Computer Security [[electronic resource] ] : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II / / edited by Javier Lopez, Jianying Zhou, Miguel Soriano |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIX, 571 p. 104 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Criptografía Computers and civilization Computers Law and legislation Computer organization Systems and Data Security Cryptology Computers and Society Legal Aspects of Computing Computer Systems Organization and Communication Networks Information Systems and Communication Service |
ISBN | 3-319-98989-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Software security -- Blockchain & machine Learning -- Hardware security -- Attacks -- Malware & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web security -- Cloud security -- Applied crypto (I) -- Privacy (II) -- Multi-party computation -- SDN security -- Applied crypto (II). |
Record Nr. | UNINA-9910349416603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security [[electronic resource] ] : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I / / edited by Javier Lopez, Jianying Zhou, Miguel Soriano |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIX, 621 p. 136 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Criptografía Computers and civilization Computers Law and legislation Computer organization Systems and Data Security Cryptology Computers and Society Legal Aspects of Computing Computer Systems Organization and Communication Networks Information Systems and Communication Service |
ISBN | 3-319-99073-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Software security -- Blockchain & machine Learning -- Hardware security -- Attacks -- Malware & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web security -- Cloud security -- Applied crypto (I) -- Privacy (II) -- Multi-party computation -- SDN security -- Applied crypto (II). |
Record Nr. | UNINA-9910349415003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security [[electronic resource] ] : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I / / edited by Javier Lopez, Jianying Zhou, Miguel Soriano |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIX, 621 p. 136 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Criptografía Computers and civilization Computers Law and legislation Computer organization Systems and Data Security Cryptology Computers and Society Legal Aspects of Computing Computer Systems Organization and Communication Networks Information Systems and Communication Service |
ISBN | 3-319-99073-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Software security -- Blockchain & machine Learning -- Hardware security -- Attacks -- Malware & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web security -- Cloud security -- Applied crypto (I) -- Privacy (II) -- Multi-party computation -- SDN security -- Applied crypto (II). |
Record Nr. | UNISA-996466456103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security [[electronic resource] ] : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II / / edited by Javier Lopez, Jianying Zhou, Miguel Soriano |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIX, 571 p. 104 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Criptografía Computers and civilization Computers Law and legislation Computer organization Systems and Data Security Cryptology Computers and Society Legal Aspects of Computing Computer Systems Organization and Communication Networks Information Systems and Communication Service |
ISBN | 3-319-98989-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Software security -- Blockchain & machine Learning -- Hardware security -- Attacks -- Malware & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web security -- Cloud security -- Applied crypto (I) -- Privacy (II) -- Multi-party computation -- SDN security -- Applied crypto (II). |
Record Nr. | UNISA-996466322503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXI, 485 p. 106 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Computers Law and legislation Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Legal Aspects of Computing |
ISBN | 3-319-66402-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive. |
Record Nr. | UNINA-9910484050603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security – ESORICS 2017 [[electronic resource] ] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I / / edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXI, 485 p. 106 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Computers Law and legislation Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Legal Aspects of Computing |
ISBN | 3-319-66402-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive. |
Record Nr. | UNISA-996465873203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Constructive Side-Channel Analysis and Secure Design [[electronic resource] ] : 15th International Workshop, COSADE 2024, Gardanne, France, April 9–10, 2024, Proceedings / / by Romain Wacquez ; edited by Naofumi Homma |
Autore | Homma Naofumi |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (285 pages) |
Disciplina | 005.8 |
Altri autori (Persone) | WacquezRomain |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Computers - Law and legislation Information technology - Law and legislation Computer networks Computers, Special purpose Computer systems Microprogramming Data and Information Security Legal Aspects of Computing Computer Communication Networks Special Purpose and Application-Based Systems Computer System Implementation Control Structures and Microprogramming |
ISBN | 3-031-57543-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Analyses and Tools -- Characterizing and Modeling Synchronous Clock-Glitch Fault Injection -- On-chip evaluation of voltage drops and fault occurrence induced by Si backside EM injection -- EFFLUX-F2: A high performance hardware security evaluation board -- Attack Methods -- Practical Improvements to Statistical Ineffective Fault Attacks -- CAPABARA: A Combined Attack on CAPA -- Deep-Learning-Based Side-Channel Attacks -- Exploring Multi-Task Learning in the Context of Masked AES Implementations -- The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression -- Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption -- PUF/RNG -- Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF -- Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators -- Lightweight Leakage-Resilient PRNG from TBCs using Superposition -- Cryptographic Implementations -- The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+ -- HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme -- Combining Loop Shuffling and Code Polymorphism for Enhanced AES Side-Channel Security. |
Record Nr. | UNINA-9910847598403321 |
Homma Naofumi
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Contactless 3D Fingerprint Identification [[electronic resource] /] / by Ajay Kumar |
Autore | Kumar Ajay |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (129 pages) |
Disciplina | 363.258 |
Collana | Advances in Computer Vision and Pattern Recognition |
Soggetto topico |
Biometrics (Biology)
Artificial intelligence Computational intelligence Computers Law and legislation Biometrics Artificial Intelligence Computational Intelligence Legal Aspects of Computing |
ISBN | 3-319-67681-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction to Trends in Fingerprint Identification -- 3D Fingerprint Image Acquisition Methods -- Contactless and Live 3D Fingerprint Imaging -- 3D Fingerprint Acquisition Using Colored Photometric Stereo -- 3D Fingerprint Image Preprocessing and Enhancement -- Representation, Recovery and Matching of 3D Minutiae Template -- Other Methods of 3D Fingerprint Matching -- Individuality of 3D Fingerprints. |
Record Nr. | UNINA-9910299162403321 |
Kumar Ajay
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Contractual Management [[electronic resource] ] : Managing Through Contracts / / edited by Ralph Schuhmann, Bert Eichhorn |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020 |
Descrizione fisica | 1 online resource (430 pages) |
Disciplina | 346.02 |
Soggetto topico |
Industrial procurement
E-commerce E-business Electronic commerce Computers Law and legislation International business enterprises Procurement e-Commerce/e-business e-Business/e-Commerce Legal Aspects of Computing International Business |
ISBN | 3-662-58482-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | I - Theory Part: Contractual Management - A Holistic Approach to a Diverse Issue -- II - Case Study Part: 12-15 Case Studies, all of them arranged unter the Following Headlines -- Enterprise Networks -- Information and Communication -- Change -- Conflict -- Accounting and Financing – Legal Compliance – Societal Steering. |
Record Nr. | UNINA-9910367256003321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Information Infrastructures Security [[electronic resource] ] : 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers / / edited by Eric Luiijf, Inga Žutautaitė, Bernhard M. Hämmerli |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 238 p. 71 illus., 47 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computer crimes Application software Computers Law and legislation Systems and Data Security Computer Communication Networks Computer Crime Information Systems Applications (incl. Internet) Legal Aspects of Computing |
ISBN | 3-030-05849-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Advanced analysis of critical energy systems -- Strengthening urban resilience -- Securing internet of things and industrial control systems -- Need and tool sets for industrial control system security -- Advancements in governance and resilience of critical infrastructures. . |
Record Nr. | UNINA-9910337571103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|