top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in cryptology - ASIACRYPT 2021 . Part I. : 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6- 10, 2021, proceedings / / Mehdi Tibouchi and Huaxiong Wang, editors
Advances in cryptology - ASIACRYPT 2021 . Part I. : 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6- 10, 2021, proceedings / / Mehdi Tibouchi and Huaxiong Wang, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (715 pages)
Disciplina 001.5436
Collana Lecture notes in computer science, security and cryptology
Soggetto topico Cryptography
Computer security
ISBN 3-030-92062-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464513103316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in cryptology - ASIACRYPT 2021 . Part IV. : 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6- 10, 2021, proceedings / / Mehdi Tibouchi, Huaxiong Wang, editors
Advances in cryptology - ASIACRYPT 2021 . Part IV. : 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6- 10, 2021, proceedings / / Mehdi Tibouchi, Huaxiong Wang, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (784 pages)
Disciplina 001.5436
Collana Lecture notes in computer science, security and cryptology
Soggetto topico Cryptography
Computer security
ISBN 3-030-92068-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464405603316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in cryptology -- ASIACRYPT 2021 . Part II : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings / / Mehdi Tibouchi, Huaxiong Wang (editors)
Advances in cryptology -- ASIACRYPT 2021 . Part II : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings / / Mehdi Tibouchi, Huaxiong Wang (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (739 pages)
Disciplina 005.82
Collana Lecture notes in computer science
Soggetto topico Data encryption (Computer science)
Computer security
ISBN 3-030-92075-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910512310003321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in cryptology -- ASIACRYPT 2021 . Part II : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings / / Mehdi Tibouchi, Huaxiong Wang (editors)
Advances in cryptology -- ASIACRYPT 2021 . Part II : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings / / Mehdi Tibouchi, Huaxiong Wang (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (739 pages)
Disciplina 005.82
Collana Lecture notes in computer science
Soggetto topico Data encryption (Computer science)
Computer security
ISBN 3-030-92075-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464488403316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Coding and Cryptology [[electronic resource] ] : Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings / / edited by Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, Huaxiong Wang, Chaoping Xing
Coding and Cryptology [[electronic resource] ] : Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings / / edited by Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, Huaxiong Wang, Chaoping Xing
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (VIII, 295 p.)
Disciplina 003/.54
Collana Security and Cryptology
Soggetto topico Coding theory
Information theory
Data encryption (Computer science)
Computer science—Mathematics
Computer communication systems
Coding and Information Theory
Cryptology
Discrete Mathematics in Computer Science
Computer Communication Networks
ISBN 3-642-20901-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465276303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Coding and Cryptology [[electronic resource] ] : Second International Workshop, IWCC 2009 / / edited by Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing
Coding and Cryptology [[electronic resource] ] : Second International Workshop, IWCC 2009 / / edited by Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (VIII, 275 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Coding theory
Information theory
Computer science—Mathematics
Computer communication systems
Cryptology
Coding and Information Theory
Discrete Mathematics in Computer Science
Computer Communication Networks
Soggetto genere / forma Kongress.
Zhangjiajie (2009)
ISBN 3-642-01877-7
Classificazione DAT 465f
DAT 580f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity -- Separation and Witnesses -- Binary Covering Arrays and Existentially Closed Graphs -- A Class of Three-Weight and Four-Weight Codes -- Equal-Weight Fingerprinting Codes -- Problems on Two-Dimensional Synchronization Patterns -- A New Client-to-Client Password-Authenticated Key Agreement Protocol -- Elliptic Twin Prime Conjecture -- Hunting for Curves with Many Points -- List Decoding of Binary Codes–A Brief Survey of Some Recent Results -- Recent Developments in Low-Density Parity-Check Codes -- On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks -- On Weierstrass Semigroups of Some Triples on Norm-Trace Curves -- ERINDALE: A Polynomial Based Hashing Algorithm -- A Survey of Algebraic Unitary Codes -- New Family of Non-Cartesian Perfect Authentication Codes -- On the Impossibility of Strong Encryption Over -- Minimum Distance between Bent and Resilient Boolean Functions -- Unconditionally Secure Approximate Message Authentication -- Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences -- On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction.
