top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied Cryptography and Network Security [[electronic resource] ] : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings / / edited by Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung
Applied Cryptography and Network Security [[electronic resource] ] : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings / / edited by Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XI, 508 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Data protection
Application software
Computers and civilization
Electronic data processing—Management
Computer Communication Networks
Cryptology
Data and Information Security
Computer and Information Systems Applications
Computers and Society
IT Operations
ISBN 3-540-68914-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On the Effectiveness of Internal Patching Against File-Sharing Worms -- Peeking Through the Cloud: DNS-Based Estimation and Its Applications -- Pushback for Overlay Networks: Protecting Against Malicious Insiders -- PPAA: Peer-to-Peer Anonymous Authentication -- Generic Constructions of Stateful Public Key Encryption and Their Applications -- Traceable and Retrievable Identity-Based Encryption -- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures -- Attacking Reduced Round SHA-256 -- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography -- Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA? -- Replay Attack in a Fair Exchange Protocol -- Improved Conditional E-Payments -- Anonymity in Transferable E-cash -- Generic Security-Amplifying Methods of Ordinary Digital Signatures -- New Differential-Algebraic Attacks and Reparametrization of Rainbow -- Trapdoor Sanitizable Signatures and Their Application to Content Protection -- Multi-factor Authenticated Key Exchange -- Repelling Detour Attack Against Onions with Re-encryption -- Analysis of EAP-GPSK Authentication Protocol -- Efficient Device Pairing Using “Human-Comparable” Synchronized Audiovisual Patterns -- PUF-HB: A Tamper-Resilient HB Based Authentication Protocol -- An Authentication Scheme Based on the Twisted Conjugacy Problem -- Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance -- A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation -- On the Security of the CCM Encryption Mode and of a Slight Variant -- wNAF *, an Efficient Left-to-Right Signed Digit Recoding Algorithm -- A Very Compact “Perfectly Masked” S-Box for AES -- Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks -- Traceable Privacy of Recent Provably-Secure RFID Protocols -- The Security of EPC Gen2 Compliant RFID Protocols.
Record Nr. UNISA-996465617203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings / / edited by Jonathan Katz, Moti Yung
Applied Cryptography and Network Security [[electronic resource] ] : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings / / edited by Jonathan Katz, Moti Yung
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (508 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Data protection
Application software
Computers and civilization
Electronic data processing—Management
Computer Communication Networks
Cryptology
Data and Information Security
Computer and Information Systems Applications
Computers and Society
IT Operations
ISBN 1-280-94923-6
9786610949236
3-540-72738-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Signature Schemes I -- Generic Transformation to Strongly Unforgeable Signatures -- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure -- Merkle Signatures with Virtually Unlimited Signature Capacity -- Computer and Network Security -- Midpoints Versus Endpoints: From Protocols to Firewalls -- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme -- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus -- Cryptanalysis -- Cryptanalysis of the TRMC-4 Public Key Cryptosystem -- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack -- A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA -- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis -- Group-Oriented Security -- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity -- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme -- Bayesian Methods for Practical Traitor Tracing -- Cryptographic Protocols -- A New Protocol for Conditional Disclosure of Secrets and Its Applications -- An Unconditionally Secure Protocol for Multi-Party Set Intersection -- Privacy-Preserving Set Union -- Anonymous Authentication -- Universal Accumulators with Efficient Nonmembership Proofs -- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes -- Identity-Based Cryptography -- Identity-Based Proxy Re-encryption -- A More Natural Way to Construct Identity-Based Identification Schemes -- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions -- Certified E-Mail Protocol in the ID-Based Setting -- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks -- Efficient Content Authentication in Peer-to-Peer Networks -- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks -- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains -- BAP: Broadcast Authentication Using Cryptographic Puzzles -- Efficient Implementation -- Compressed XTR -- Sliding Window Method for NTRU -- Signature Schemes II -- Efficient Certificateless Signature Schemes -- Security Mediated Certificateless Signatures -- Gradually Convertible Undeniable Signatures.
Record Nr. UNISA-996466369503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings / / edited by Jonathan Katz, Moti Yung
Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings / / edited by Jonathan Katz, Moti Yung
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (508 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Data protection
Application software
Computers and civilization
Electronic data processing—Management
Computer Communication Networks
Cryptology
Data and Information Security
Computer and Information Systems Applications
Computers and Society
IT Operations
ISBN 1-280-94923-6
9786610949236
3-540-72738-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Signature Schemes I -- Generic Transformation to Strongly Unforgeable Signatures -- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure -- Merkle Signatures with Virtually Unlimited Signature Capacity -- Computer and Network Security -- Midpoints Versus Endpoints: From Protocols to Firewalls -- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme -- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus -- Cryptanalysis -- Cryptanalysis of the TRMC-4 Public Key Cryptosystem -- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack -- A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA -- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis -- Group-Oriented Security -- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity -- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme -- Bayesian Methods for Practical Traitor Tracing -- Cryptographic Protocols -- A New Protocol for Conditional Disclosure of Secrets and Its Applications -- An Unconditionally Secure Protocol for Multi-Party Set Intersection -- Privacy-Preserving Set Union -- Anonymous Authentication -- Universal Accumulators with Efficient Nonmembership Proofs -- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes -- Identity-Based Cryptography -- Identity-Based Proxy Re-encryption -- A More Natural Way to Construct Identity-Based Identification Schemes -- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions -- Certified E-Mail Protocol in the ID-Based Setting -- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks -- Efficient Content Authentication in Peer-to-Peer Networks -- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks -- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains -- BAP: Broadcast Authentication Using Cryptographic Puzzles -- Efficient Implementation -- Compressed XTR -- Sliding Window Method for NTRU -- Signature Schemes II -- Efficient Certificateless Signature Schemes -- Security Mediated Certificateless Signatures -- Gradually Convertible Undeniable Signatures.
Record Nr. UNINA-9910483047003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings / / edited by Jianying Zhou, Moti Yung, Feng Bao
Applied Cryptography and Network Security [[electronic resource] ] : 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings / / edited by Jianying Zhou, Moti Yung, Feng Bao
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 490 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Operating systems (Computers)
Application software
Computers and civilization
Electronic data processing—Management
Computer Communication Networks
Cryptology
Operating Systems
Computer and Information Systems Applications
Computers and Society
IT Operations
ISBN 3-540-34704-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Avoidance and Detection -- Adaptive Detection of Local Scanners -- Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection -- DSO: Dependable Signing Overlay -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy Multi-coupon System -- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families -- DoS: Attacks and Countermeasures -- Efficient Memory Bound Puzzles Using Pattern Databases -- Effect of Malicious Synchronization -- Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets -- Key Management -- Password Based Server Aided Key Exchange -- Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks -- Stateful Subset Cover -- Cryptanalysis -- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions -- Breaking a New Instance of TTM Cryptosystems -- Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords -- Security of Limited Devices -- An AES Smart Card Implementation Resistant to Power Analysis Attacks -- Physical Security Bounds Against Tampering -- Flexible Exponentiation with Resistance to Side Channel Attacks -- Cryptography -- An Improved Poly1305 MAC -- Certificateless Public-Key Signature: Security Model and Efficient Construction -- High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive -- Authentication and Web Security -- Authentication for Paranoids: Multi-party Secret Handshakes -- On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan -- W3Bcrypt: Encryption as a Stylesheet -- Ad Hoc and Sensor Network Security -- Combinatorial Structures for Design of Wireless Sensor Networks -- Public Key Cryptography Sans Certificates in Ad Hoc Networks -- Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks -- Cryptographic Constructions -- A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography -- Results on Almost Resilient Functions -- Real Perfect Contrast Visual Secret Sharing Schemes with Reversing -- Security and Privacy -- On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries -- Improving the Randomized Initial Point Countermeasure Against DPA -- Syntax-Driven Private Evaluation of Quantified Membership Queries.
Record Nr. UNISA-996465520103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings / / edited by John Ioannidis, Angelos D. Keromytis, Moti Yung
Applied Cryptography and Network Security [[electronic resource] ] : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings / / edited by John Ioannidis, Angelos D. Keromytis, Moti Yung
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 530 p.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Operating systems (Computers)
Information storage and retrieval systems
Application software
Electronic data processing—Management
Computer Communication Networks
Cryptology
Operating Systems
Information Storage and Retrieval
Computer and Information Systems Applications
IT Operations
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Two-Server Password-Only Authenticated Key Exchange -- Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks -- Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution -- A Traitor Tracing Scheme Based on RSA for Fast Decryption -- N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords -- Messin’ with Texas Deriving Mother’s Maiden Names Using Public Records -- Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management -- Searching for High-Value Rare Events with Uncheatable Grid Computing -- Digital Signatures Do Not Guarantee Exclusive Ownership -- Thompson’s Group and Public Key Cryptography -- Rainbow, a New Multivariable Polynomial Signature Scheme -- Badger – A Fast and Provably Secure MAC -- IDS False Alarm Reduction Using Continuous and Discontinuous Patterns -- Indexing Information for Data Forensics -- Model Generalization and Its Implications on Intrusion Detection -- Intrusion-Resilient Secure Channels -- Optimal Asymmetric Encryption and Signature Paddings -- Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA -- Identity Based Encryption Without Redundancy -- OACerts: Oblivious Attribute Certificates -- Dynamic k-Times Anonymous Authentication -- Efficient Anonymous Roaming and Its Security Analysis -- Quantifying Security in Hybrid Cellular Networks -- Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications -- Building Reliable Mix Networks with Fair Exchange -- SCARE of the DES -- Robust Key Extraction from Physical Uncloneable Functions -- Efficient Constructions for One-Way Hash Chains -- Privacy Preserving Keyword Searches on Remote Encrypted Data -- An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption -- Non-interactive Zero-Knowledge Arguments for Voting -- Short Signature and Universal Designated Verifier Signature Without Random Oracles -- Efficient Identity Based Ring Signature -- New Signature Schemes with Coupons and Tight Reduction.
Record Nr. UNISA-996466127903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings / / edited by Markus Jakobsson, Moti Yung, Jianying Zhou
Applied Cryptography and Network Security [[electronic resource] ] : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings / / edited by Markus Jakobsson, Moti Yung, Jianying Zhou
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XIII, 511 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Information storage and retrieval systems
Application software
Electronic data processing—Management
Cryptology
Computer Communication Networks
Operating Systems
Information Storage and Retrieval
Computer and Information Systems Applications
IT Operations
ISBN 9783540248528
3-540-24852-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and Storage -- CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap -- Private Keyword-Based Push and Pull with Applications to Anonymous Communication -- Secure Conjunctive Keyword Search over Encrypted Data -- Provably Secure Constructions -- Evaluating Security of Voting Schemes in the Universal Composability Framework -- Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security -- On the Security of Cryptosystems with All-or-Nothing Transform -- Internet Security -- Centralized Management of Virtual Security Zones in IP Networks -- S-RIP: A Secure Distance Vector Routing Protocol -- A Pay-per-Use DoS Protection Mechanism for the Web -- Digital Signature -- Limited Verifier Signature from Bilinear Pairings -- Deniable Ring Authentication Revisited -- A Fully-Functional Group Signature Scheme over Only Known-Order Group -- Security Modelling -- Some Observations on Zap and Its Applications -- Security Measurements of Steganographic Systems -- X2Rep: Enhanced Trust Semantics for the XRep Protocol -- Authenticated Key Exchange -- One-Round Protocols for Two-Party Authenticated Key Exchange -- Password Authenticated Key Exchange Using Quadratic Residues -- Key Agreement Using Statically Keyed Authenticators -- Security of Deployed Systems -- Low-Latency Cryptographic Protection for SCADA Communications -- A Best Practice for Root CA Key Update in PKI -- SQLrand: Preventing SQL Injection Attacks -- Cryptosystems: Design and Analysis -- Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem -- Success Probability in ? 2-Attacks -- More Generalized Clock-Controlled Alternating Step Generator -- Cryptographic Protocols -- FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy -- Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model -- Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity -- Side Channels and Protocol Analysis -- Security Analysis of CRT-Based Cryptosystems -- Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits -- Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords -- Intrusion Detection and DoS -- Advanced Packet Marking Mechanism with Pushback for IP Traceback -- A Parallel Intrusion Detection System for High-Speed Networks -- A Novel Framework for Alert Correlation and Understanding -- Cryptographic Algorithms -- An Improved Algorithm for uP+vQ Using JSF -- New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p n ) -- Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
Record Nr. UNISA-996465428803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings / / edited by Markus Jakobsson, Moti Yung, Jianying Zhou
Applied Cryptography and Network Security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings / / edited by Markus Jakobsson, Moti Yung, Jianying Zhou
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XIII, 511 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Information storage and retrieval systems
Application software
Electronic data processing—Management
Cryptology
Computer Communication Networks
Operating Systems
Information Storage and Retrieval
Computer and Information Systems Applications
IT Operations
ISBN 9783540248528
3-540-24852-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and Storage -- CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap -- Private Keyword-Based Push and Pull with Applications to Anonymous Communication -- Secure Conjunctive Keyword Search over Encrypted Data -- Provably Secure Constructions -- Evaluating Security of Voting Schemes in the Universal Composability Framework -- Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security -- On the Security of Cryptosystems with All-or-Nothing Transform -- Internet Security -- Centralized Management of Virtual Security Zones in IP Networks -- S-RIP: A Secure Distance Vector Routing Protocol -- A Pay-per-Use DoS Protection Mechanism for the Web -- Digital Signature -- Limited Verifier Signature from Bilinear Pairings -- Deniable Ring Authentication Revisited -- A Fully-Functional Group Signature Scheme over Only Known-Order Group -- Security Modelling -- Some Observations on Zap and Its Applications -- Security Measurements of Steganographic Systems -- X2Rep: Enhanced Trust Semantics for the XRep Protocol -- Authenticated Key Exchange -- One-Round Protocols for Two-Party Authenticated Key Exchange -- Password Authenticated Key Exchange Using Quadratic Residues -- Key Agreement Using Statically Keyed Authenticators -- Security of Deployed Systems -- Low-Latency Cryptographic Protection for SCADA Communications -- A Best Practice for Root CA Key Update in PKI -- SQLrand: Preventing SQL Injection Attacks -- Cryptosystems: Design and Analysis -- Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem -- Success Probability in ? 2-Attacks -- More Generalized Clock-Controlled Alternating Step Generator -- Cryptographic Protocols -- FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy -- Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model -- Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity -- Side Channels and Protocol Analysis -- Security Analysis of CRT-Based Cryptosystems -- Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits -- Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords -- Intrusion Detection and DoS -- Advanced Packet Marking Mechanism with Pushback for IP Traceback -- A Parallel Intrusion Detection System for High-Speed Networks -- A Novel Framework for Alert Correlation and Understanding -- Cryptographic Algorithms -- An Improved Algorithm for uP+vQ Using JSF -- New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p n ) -- Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
Record Nr. UNINA-9910144150803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han
Applied Cryptography and Network Security [[electronic resource] ] : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 440 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Operating systems (Computers)
Computers and civilization
Electronic data processing—Management
Computer Communication Networks
Cryptology
Operating Systems
Computers and Society
IT Operations
ISBN 3-540-45203-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Applications -- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case -- Optimized ? 2-Attack against RC6 -- Anonymity-Enhanced Pseudonym System -- Intrusion Detection -- Using Feedback to Improve Masquerade Detection -- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services -- An IP Traceback Scheme Integrating DPM and PPM -- Cryptographic Algorithms -- Improved Scalable Hash Chain Traversal -- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem -- On the Security of Two Threshold Signature Schemes with Traceable Signers -- Digital Signature -- Proxy and Threshold One-Time Signatures -- A Threshold GQ Signature Scheme -- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary -- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme -- Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems -- An Authorization Model for E-consent Requirement in a Health Care Application -- PLI: A New Framework to Protect Digital Content for P2P Networks -- Web Security -- Improved Algebraic Traitor Tracing Scheme -- Common Vulnerability Markup Language -- Trust on Web Browser: Attack vs. Defense -- Security Protocols -- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards -- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party -- Using OCSP to Secure Certificate-Using Transactions in M-commerce -- Cryptanalysis -- Differential Fault Analysis on A.E.S -- Side-Channel Attack on Substitution Blocks -- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation -- A Fast Correlation Attack for LFSR-Based Stream Ciphers -- Key Management -- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient -- An Efficient Tree-Based Group Key Agreement Using Bilinear Map -- A Key Recovery Mechanism for Reliable Group Key Management -- Efficient Implementations -- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model -- Efficient Distributed Signcryption Scheme as Group Signcryption -- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.
Record Nr. UNISA-996465773503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han
Applied Cryptography and Network Security : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 440 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Operating systems (Computers)
Computers and civilization
Electronic data processing—Management
Computer Communication Networks
Cryptology
Operating Systems
Computers and Society
IT Operations
ISBN 3-540-45203-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Applications -- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case -- Optimized ? 2-Attack against RC6 -- Anonymity-Enhanced Pseudonym System -- Intrusion Detection -- Using Feedback to Improve Masquerade Detection -- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services -- An IP Traceback Scheme Integrating DPM and PPM -- Cryptographic Algorithms -- Improved Scalable Hash Chain Traversal -- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem -- On the Security of Two Threshold Signature Schemes with Traceable Signers -- Digital Signature -- Proxy and Threshold One-Time Signatures -- A Threshold GQ Signature Scheme -- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary -- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme -- Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems -- An Authorization Model for E-consent Requirement in a Health Care Application -- PLI: A New Framework to Protect Digital Content for P2P Networks -- Web Security -- Improved Algebraic Traitor Tracing Scheme -- Common Vulnerability Markup Language -- Trust on Web Browser: Attack vs. Defense -- Security Protocols -- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards -- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party -- Using OCSP to Secure Certificate-Using Transactions in M-commerce -- Cryptanalysis -- Differential Fault Analysis on A.E.S -- Side-Channel Attack on Substitution Blocks -- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation -- A Fast Correlation Attack for LFSR-Based Stream Ciphers -- Key Management -- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient -- An Efficient Tree-Based Group Key Agreement Using Bilinear Map -- A Key Recovery Mechanism for Reliable Group Key Management -- Efficient Implementations -- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model -- Efficient Distributed Signcryption Scheme as Group Signcryption -- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.
Record Nr. UNINA-9910144033103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Biosurveillance and Biosecurity [[electronic resource] ] : International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings / / edited by Daniel Zeng, Hsinchun Chen, Henry Rolka, William B. Lober
Biosurveillance and Biosecurity [[electronic resource] ] : International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings / / edited by Daniel Zeng, Hsinchun Chen, Henry Rolka, William B. Lober
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (X, 183 p.)
Disciplina 362.1
Collana Lecture Notes in Bioinformatics
Soggetto topico Bioinformatics
Computers and civilization
Electronic data processing—Management
User interfaces (Computer systems)
Human-computer interaction
Database management
Computational and Systems Biology
Computers and Society
IT Operations
User Interfaces and Human Computer Interaction
Database Management
ISBN 3-540-89746-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Informatics Infrastructure and Policy Considerations -- Public Health Information Fusion for Situation Awareness -- Biosurveillance, Case Reporting, and Decision Support: Public Health Interactions with a Health Information Exchange -- Bio-surveillance Event Models, Open Source Intelligence, and the Semantic Web -- Foresight China II: Identification and Detection of Infectious Diseases -- Public Health Preparedness Informatics Infrastructure. A Case Study in Integrated Surveillance and Response: 2004–2005 National Influenza Vaccine Shortage -- Network-Based Data Analytics -- Dynamic Network Model for Predicting Occurrences of Salmonella at Food Facilities -- Network-Based Analysis of Beijing SARS Data -- Tutte Polynomials and Topological Quantum Algorithms in Social Network Analysis for Epidemiology, Bio-surveillance and Bio-security -- Biosurveillance Models and Outbreak Detection -- Integrating a Commuting Model with the Bayesian Aerosol Release Detector -- A Temporal Extension of the Bayesian Aerosol Release Detector -- A Z-Score Based Multi-level Spatial Clustering Algorithm for the Detection of Disease Outbreaks -- Epidemic Thresholds in SIR and SIIR Models Applying an Algorithmic Method -- Test Power for Drug Abuse Surveillance -- Model Assessment and Case Studies -- Assessing the Accuracy of Spatiotemporal Epidemiological Models -- Simulation of Multivariate Spatial-Temporal Outbreak Data for Detection Algorithm Evaluation -- Analysis and Prediction of Epidemiological Trend of Scarlet Fever from 1957 to 2004 in the Downtown Area of Beijing -- Environmental Biosurveillance and Case Studies -- Environmental Biosurveillance for Epidemic Prediction: Experience with Rift Valley Fever -- Spatial Regression-Based Environmental Analysis in Infectious Disease Informatics.
Record Nr. UNISA-996465426603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui