Identity management for internet of things / / Parikshit N. Mahalle, Poonam N. Railkar |
Autore | Mahalle Parikshit N. |
Pubbl/distr/stampa | Aalborg, Denmark : , : River Publishers, , 2015 |
Descrizione fisica | 1 online resource (185 pages) : illustrations (some color), charts, tables |
Disciplina | 004.678 |
Collana | River Publishers Series in Communications |
Soggetto topico |
Internet of things
Ubiquitous computing - Security measures Computers - Access control |
Soggetto genere / forma | Electronic books. |
ISBN | 87-93102-91-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910465768603321 |
Mahalle Parikshit N. | ||
Aalborg, Denmark : , : River Publishers, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identity management for internet of things / / Parikshit N. Mahalle and Poonam N. Railkar |
Autore | Mahalle Parikshit N. |
Pubbl/distr/stampa | Gistrup, Denmark : , : River Publishers, , 2015 |
Descrizione fisica | 185 pages : illustrations (some color), charts, tables |
Collana | River Publishers Series in Communications |
Soggetto topico |
Internet of things
Computers - Access control |
ISBN |
9788793102903
1-000-79540-3 1-003-33850-X 87-93102-91-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910798782403321 |
Mahalle Parikshit N. | ||
Gistrup, Denmark : , : River Publishers, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identity management for internet of things / / Parikshit N. Mahalle and Poonam N. Railkar |
Autore | Mahalle Parikshit N. |
Pubbl/distr/stampa | Gistrup, Denmark : , : River Publishers, , 2015 |
Descrizione fisica | 185 pages : illustrations (some color), charts, tables |
Collana | River Publishers Series in Communications |
Soggetto topico |
Internet of things
Computers - Access control |
ISBN |
9788793102903
1-000-79540-3 1-003-33850-X 87-93102-91-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910820341903321 |
Mahalle Parikshit N. | ||
Gistrup, Denmark : , : River Publishers, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IEEE Std 802.1Xck-2018 (Amendment to IEEE Std 802.1X-2010 as amended by IEEE Std 802.1Xbx-2014) IEEE Standard for Local and metropolitan area networks - Port-Based Network Access Control . Amendment 2, YANG Data Model / / LAN/MAN Standards Committee of the IEEE Computer Society |
Pubbl/distr/stampa | New York : , : IEEE, , 2018 |
Descrizione fisica | 1 online resource (143 pages) |
Disciplina | 003 |
Collana | IEEE Std |
Soggetto topico |
Information modeling
Computers - Access control Local area networks(Computer networks) Metropolitan area networks (Computer networks) |
ISBN | 1-5044-5213-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
802.1Xck-2018 - IEEE Standard for Local and metropolitan area networks— Port-Based Network Access Control Amendment 2
802.1Xck-2018 - IEEE Standard for Local and metropolitan area networks— Port-Based Network Access Control Amendment 2 IEEE Std 802.1Xck-2018 |
Record Nr. | UNINA-9910305147903321 |
New York : , : IEEE, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IEEE Std 802.1Xck-2018 (Amendment to IEEE Std 802.1X-2010 as amended by IEEE Std 802.1Xbx-2014) IEEE Standard for Local and metropolitan area networks - Port-Based Network Access Control . Amendment 2, YANG Data Model / / LAN/MAN Standards Committee of the IEEE Computer Society |
Pubbl/distr/stampa | New York : , : IEEE, , 2018 |
Descrizione fisica | 1 online resource (143 pages) |
Disciplina | 003 |
Collana | IEEE Std |
Soggetto topico |
Information modeling
Computers - Access control Local area networks(Computer networks) Metropolitan area networks (Computer networks) |
ISBN | 1-5044-5213-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
802.1Xck-2018 - IEEE Standard for Local and metropolitan area networks— Port-Based Network Access Control Amendment 2
802.1Xck-2018 - IEEE Standard for Local and metropolitan area networks— Port-Based Network Access Control Amendment 2 IEEE Std 802.1Xck-2018 |
Record Nr. | UNISA-996577970203316 |
New York : , : IEEE, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
IEEE Symposium on Security and Privacy, 9th, 1988: Proceedings |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society Press, 1988 |
Descrizione fisica | 1 online resource (vi, 257 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Data protection Computers - Access control |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996211253103316 |
[Place of publication not identified], : IEEE Computer Society Press, 1988 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, proceedings / / edited by Juan A. Garay [and three others] |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (XIII, 440 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers - Access control |
ISBN | 3-540-75496-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intrusion Detection -- Detecting System Emulators -- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems -- E-NIPS: An Event-Based Network Intrusion Prediction System -- Digital Rights Management -- Enabling Fairer Digital Rights Management with Trusted Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security of Elastic Block Ciphers Against Key-Recovery Attacks -- Impossible-Differential Attacks on Large-Block Rijndael -- High-Speed Pipelined Hardware Architecture for Galois Counter Mode -- Cryptographic Protocols and Schemes -- Efficient Committed Oblivious Transfer of Bit Strings -- An Efficient Certified Email Protocol -- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability -- On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures -- Identify-Based Cryptography -- Identity-Based Proxy Re-encryption Without Random Oracles -- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension -- Cryptanalysis -- Small Private-Exponent Attack on RSA with Primes Sharing Bits -- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 -- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py -- Network Security -- Queue Management as a DoS Counter-Measure? -- Software Obfuscation -- On the Concept of Software Obfuscation in Computer Security -- Specifying Imperative Data Obfuscations -- Public-Key Cryptosystems -- Token-Controlled Public Key Encryption in the Standard Model -- Trapdoor Permutation Polynomials of ?/n? and Public Key Cryptosystems -- A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring -- Towards a DL-Based Additively Homomorphic Encryption Scheme -- Elliptic Curves and Applications -- Differential Properties of Elliptic Curves and Blind Signatures -- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation -- Database Security and Privacy -- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control -- Efficient Negative Databases from Cryptographic Hash Functions. |
Record Nr. | UNINA-9910483451303321 |
Berlin, Germany ; ; New York, New York : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information security : 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, proceedings / / edited by Juan A. Garay [and three others] |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (XIII, 440 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers - Access control |
ISBN | 3-540-75496-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intrusion Detection -- Detecting System Emulators -- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems -- E-NIPS: An Event-Based Network Intrusion Prediction System -- Digital Rights Management -- Enabling Fairer Digital Rights Management with Trusted Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security of Elastic Block Ciphers Against Key-Recovery Attacks -- Impossible-Differential Attacks on Large-Block Rijndael -- High-Speed Pipelined Hardware Architecture for Galois Counter Mode -- Cryptographic Protocols and Schemes -- Efficient Committed Oblivious Transfer of Bit Strings -- An Efficient Certified Email Protocol -- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability -- On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures -- Identify-Based Cryptography -- Identity-Based Proxy Re-encryption Without Random Oracles -- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension -- Cryptanalysis -- Small Private-Exponent Attack on RSA with Primes Sharing Bits -- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 -- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py -- Network Security -- Queue Management as a DoS Counter-Measure? -- Software Obfuscation -- On the Concept of Software Obfuscation in Computer Security -- Specifying Imperative Data Obfuscations -- Public-Key Cryptosystems -- Token-Controlled Public Key Encryption in the Standard Model -- Trapdoor Permutation Polynomials of ?/n? and Public Key Cryptosystems -- A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring -- Towards a DL-Based Additively Homomorphic Encryption Scheme -- Elliptic Curves and Applications -- Differential Properties of Elliptic Curves and Blind Signatures -- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation -- Database Security and Privacy -- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control -- Efficient Negative Databases from Cryptographic Hash Functions. |
Record Nr. | UNISA-996466256803316 |
Berlin, Germany ; ; New York, New York : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings / / Agnes Hui Chan, Virgil Gligor (eds.) |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2002] |
Descrizione fisica | 1 online resource (511 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers - Access control
Computer security |
ISBN | 3-540-45811-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intrusion Detection and Tamper Resistance -- Real-Time Intruder Tracing through Self-Replication -- On the Difficulty of Protecting Private Keys in Software -- Intrusion Detection with Support Vector Machines and Generative Models -- Cryptographic Algorithm and Attack Implementation -- Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI -- Fast Software Implementations of SC2000 -- Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 -- Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG -- Access Control and Trust Management (I) -- Role-Based Access Control for E-commerce Sea-of-Data Applications -- An Access Control Model for Tree Data Structures -- A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI -- Authentication and Privacy -- Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks -- Quantifying Privacy Leakage through Answering Database Queries -- A New Offiine Privacy Protecting E-cash System with Revokable Anonymity -- E-commerce Protocols (I) -- Receipt-Free Sealed-Bid Auction -- Exclusion-Freeness in Multi-party Exchange Protocols -- A Realistic Protocol for Multi-party Certified Electronic Mail -- Signature Schemes -- A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification -- Comments to the UNCITRAL Model Law on Electronic Signatures -- An Anonymous Loan System Based on Group Signature Scheme -- Traceability Schemes for Signed Documents* -- Cryptography (I) -- Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications -- Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m) -- Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2m) -- Access Control and Trust Management (II) -- Conditional Cryptographic Delegation for P2P Data Sharing -- Certification of Public Keys within an Identity Based System -- A New Public Key Cryptosystem for Constrained Hardware -- Key Management -- A Distributed and Computationally Secure Key Distribution Scheme* -- On Optimal Hash Tree Traversal for Interval Time-Stamping -- An Efficient Dynamic and Distributed Cryptographic Accumulator* -- Security Analysis -- A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks -- Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks -- Automated Analysis of Some Security Mechanisms of SCEP* -- An Attack on a Protocol for Certified Delivery -- E-commerce Protocols (II) -- Oblivious Counter and Majority Protocol -- Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network -- Fingerprinting Concatenated Codes with Efficient Identification -- Cryptography (II) -- A Provably Secure Additive and Multiplicative Privacy Homomorphism* -- Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. |
Record Nr. | UNINA-9910143905203321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2002] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings / / Agnes Hui Chan, Virgil Gligor (eds.) |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2002] |
Descrizione fisica | 1 online resource (511 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers - Access control
Computer security |
ISBN | 3-540-45811-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intrusion Detection and Tamper Resistance -- Real-Time Intruder Tracing through Self-Replication -- On the Difficulty of Protecting Private Keys in Software -- Intrusion Detection with Support Vector Machines and Generative Models -- Cryptographic Algorithm and Attack Implementation -- Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI -- Fast Software Implementations of SC2000 -- Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 -- Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG -- Access Control and Trust Management (I) -- Role-Based Access Control for E-commerce Sea-of-Data Applications -- An Access Control Model for Tree Data Structures -- A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI -- Authentication and Privacy -- Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks -- Quantifying Privacy Leakage through Answering Database Queries -- A New Offiine Privacy Protecting E-cash System with Revokable Anonymity -- E-commerce Protocols (I) -- Receipt-Free Sealed-Bid Auction -- Exclusion-Freeness in Multi-party Exchange Protocols -- A Realistic Protocol for Multi-party Certified Electronic Mail -- Signature Schemes -- A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification -- Comments to the UNCITRAL Model Law on Electronic Signatures -- An Anonymous Loan System Based on Group Signature Scheme -- Traceability Schemes for Signed Documents* -- Cryptography (I) -- Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications -- Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m) -- Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2m) -- Access Control and Trust Management (II) -- Conditional Cryptographic Delegation for P2P Data Sharing -- Certification of Public Keys within an Identity Based System -- A New Public Key Cryptosystem for Constrained Hardware -- Key Management -- A Distributed and Computationally Secure Key Distribution Scheme* -- On Optimal Hash Tree Traversal for Interval Time-Stamping -- An Efficient Dynamic and Distributed Cryptographic Accumulator* -- Security Analysis -- A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks -- Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks -- Automated Analysis of Some Security Mechanisms of SCEP* -- An Attack on a Protocol for Certified Delivery -- E-commerce Protocols (II) -- Oblivious Counter and Majority Protocol -- Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network -- Fingerprinting Concatenated Codes with Efficient Identification -- Cryptography (II) -- A Provably Secure Additive and Multiplicative Privacy Homomorphism* -- Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. |
Record Nr. | UNISA-996466220103316 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2002] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|