Record Nr. UNISA-996465845203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Coding and Cryptology [[electronic resource] ] : Second International Workshop, IWCC 2009 / / edited by Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing
Coding and Cryptology [[electronic resource] ] : Second International Workshop, IWCC 2009 / / edited by Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (VIII, 275 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Coding theory
Information theory
Computer science—Mathematics
Computer communication systems
Cryptology
Coding and Information Theory
Discrete Mathematics in Computer Science
Computer Communication Networks
Soggetto genere / forma Kongress.
Zhangjiajie (2009)
ISBN 3-642-01877-7
Classificazione DAT 465f
DAT 580f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity -- Separation and Witnesses -- Binary Covering Arrays and Existentially Closed Graphs -- A Class of Three-Weight and Four-Weight Codes -- Equal-Weight Fingerprinting Codes -- Problems on Two-Dimensional Synchronization Patterns -- A New Client-to-Client Password-Authenticated Key Agreement Protocol -- Elliptic Twin Prime Conjecture -- Hunting for Curves with Many Points -- List Decoding of Binary Codes–A Brief Survey of Some Recent Results -- Recent Developments in Low-Density Parity-Check Codes -- On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks -- On Weierstrass Semigroups of Some Triples on Norm-Trace Curves -- ERINDALE: A Polynomial Based Hashing Algorithm -- A Survey of Algebraic Unitary Codes -- New Family of Non-Cartesian Perfect Authentication Codes -- On the Impossibility of Strong Encryption Over -- Minimum Distance between Bent and Resilient Boolean Functions -- Unconditionally Secure Approximate Message Authentication -- Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences -- On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction.
Record Nr. UNINA-9910483965103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptology and Network Security [[electronic resource] ] : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings / / edited by Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li
Cryptology and Network Security [[electronic resource] ] : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings / / edited by Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 352 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Operating systems (Computers)
Management information systems
Computer science
Computers and civilization
Algorithms
Computer Communication Networks
Cryptology
Operating Systems
Management of Computing and Information Systems
Computers and Society
Algorithm Analysis and Problem Complexity
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -- An Immune-Based Model for Computer Virus Detection -- A New Model for Dynamic Intrusion Detection -- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection -- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time -- Authentication and Signature -- ID-Based Aggregate Signatures from Bilinear Pairings -- Efficient Identity-Based Signatures and Blind Signatures -- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures -- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange -- Signcryption -- Two Proxy Signcryption Schemes from Bilinear Pairings -- Constructing Secure Warrant-Based Proxy Signcryption Schemes -- E-mail Security -- Design and Implementation of an Inline Certified E-mail Service -- Efficient Identity-Based Protocol for Fair Certified E-mail Delivery -- Cryptosystems -- Similar Keys of Multivariate Quadratic Public Key Cryptosystems -- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems -- Constructions of Almost Resilient Functions -- Privacy and Tracing -- A Novel Method to Maintain Privacy in Mobile Agent Applications -- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring -- Information Hiding -- Revaluation of Error Correcting Coding in Watermarking Channel -- Firewalls, Denial of Service and DNS Security -- On the Performance and Analysis of DNS Security Extensions -- On Securing RTP-Based Streaming Content with Firewalls -- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling -- Trust Management -- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.
