top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security and Cryptology [[electronic resource] ] : Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings / / edited by Helger Lipmaa, Moti Yung, Donghai Lin
Information Security and Cryptology [[electronic resource] ] : Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings / / edited by Helger Lipmaa, Moti Yung, Donghai Lin
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 308 p.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Electronic data processing—Management
Computers and civilization
Computer networks
Algorithms
Cryptology
Data and Information Security
IT Operations
Computers and Society
Computer Communication Networks
ISBN 3-540-49610-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Digital Signature Schemes -- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05 -- Identity-Based Key-Insulated Signature with Secure Key-Updates -- Efficient Intrusion-Resilient Signatures Without Random Oracles -- Sequences and Stream Ciphers -- New Constructions of Large Binary Sequences Family with Low Correlation -- On the Rate of Coincidence of Two Clock-Controlled Combiners -- Symmetric-Key Cryptography -- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining -- OPMAC: One-Key Poly1305 MAC -- A General Construction of Tweakable Block Ciphers and Different Modes of Operations -- Cryptographic Schemes -- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme -- Efficient Short Signcryption Scheme with Public Verifiability -- A Revocation Scheme Preserving Privacy -- Network Security -- Deterministic Packet Marking with Link Signatures for IP Traceback -- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System -- A Network Security Policy Model and Its Realization Mechanism -- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic -- Access Control -- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty -- Design and Implementation of Fast Access Control That Supports the Separation of Duty -- Computer and Applications Security -- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models -- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks -- Application and Evaluation of Bayesian Filter for Chinese Spam -- Web and Media Security -- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes -- An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses -- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.
Record Nr. UNISA-996466142703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings / / edited by Colin Boyd, Leonie Simpson
Information Security and Privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings / / edited by Colin Boyd, Leonie Simpson
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 437 p. 70 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Coding theory
Information theory
Information technology—Management
Electronic commerce
Data and Information Security
Cryptology
IT Operations
Coding and Information Theory
Computer Application in Administrative Data Processing
e-Commerce and e-Business
ISBN 3-642-39059-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysing the IOBC authenticated encryption mode -- A Chosen IV Related Key Attack on Grain -- Cryptanalysis of Helix and Phelix Revisited -- Toward Separating the Strong Adaptive Pseudo-Freeness from the Strong RSA Assumption -- Minkowski sum based lattice construction for multivariate simultaneous -- Coppersmith's technique and applications to RSA -- Lattices and security proofs -- Adaptive Precision Floating Point LL -- Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors -- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem -- Black-Box Separations and their Adaptability to the Non-Uniform Model -- Injective Encodings to Elliptic Curves -- Membership Encryption and Its Applications -- Towards Privacy Preserving Mobile Internet Communications -- Count-min sketches for estimating password frequency with Hamming Distance -- Secret sharing -- A rational secret sharing protocol with unconditional security in the synchronous setting -- Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation.
Record Nr. UNINA-9910483330403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Applications [[electronic resource] ] : 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers / / edited by Dong Hoon Lee, Moti Yung
Information Security Applications [[electronic resource] ] : 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers / / edited by Dong Hoon Lee, Moti Yung
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XII, 371 p. 135 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computer networks
Algorithms
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Application software
Data protection
Computer Communication Networks
Cryptology
IT Operations
Computer and Information Systems Applications
Data and Information Security
ISBN 3-642-35416-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks on Reduced-Round MISTY1.- Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.- Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity.- Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.- Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption.- Improved Differential Fault Analysis on Block Cipher ARIA.- Multi-Level Controlled Signature.- Tate Pairing Computation on Generalized Hessian Curves -- Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model.- An Authentication and Key Management Scheme for the Proxy Mobile IPv6.- Payment Approval for PayWord -- Anonymity-Based Authenticated Key Agreement with Full Binding Property.- A Study for Classification of Web Browser Log and Timeline Visualization.- Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.- N-Victims: An Approach to Determine N-Victims for APT Investigations.- An Efficient Filtering Method for Detecting Malicous Web Pages.- Lightweight Client-Side Methods for Detecting Email Forgery.- AIGG Threshold Based HTTP GET Flooding Attack Detection.- Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks.- Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice.- On Trigger Detection against Reactive Jamming Attacks: A Localized Solution.- Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs.- A Trust Management Model for QoS-Based Service Selection.- Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems.
Record Nr. UNISA-996465946403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Applications [[electronic resource] ] : 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers / / edited by Souhwan Jung, Moti Yung
Information Security Applications [[electronic resource] ] : 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers / / edited by Souhwan Jung, Moti Yung
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XII, 271 p. 74 illus.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Computer networks
Algorithms
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Application software
Data protection
Computer Communication Networks
Cryptology
IT Operations
Computer and Information Systems Applications
Data and Information Security
ISBN 3-642-27890-6
Classificazione SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465685003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Applications [[electronic resource] ] : 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers / / edited by Yongwha Chung, Moti Yung
Information Security Applications [[electronic resource] ] : 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers / / edited by Yongwha Chung, Moti Yung
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIII, 352 p. 105 illus., 52 illus. in color.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Algorithms
Computers and civilization
Data protection
Computer Communication Networks
Cryptology
IT Operations
Computers and Society
Data and Information Security
ISBN 3-642-17955-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466049303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Applications [[electronic resource] ] : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers / / edited by Kiwook Sohn, Moti Yung
Information Security Applications [[electronic resource] ] : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers / / edited by Kiwook Sohn, Moti Yung
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 334 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Computer networks
Algorithms
Electronic data processing—Management
Computers, Special purpose
Cryptology
Data and Information Security
Computer Communication Networks
IT Operations
Special Purpose and Application-Based Systems
ISBN 3-642-00306-0
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Smart Card and Secure Hardware(1) -- Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation -- Template Attacks on ECDSA -- Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool -- Wireless and Sensor Network Security(1) -- Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network -- Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol -- Securing Layer-2 Path Selection in Wireless Mesh Networks -- Public Key Crypto Applications -- Public Key Authentication with Memory Tokens -- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures -- Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme -- Privacy and Anonymity -- Sanitizable and Deletable Signature -- An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data -- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition -- N/W Security and Intrusion Detection -- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512 -- A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model -- A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence -- Application Security and Trust Management -- Image-Feature Based Human Identification Protocols on Limited Display Devices -- Ternary Subset Difference Method and Its Quantitative Analysis -- Data Deletion with Provable Security -- Smart Card and Secure Hardware(2) -- A Probing Attack on AES -- On Avoiding ZVP-Attacks Using Isogeny Volcanoes -- Security Analysis of DRBG Using HMAC in NIST SP 800-90 -- Wireless and Sensor Network Security(2) -- Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module -- An Improved Distributed Key Management Scheme in Wireless Sensor Networks -- Protection Profile for Connected Interoperable DRM Framework.
Record Nr. UNISA-996465906903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Applications [[electronic resource] ] : 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers / / edited by Jae-Kwang Lee, Okyeon Yi, Moti Yung
Information Security Applications [[electronic resource] ] : 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers / / edited by Jae-Kwang Lee, Okyeon Yi, Moti Yung
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (417 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Computer networks
Electronic data processing—Management
Computers, Special purpose
Cryptology
Data and Information Security
Computer Communication Networks
IT Operations
Special Purpose and Application-Based Systems
ISBN 1-280-86454-0
9786610864546
3-540-71093-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Crypto Applications/Virus Protection -- Controllable Ring Signatures -- Efficient User Authentication and Key Agreement in Wireless Sensor Networks -- Identity-Based Key Issuing Without Secure Channel in a Broad Area -- PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution -- Cyber Indication/Intrusion Detection -- SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks -- SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment -- sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm -- Biometrics/Security Trust Management -- Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords -- Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification -- Quality Assurance for Evidence Collection in Network Forensics -- Secure Software/Systems -- Visualization of Permission Checks in Java Using Static Analysis -- Deployment of Virtual Machines in Lock-Keeper -- Smart Cards/Secure Hardware -- Investigations of Power Analysis Attacks and Countermeasures for ARIA -- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols -- A Novel Key Agreement Scheme in a Multiple Server Environment -- Mobile Security -- Cost-Effective IDS Operating Scheme in MANETs -- Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6 -- A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones -- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security -- Distributed Management of OMA DRM Domains -- New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting -- A Key Management Based on Multiple Regression in Hierarchical Sensor Network -- Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks -- Privacy/Anonymity -- Privacy Protection in PKIs: A Separation-of-Authority Approach -- Three-Party Password Authenticated Key Agreement Resistant to Server Compromise -- Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature -- Secret Handshake with Multiple Groups -- Internet and Wireless Security -- Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs -- EAP Using the Split Password-Based Authenticated Key Agreement -- How Many Malicious Scanners Are in the Internet? -- E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
Record Nr. UNISA-996465993003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Applications [[electronic resource] ] : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers / / edited by Kim Sehun, Moti Yung, Hyung-Woo Lee
Information Security Applications [[electronic resource] ] : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers / / edited by Kim Sehun, Moti Yung, Hyung-Woo Lee
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XIII, 388 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Computer networks
Electronic data processing—Management
Computers, Special purpose
Cryptology
Data and Information Security
Computer Communication Networks
IT Operations
Special Purpose and Application-Based Systems
ISBN 3-540-77535-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Crypto Applications -- Universal ? T Pairing Algorithm over Arbitrary Extension Degree -- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction -- Secret Signatures: How to Achieve Business Privacy Efficiently? -- Biometrics/Information Hiding -- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model -- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms -- Geometrically Invariant Image Watermarking in the DWT Domain -- Secure Hardware -- Implementation of LSM-Based RBAC Module for Embedded System -- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations -- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor -- Secure Systems -- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine -- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks -- Detecting Motifs in System Call Sequences -- Wireless and Mobile Security -- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System -- Breaking 104 Bit WEP in Less Than 60 Seconds -- Efficient Implementation of the Pairing on Mobilephones Using BREW -- Application Security/Secure Systems -- Security Analysis of MISTY1 -- A Generic Method for Secure SBox Implementation -- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences -- Access Control/DB Security -- Authorization Constraints Specification of RBAC -- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk -- A Compositional Multiple Policies Operating System Security Model -- Smart Cards/Secure Systems -- Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones -- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures -- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC -- Anonymity and P2P Security -- Risk & Distortion Based K-Anonymity -- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System -- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.
Record Nr. UNISA-996466254603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Applications : 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers / / edited by Jae-Kwang Lee, Okyeon Yi, Moti Yung
Information Security Applications : 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers / / edited by Jae-Kwang Lee, Okyeon Yi, Moti Yung
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (417 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Computer networks
Electronic data processing—Management
Computers, Special purpose
Cryptology
Data and Information Security
Computer Communication Networks
IT Operations
Special Purpose and Application-Based Systems
ISBN 1-280-86454-0
9786610864546
3-540-71093-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Crypto Applications/Virus Protection -- Controllable Ring Signatures -- Efficient User Authentication and Key Agreement in Wireless Sensor Networks -- Identity-Based Key Issuing Without Secure Channel in a Broad Area -- PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution -- Cyber Indication/Intrusion Detection -- SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks -- SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment -- sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm -- Biometrics/Security Trust Management -- Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords -- Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification -- Quality Assurance for Evidence Collection in Network Forensics -- Secure Software/Systems -- Visualization of Permission Checks in Java Using Static Analysis -- Deployment of Virtual Machines in Lock-Keeper -- Smart Cards/Secure Hardware -- Investigations of Power Analysis Attacks and Countermeasures for ARIA -- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols -- A Novel Key Agreement Scheme in a Multiple Server Environment -- Mobile Security -- Cost-Effective IDS Operating Scheme in MANETs -- Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6 -- A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones -- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security -- Distributed Management of OMA DRM Domains -- New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting -- A Key Management Based on Multiple Regression in Hierarchical Sensor Network -- Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks -- Privacy/Anonymity -- Privacy Protection in PKIs: A Separation-of-Authority Approach -- Three-Party Password Authenticated Key Agreement Resistant to Server Compromise -- Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature -- Secret Handshake with Multiple Groups -- Internet and Wireless Security -- Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs -- EAP Using the Split Password-Based Authenticated Key Agreement -- How Many Malicious Scanners Are in the Internet? -- E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
Record Nr. UNINA-9910484269603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers / / edited by Kim Sehun, Moti Yung, Hyung-Woo Lee
Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers / / edited by Kim Sehun, Moti Yung, Hyung-Woo Lee
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XIII, 388 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Computer networks
Electronic data processing—Management
Computers, Special purpose
Cryptology
Data and Information Security
Computer Communication Networks
IT Operations
Special Purpose and Application-Based Systems
ISBN 3-540-77535-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Crypto Applications -- Universal ? T Pairing Algorithm over Arbitrary Extension Degree -- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction -- Secret Signatures: How to Achieve Business Privacy Efficiently? -- Biometrics/Information Hiding -- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model -- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms -- Geometrically Invariant Image Watermarking in the DWT Domain -- Secure Hardware -- Implementation of LSM-Based RBAC Module for Embedded System -- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations -- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor -- Secure Systems -- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine -- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks -- Detecting Motifs in System Call Sequences -- Wireless and Mobile Security -- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System -- Breaking 104 Bit WEP in Less Than 60 Seconds -- Efficient Implementation of the Pairing on Mobilephones Using BREW -- Application Security/Secure Systems -- Security Analysis of MISTY1 -- A Generic Method for Secure SBox Implementation -- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences -- Access Control/DB Security -- Authorization Constraints Specification of RBAC -- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk -- A Compositional Multiple Policies Operating System Security Model -- Smart Cards/Secure Systems -- Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones -- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures -- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC -- Anonymity and P2P Security -- Risk & Distortion Based K-Anonymity -- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System -- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.
Record Nr. UNINA-9910483953103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui