Weak Property of Malleability in NTRUSign -- Security Management -- Information Security Risk Assessment, Aggregation, and Mitigation -- Access Control and Authorisation -- A Weighted Graph Approach to Authorization Delegation and Conflict Resolution -- Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems -- Cryptosystems (II) -- Unconditionally Secure Encryption Under Strong Attacks -- ManTiCore: Encryption with Joint Cipher-State Authentication -- Cryptanalysis (III) -- On Security of XTR Public Key Cryptosystems Against Side Channel Attacks -- On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks -- Fault Attacks on Signature Schemes. |
Record Nr. | UNINA-9910144185603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|