Record Nr. UNISA-996465378403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptology and Network Security [[electronic resource] ] : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings / / edited by Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li
Cryptology and Network Security [[electronic resource] ] : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings / / edited by Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 352 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Operating systems (Computers)
Management information systems
Computer science
Computers and civilization
Algorithms
Computer Communication Networks
Cryptology
Operating Systems
Management of Computing and Information Systems
Computers and Society
Algorithm Analysis and Problem Complexity
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -- An Immune-Based Model for Computer Virus Detection -- A New Model for Dynamic Intrusion Detection -- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection -- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time -- Authentication and Signature -- ID-Based Aggregate Signatures from Bilinear Pairings -- Efficient Identity-Based Signatures and Blind Signatures -- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures -- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange -- Signcryption -- Two Proxy Signcryption Schemes from Bilinear Pairings -- Constructing Secure Warrant-Based Proxy Signcryption Schemes -- E-mail Security -- Design and Implementation of an Inline Certified E-mail Service -- Efficient Identity-Based Protocol for Fair Certified E-mail Delivery -- Cryptosystems -- Similar Keys of Multivariate Quadratic Public Key Cryptosystems -- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems -- Constructions of Almost Resilient Functions -- Privacy and Tracing -- A Novel Method to Maintain Privacy in Mobile Agent Applications -- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring -- Information Hiding -- Revaluation of Error Correcting Coding in Watermarking Channel -- Firewalls, Denial of Service and DNS Security -- On the Performance and Analysis of DNS Security Extensions -- On Securing RTP-Based Streaming Content with Firewalls -- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling -- Trust Management -- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles.
Record Nr. UNINA-9910483449803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings / / edited by Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan
Information Security and Privacy [[electronic resource] ] : 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings / / edited by Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XIV, 498 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Operating systems (Computers)
Algorithms
Computers and civilization
Computer communication systems
Cryptology
Management of Computing and Information Systems
Operating Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Computer Communication Networks
ISBN 3-540-27800-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Broadcast Encryption and Traitor Tracing -- Multi-service Oriented Broadcast Encryption -- Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme -- Linear Code Implies Public-Key Traitor Tracing with Revocation -- TTS without Revocation Capability Secure Against CCA2 -- Private Information Retrieval and Oblivious Transfer -- Single Database Private Information Retrieval with Logarithmic Communication -- Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions -- Trust and Secret Sharing -- Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing -- NGSCB: A Trusted Open System -- Cryptanalysis (I) -- The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers -- Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2 -- The Related-Key Rectangle Attack – Application to SHACAL-1 -- Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1 -- The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders -- Cryptanalysis (II) -- Analysis of a Conference Scheme Under Active and Passive Attacks -- Cryptanalysis of Two Password-Authenticated Key Exchange Protocols -- Analysis and Improvement of Micali’s Fair Contract Signing Protocol -- Digital Signatures (I) -- Digital Signature Schemes with Domain Parameters -- Generic Construction of Certificateless Signature -- Cryptosystems (I) -- A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model -- How to Re-use Round Function in Super-Pseudorandom Permutation -- How to Remove MAC from DHIES -- Symmetric Key Authentication Services Revisited -- Fast Computation -- Improvements to the Point Halving Algorithm -- Theoretical Analysis of XL over Small Fields -- A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks -- Mobile Agents Security -- A Mobile Agent System Providing Offer Privacy -- Digital Signatures (II) -- Identity-Based Strong Designated Verifier Signature Schemes -- Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups -- A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups -- Convertible Nominative Signatures -- Protocols -- Protocols with Security Proofs for Mobile Applications -- Secure Bilinear Diffie-Hellman Bits -- Weak Property of Malleability in NTRUSign -- Security Management -- Information Security Risk Assessment, Aggregation, and Mitigation -- Access Control and Authorisation -- A Weighted Graph Approach to Authorization Delegation and Conflict Resolution -- Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems -- Cryptosystems (II) -- Unconditionally Secure Encryption Under Strong Attacks -- ManTiCore: Encryption with Joint Cipher-State Authentication -- Cryptanalysis (III) -- On Security of XTR Public Key Cryptosystems Against Side Channel Attacks -- On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks -- Fault Attacks on Signature Schemes.
Record Nr. UNINA-9910144185603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui