top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Identity management for internet of things / / Parikshit N. Mahalle, Poonam N. Railkar
Identity management for internet of things / / Parikshit N. Mahalle, Poonam N. Railkar
Autore Mahalle Parikshit N.
Pubbl/distr/stampa Aalborg, Denmark : , : River Publishers, , 2015
Descrizione fisica 1 online resource (185 pages) : illustrations (some color), charts, tables
Disciplina 004.678
Collana River Publishers Series in Communications
Soggetto topico Internet of things
Ubiquitous computing - Security measures
Computers - Access control
Soggetto genere / forma Electronic books.
ISBN 87-93102-91-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910465768603321
Mahalle Parikshit N.  
Aalborg, Denmark : , : River Publishers, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Identity management for internet of things / / Parikshit N. Mahalle and Poonam N. Railkar
Identity management for internet of things / / Parikshit N. Mahalle and Poonam N. Railkar
Autore Mahalle Parikshit N.
Pubbl/distr/stampa Gistrup, Denmark : , : River Publishers, , 2015
Descrizione fisica 185 pages : illustrations (some color), charts, tables
Collana River Publishers Series in Communications
Soggetto topico Internet of things
Computers - Access control
ISBN 9788793102903
1-000-79540-3
1-003-33850-X
87-93102-91-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910798782403321
Mahalle Parikshit N.  
Gistrup, Denmark : , : River Publishers, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Identity management for internet of things / / Parikshit N. Mahalle and Poonam N. Railkar
Identity management for internet of things / / Parikshit N. Mahalle and Poonam N. Railkar
Autore Mahalle Parikshit N.
Pubbl/distr/stampa Gistrup, Denmark : , : River Publishers, , 2015
Descrizione fisica 185 pages : illustrations (some color), charts, tables
Collana River Publishers Series in Communications
Soggetto topico Internet of things
Computers - Access control
ISBN 9788793102903
1-000-79540-3
1-003-33850-X
87-93102-91-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910820341903321
Mahalle Parikshit N.  
Gistrup, Denmark : , : River Publishers, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IEEE Std 802.1Xck-2018 (Amendment to IEEE Std 802.1X-2010 as amended by IEEE Std 802.1Xbx-2014) IEEE Standard for Local and metropolitan area networks - Port-Based Network Access Control . Amendment 2, YANG Data Model / / LAN/MAN Standards Committee of the IEEE Computer Society
IEEE Std 802.1Xck-2018 (Amendment to IEEE Std 802.1X-2010 as amended by IEEE Std 802.1Xbx-2014) IEEE Standard for Local and metropolitan area networks - Port-Based Network Access Control . Amendment 2, YANG Data Model / / LAN/MAN Standards Committee of the IEEE Computer Society
Pubbl/distr/stampa New York : , : IEEE, , 2018
Descrizione fisica 1 online resource (143 pages)
Disciplina 003
Collana IEEE Std
Soggetto topico Information modeling
Computers - Access control
Local area networks(Computer networks)
Metropolitan area networks (Computer networks)
ISBN 1-5044-5213-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 802.1Xck-2018 - IEEE Standard for Local and metropolitan area networks— Port-Based Network Access Control Amendment 2
802.1Xck-2018 - IEEE Standard for Local and metropolitan area networks— Port-Based Network Access Control Amendment 2
IEEE Std 802.1Xck-2018
Record Nr. UNINA-9910305147903321
New York : , : IEEE, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IEEE Std 802.1Xck-2018 (Amendment to IEEE Std 802.1X-2010 as amended by IEEE Std 802.1Xbx-2014) IEEE Standard for Local and metropolitan area networks - Port-Based Network Access Control . Amendment 2, YANG Data Model / / LAN/MAN Standards Committee of the IEEE Computer Society
IEEE Std 802.1Xck-2018 (Amendment to IEEE Std 802.1X-2010 as amended by IEEE Std 802.1Xbx-2014) IEEE Standard for Local and metropolitan area networks - Port-Based Network Access Control . Amendment 2, YANG Data Model / / LAN/MAN Standards Committee of the IEEE Computer Society
Pubbl/distr/stampa New York : , : IEEE, , 2018
Descrizione fisica 1 online resource (143 pages)
Disciplina 003
Collana IEEE Std
Soggetto topico Information modeling
Computers - Access control
Local area networks(Computer networks)
Metropolitan area networks (Computer networks)
ISBN 1-5044-5213-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 802.1Xck-2018 - IEEE Standard for Local and metropolitan area networks— Port-Based Network Access Control Amendment 2
802.1Xck-2018 - IEEE Standard for Local and metropolitan area networks— Port-Based Network Access Control Amendment 2
IEEE Std 802.1Xck-2018
Record Nr. UNISA-996577970203316
New York : , : IEEE, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
IEEE Symposium on Security and Privacy, 9th, 1988: Proceedings
IEEE Symposium on Security and Privacy, 9th, 1988: Proceedings
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society Press, 1988
Descrizione fisica 1 online resource (vi, 257 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Data protection
Computers - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996211253103316
[Place of publication not identified], : IEEE Computer Society Press, 1988
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, proceedings / / edited by Juan A. Garay [and three others]
Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, proceedings / / edited by Juan A. Garay [and three others]
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (XIII, 440 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Computers - Access control
ISBN 3-540-75496-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Detection -- Detecting System Emulators -- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems -- E-NIPS: An Event-Based Network Intrusion Prediction System -- Digital Rights Management -- Enabling Fairer Digital Rights Management with Trusted Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security of Elastic Block Ciphers Against Key-Recovery Attacks -- Impossible-Differential Attacks on Large-Block Rijndael -- High-Speed Pipelined Hardware Architecture for Galois Counter Mode -- Cryptographic Protocols and Schemes -- Efficient Committed Oblivious Transfer of Bit Strings -- An Efficient Certified Email Protocol -- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability -- On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures -- Identify-Based Cryptography -- Identity-Based Proxy Re-encryption Without Random Oracles -- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension -- Cryptanalysis -- Small Private-Exponent Attack on RSA with Primes Sharing Bits -- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 -- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py -- Network Security -- Queue Management as a DoS Counter-Measure? -- Software Obfuscation -- On the Concept of Software Obfuscation in Computer Security -- Specifying Imperative Data Obfuscations -- Public-Key Cryptosystems -- Token-Controlled Public Key Encryption in the Standard Model -- Trapdoor Permutation Polynomials of ?/n? and Public Key Cryptosystems -- A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring -- Towards a DL-Based Additively Homomorphic Encryption Scheme -- Elliptic Curves and Applications -- Differential Properties of Elliptic Curves and Blind Signatures -- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation -- Database Security and Privacy -- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control -- Efficient Negative Databases from Cryptographic Hash Functions.
Record Nr. UNINA-9910483451303321
Berlin, Germany ; ; New York, New York : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, proceedings / / edited by Juan A. Garay [and three others]
Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, proceedings / / edited by Juan A. Garay [and three others]
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (XIII, 440 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Computers - Access control
ISBN 3-540-75496-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Detection -- Detecting System Emulators -- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems -- E-NIPS: An Event-Based Network Intrusion Prediction System -- Digital Rights Management -- Enabling Fairer Digital Rights Management with Trusted Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security of Elastic Block Ciphers Against Key-Recovery Attacks -- Impossible-Differential Attacks on Large-Block Rijndael -- High-Speed Pipelined Hardware Architecture for Galois Counter Mode -- Cryptographic Protocols and Schemes -- Efficient Committed Oblivious Transfer of Bit Strings -- An Efficient Certified Email Protocol -- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability -- On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures -- Identify-Based Cryptography -- Identity-Based Proxy Re-encryption Without Random Oracles -- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension -- Cryptanalysis -- Small Private-Exponent Attack on RSA with Primes Sharing Bits -- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 -- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py -- Network Security -- Queue Management as a DoS Counter-Measure? -- Software Obfuscation -- On the Concept of Software Obfuscation in Computer Security -- Specifying Imperative Data Obfuscations -- Public-Key Cryptosystems -- Token-Controlled Public Key Encryption in the Standard Model -- Trapdoor Permutation Polynomials of ?/n? and Public Key Cryptosystems -- A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring -- Towards a DL-Based Additively Homomorphic Encryption Scheme -- Elliptic Curves and Applications -- Differential Properties of Elliptic Curves and Blind Signatures -- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation -- Database Security and Privacy -- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control -- Efficient Negative Databases from Cryptographic Hash Functions.
Record Nr. UNISA-996466256803316
Berlin, Germany ; ; New York, New York : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings / / Agnes Hui Chan, Virgil Gligor (eds.)
Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings / / Agnes Hui Chan, Virgil Gligor (eds.)
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2002]
Descrizione fisica 1 online resource (511 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computers - Access control
Computer security
ISBN 3-540-45811-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Detection and Tamper Resistance -- Real-Time Intruder Tracing through Self-Replication -- On the Difficulty of Protecting Private Keys in Software -- Intrusion Detection with Support Vector Machines and Generative Models -- Cryptographic Algorithm and Attack Implementation -- Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI -- Fast Software Implementations of SC2000 -- Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 -- Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG -- Access Control and Trust Management (I) -- Role-Based Access Control for E-commerce Sea-of-Data Applications -- An Access Control Model for Tree Data Structures -- A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI -- Authentication and Privacy -- Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks -- Quantifying Privacy Leakage through Answering Database Queries -- A New Offiine Privacy Protecting E-cash System with Revokable Anonymity -- E-commerce Protocols (I) -- Receipt-Free Sealed-Bid Auction -- Exclusion-Freeness in Multi-party Exchange Protocols -- A Realistic Protocol for Multi-party Certified Electronic Mail -- Signature Schemes -- A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification -- Comments to the UNCITRAL Model Law on Electronic Signatures -- An Anonymous Loan System Based on Group Signature Scheme -- Traceability Schemes for Signed Documents* -- Cryptography (I) -- Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications -- Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m) -- Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2m) -- Access Control and Trust Management (II) -- Conditional Cryptographic Delegation for P2P Data Sharing -- Certification of Public Keys within an Identity Based System -- A New Public Key Cryptosystem for Constrained Hardware -- Key Management -- A Distributed and Computationally Secure Key Distribution Scheme* -- On Optimal Hash Tree Traversal for Interval Time-Stamping -- An Efficient Dynamic and Distributed Cryptographic Accumulator* -- Security Analysis -- A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks -- Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks -- Automated Analysis of Some Security Mechanisms of SCEP* -- An Attack on a Protocol for Certified Delivery -- E-commerce Protocols (II) -- Oblivious Counter and Majority Protocol -- Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network -- Fingerprinting Concatenated Codes with Efficient Identification -- Cryptography (II) -- A Provably Secure Additive and Multiplicative Privacy Homomorphism* -- Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars.
Record Nr. UNINA-9910143905203321
Berlin, Germany ; ; New York, New York : , : Springer, , [2002]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings / / Agnes Hui Chan, Virgil Gligor (eds.)
Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings / / Agnes Hui Chan, Virgil Gligor (eds.)
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2002]
Descrizione fisica 1 online resource (511 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computers - Access control
Computer security
ISBN 3-540-45811-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Detection and Tamper Resistance -- Real-Time Intruder Tracing through Self-Replication -- On the Difficulty of Protecting Private Keys in Software -- Intrusion Detection with Support Vector Machines and Generative Models -- Cryptographic Algorithm and Attack Implementation -- Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI -- Fast Software Implementations of SC2000 -- Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 -- Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG -- Access Control and Trust Management (I) -- Role-Based Access Control for E-commerce Sea-of-Data Applications -- An Access Control Model for Tree Data Structures -- A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI -- Authentication and Privacy -- Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks -- Quantifying Privacy Leakage through Answering Database Queries -- A New Offiine Privacy Protecting E-cash System with Revokable Anonymity -- E-commerce Protocols (I) -- Receipt-Free Sealed-Bid Auction -- Exclusion-Freeness in Multi-party Exchange Protocols -- A Realistic Protocol for Multi-party Certified Electronic Mail -- Signature Schemes -- A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification -- Comments to the UNCITRAL Model Law on Electronic Signatures -- An Anonymous Loan System Based on Group Signature Scheme -- Traceability Schemes for Signed Documents* -- Cryptography (I) -- Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications -- Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m) -- Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2m) -- Access Control and Trust Management (II) -- Conditional Cryptographic Delegation for P2P Data Sharing -- Certification of Public Keys within an Identity Based System -- A New Public Key Cryptosystem for Constrained Hardware -- Key Management -- A Distributed and Computationally Secure Key Distribution Scheme* -- On Optimal Hash Tree Traversal for Interval Time-Stamping -- An Efficient Dynamic and Distributed Cryptographic Accumulator* -- Security Analysis -- A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks -- Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks -- Automated Analysis of Some Security Mechanisms of SCEP* -- An Attack on a Protocol for Certified Delivery -- E-commerce Protocols (II) -- Oblivious Counter and Majority Protocol -- Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network -- Fingerprinting Concatenated Codes with Efficient Identification -- Cryptography (II) -- A Provably Secure Additive and Multiplicative Privacy Homomorphism* -- Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars.
Record Nr. UNISA-996466220103316
Berlin, Germany ; ; New York, New York : , : Springer, , [2002]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui