top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security Applications [[electronic resource] ] : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers / / edited by Kijoon Chae, Moti Yung
Information Security Applications [[electronic resource] ] : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers / / edited by Kijoon Chae, Moti Yung
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 512 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Computers, Special purpose
Operating systems (Computers)
Algorithms
Electronic data processing—Management
Cryptology
Computer Communication Networks
Special Purpose and Application-Based Systems
Operating Systems
IT Operations
ISBN 1-280-30671-8
9786610306718
3-540-24591-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Security -- Model Checking of Security Protocols with Pre-configuration -- Remote Access VPN with Port Protection Function by Mobile Codes -- A Role of DEVS Simulation for Information Assurance -- Mobile Security -- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes -- Reliable Cascaded Delegation Scheme for Mobile Agent Environments -- Practical Solution for Location Privacy in Mobile IPv6 -- Intrusion Detection -- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection -- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System -- Towards a Global Security Architecture for Intrusion Detection and Reaction Management -- Internet Security -- Intrusion-Tolerant System Design for Web Server Survivability -- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access -- An Automatic Security Evaluation System for IPv6 Network -- Secure Software, Hardware, and Systems I -- A Location Privacy Protection Mechanism for Smart Space -- Secure System Architecture Based on Dynamic Resource Reallocation -- Fair Exchange with Guardian Angels -- Secure Software, Hardware, and Systems II -- Sign-Based Differential Power Analysis -- Asymmetric Watermarking Scheme Using Permutation Braids -- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m ) -- E-commerce Security -- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction -- Multi-dimensional Hash Chain For Sealed-Bid Auction -- An Improved Forward Integrity Protocol for Mobile Agents -- Digital Rights Management -- Taming “Trusted Platforms” by Operating System Design -- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation -- Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes -- Biometrics and Human Interfaces I -- 3D Face Recognition under Pose Varying Environments -- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint -- Fingerprint-Based Authentication for USB Token Systems -- Biometrics and Human Interfaces II -- Iris Recognition System Using Wavelet Packet and Support Vector Machines -- Biometrics Identification and Verification Using Projection-Based Face Recognition System -- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification -- Public Key Cryptography / Key Management -- E-MHT. An Efficient Protocol for Certificate Status Checking -- A Comment on Group Independent Threshold Sharing -- Automation-Considered Logic of Authentication and Key Distribution -- Applied Cryptography -- The MESH Block Ciphers -- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves -- Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer.
Record Nr. UNISA-996466170803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers / / edited by Kijoon Chae, Moti Yung
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers / / edited by Kijoon Chae, Moti Yung
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 512 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Computers, Special purpose
Operating systems (Computers)
Algorithms
Electronic data processing—Management
Cryptology
Computer Communication Networks
Special Purpose and Application-Based Systems
Operating Systems
IT Operations
ISBN 1-280-30671-8
9786610306718
3-540-24591-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Security -- Model Checking of Security Protocols with Pre-configuration -- Remote Access VPN with Port Protection Function by Mobile Codes -- A Role of DEVS Simulation for Information Assurance -- Mobile Security -- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes -- Reliable Cascaded Delegation Scheme for Mobile Agent Environments -- Practical Solution for Location Privacy in Mobile IPv6 -- Intrusion Detection -- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection -- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System -- Towards a Global Security Architecture for Intrusion Detection and Reaction Management -- Internet Security -- Intrusion-Tolerant System Design for Web Server Survivability -- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access -- An Automatic Security Evaluation System for IPv6 Network -- Secure Software, Hardware, and Systems I -- A Location Privacy Protection Mechanism for Smart Space -- Secure System Architecture Based on Dynamic Resource Reallocation -- Fair Exchange with Guardian Angels -- Secure Software, Hardware, and Systems II -- Sign-Based Differential Power Analysis -- Asymmetric Watermarking Scheme Using Permutation Braids -- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m ) -- E-commerce Security -- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction -- Multi-dimensional Hash Chain For Sealed-Bid Auction -- An Improved Forward Integrity Protocol for Mobile Agents -- Digital Rights Management -- Taming “Trusted Platforms” by Operating System Design -- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation -- Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes -- Biometrics and Human Interfaces I -- 3D Face Recognition under Pose Varying Environments -- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint -- Fingerprint-Based Authentication for USB Token Systems -- Biometrics and Human Interfaces II -- Iris Recognition System Using Wavelet Packet and Support Vector Machines -- Biometrics Identification and Verification Using Projection-Based Face Recognition System -- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification -- Public Key Cryptography / Key Management -- E-MHT. An Efficient Protocol for Certificate Status Checking -- A Comment on Group Independent Threshold Sharing -- Automation-Considered Logic of Authentication and Key Distribution -- Applied Cryptography -- The MESH Block Ciphers -- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves -- Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer.
Record Nr. UNINA-9910144208703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Membrane Computing [[electronic resource] ] : 19th International Conference, CMC 2018, Dresden, Germany, September 4–7, 2018, Revised Selected Papers / / edited by Thomas Hinze, Grzegorz Rozenberg, Arto Salomaa, Claudio Zandron
Membrane Computing [[electronic resource] ] : 19th International Conference, CMC 2018, Dresden, Germany, September 4–7, 2018, Revised Selected Papers / / edited by Thomas Hinze, Grzegorz Rozenberg, Arto Salomaa, Claudio Zandron
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVI, 275 p. 167 illus., 21 illus. in color.)
Disciplina 511.3
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science
Software engineering
Computer engineering
Computer networks
Artificial intelligence
Electronic data processing—Management
Theory of Computation
Software Engineering
Computer Engineering and Networks
Artificial Intelligence
IT Operations
ISBN 3-030-12797-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Impacts of Membrane Computing on Theoretical Computer Science -- Time and Space Complexity of P Systems - And Why They Matter -- A Brute-Force Solution to the 27-Queens Puzzle Using a Distributed Computation -- Regular Papers. -Tissue P Systems with Point Mutation Rules -- Adaptive P Systems -- Chain Code P System Generating a Variant of the Peano Space-filling Curve -- APCol Systems with Agent Creation -- APCol Systems with Verifier Agents -- A Semantic Investigation of Spiking Neural P Systems -- Towards Automated Analysis of Belousov-Zhabotinsky Reactions in a Petri Dish by Membrane Computing using Optic Flow -- Testing Identifiable Kernel P Systems using an X-machine Approach -- Actor-like cP Systems -- Solving QSAT in Sublinear Depth -- Design of specific P systems simulators on GPUs -- Construction of Stable and Lightweight Technical Structures Inspired by Ossification of Bones using Osteogenetic P Systems -- On Small Universality of Spiking Neural P Systems with Multiple Channels -- Modeling Plant Development with M Systems -- An Improved Quicksort Algorithm Based on Tissue-Like P Systems with Promoters.
Record Nr. UNISA-996466346103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Membrane Computing : 19th International Conference, CMC 2018, Dresden, Germany, September 4–7, 2018, Revised Selected Papers / / edited by Thomas Hinze, Grzegorz Rozenberg, Arto Salomaa, Claudio Zandron
Membrane Computing : 19th International Conference, CMC 2018, Dresden, Germany, September 4–7, 2018, Revised Selected Papers / / edited by Thomas Hinze, Grzegorz Rozenberg, Arto Salomaa, Claudio Zandron
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVI, 275 p. 167 illus., 21 illus. in color.)
Disciplina 511.3
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science
Software engineering
Computer engineering
Computer networks
Artificial intelligence
Electronic data processing—Management
Theory of Computation
Software Engineering
Computer Engineering and Networks
Artificial Intelligence
IT Operations
ISBN 3-030-12797-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Impacts of Membrane Computing on Theoretical Computer Science -- Time and Space Complexity of P Systems - And Why They Matter -- A Brute-Force Solution to the 27-Queens Puzzle Using a Distributed Computation -- Regular Papers. -Tissue P Systems with Point Mutation Rules -- Adaptive P Systems -- Chain Code P System Generating a Variant of the Peano Space-filling Curve -- APCol Systems with Agent Creation -- APCol Systems with Verifier Agents -- A Semantic Investigation of Spiking Neural P Systems -- Towards Automated Analysis of Belousov-Zhabotinsky Reactions in a Petri Dish by Membrane Computing using Optic Flow -- Testing Identifiable Kernel P Systems using an X-machine Approach -- Actor-like cP Systems -- Solving QSAT in Sublinear Depth -- Design of specific P systems simulators on GPUs -- Construction of Stable and Lightweight Technical Structures Inspired by Ossification of Bones using Osteogenetic P Systems -- On Small Universality of Spiking Neural P Systems with Multiple Channels -- Modeling Plant Development with M Systems -- An Improved Quicksort Algorithm Based on Tissue-Like P Systems with Promoters.
Record Nr. UNINA-9910337569503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Models in Software Engineering [[electronic resource] ] : Workshops and Symposia at MODELS 2011, Wellington, New Zealand, October 16-21, 2011, Reports and Revised Selected Papers / / edited by Jörg Kienzle
Models in Software Engineering [[electronic resource] ] : Workshops and Symposia at MODELS 2011, Wellington, New Zealand, October 16-21, 2011, Reports and Revised Selected Papers / / edited by Jörg Kienzle
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (X, 292 p.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Software engineering
Compilers (Computer programs)
Computer science
Electronic data processing—Management
Computer simulation
Application software
Software Engineering
Compilers and Interpreters
Computer Science Logic and Foundations of Programming
IT Operations
Computer Modelling
Computer and Information Systems Applications
ISBN 3-642-29645-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465992903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Models in Software Engineering : Workshops and Symposia at MoDELS 2010, Olso, Norway, October 3-8, 2010, Reports and Revised Selected Papers / / edited by Juergen Dingel, Arnor Solberg
Models in Software Engineering : Workshops and Symposia at MoDELS 2010, Olso, Norway, October 3-8, 2010, Reports and Revised Selected Papers / / edited by Juergen Dingel, Arnor Solberg
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XII, 416 p. 149 illus., 70 illus. in color.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Software engineering
Compilers (Computer programs)
Computer science
Electronic data processing—Management
Computer simulation
Software Engineering
Compilers and Interpreters
Computer Science Logic and Foundations of Programming
IT Operations
Computer Modelling
ISBN 3-642-21210-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti MODELS'10
Record Nr. UNISA-996465636703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Models in Software Engineering : Workshops and Symposia at MoDELS 2010, Olso, Norway, October 3-8, 2010, Reports and Revised Selected Papers / / edited by Juergen Dingel, Arnor Solberg
Models in Software Engineering : Workshops and Symposia at MoDELS 2010, Olso, Norway, October 3-8, 2010, Reports and Revised Selected Papers / / edited by Juergen Dingel, Arnor Solberg
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XII, 416 p. 149 illus., 70 illus. in color.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Software engineering
Compilers (Computer programs)
Computer science
Electronic data processing—Management
Computer simulation
Software Engineering
Compilers and Interpreters
Computer Science Logic and Foundations of Programming
IT Operations
Computer Modelling
ISBN 3-642-21210-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti MODELS'10
Record Nr. UNINA-9910510604703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and System Security [[electronic resource] ] : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
Network and System Security [[electronic resource] ] : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 540 p. 128 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Computers and civilization
Data and Information Security
Cryptology
Computer Communication Networks
IT Operations
Computers and Society
ISBN 3-319-46298-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.
Record Nr. UNISA-996466241303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings / / edited by Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 540 p. 128 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Computers and civilization
Data and Information Security
Cryptology
Computer Communication Networks
IT Operations
Computers and Society
ISBN 3-319-46298-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.
Record Nr. UNINA-9910484501503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Number Theory and Cryptography [[electronic resource] ] : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday / / edited by Marc Fischlin, Stefan Katzenbeisser
Number Theory and Cryptography [[electronic resource] ] : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday / / edited by Marc Fischlin, Stefan Katzenbeisser
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 281 p. 69 illus.)
Disciplina 512.7
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Application software
Computer science—Mathematics
Discrete mathematics
Computer networks
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Computer and Information Systems Applications
Discrete Mathematics in Computer Science
Computer Communication Networks
Cryptology
IT Operations
ISBN 3-642-42001-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Personal Tributes -- Computational Number Theory -- Hardness of Cryptographic Assumptions -- Hardware Security -- Privacy and Security -- Application Security.
Record Nr. UNISA-996465560803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui