top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Communication Networking [[electronic resource] ] : 19th EUNICE/IFIP EG WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013, Proceedings / / edited by Thomas Bauschert
Advances in Communication Networking [[electronic resource] ] : 19th EUNICE/IFIP EG WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013, Proceedings / / edited by Thomas Bauschert
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 322 p. 135 illus.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer communication systems
Information storage and retrieval
Algorithms
Computer security
Application software
Management information systems
Computer science
Computer Communication Networks
Information Storage and Retrieval
Algorithm Analysis and Problem Complexity
Systems and Data Security
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
ISBN 3-642-40552-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Modeling and Design.- Traffic Analysis -- Network and Traffic Management -- Services over Mobile Networks -- Monitoring and Measurement -- Security Concepts -- Application of ICT in Smart Grid and Smart Home Environments -- Data Dissemination in Ad-Hoc and Sensor Networks -- Services and Applications -- Poster Papers.
Record Nr. UNISA-996466027203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Communication Networking : 19th EUNICE/IFIP EG WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013, Proceedings / / edited by Thomas Bauschert
Advances in Communication Networking : 19th EUNICE/IFIP EG WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013, Proceedings / / edited by Thomas Bauschert
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 322 p. 135 illus.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer communication systems
Information storage and retrieval
Algorithms
Computer security
Application software
Management information systems
Computer science
Computer Communication Networks
Information Storage and Retrieval
Algorithm Analysis and Problem Complexity
Systems and Data Security
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
ISBN 3-642-40552-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Modeling and Design.- Traffic Analysis -- Network and Traffic Management -- Services over Mobile Networks -- Monitoring and Measurement -- Security Concepts -- Application of ICT in Smart Grid and Smart Home Environments -- Data Dissemination in Ad-Hoc and Sensor Networks -- Services and Applications -- Poster Papers.
Record Nr. UNINA-9910484995103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Computer Science and Ubiquitous Computing [[electronic resource] ] : CSA & CUTE / / edited by Doo-Soon Park, Han-Chieh Chao, Young-Sik Jeong, James J. (Jong Hyuk) Park
Advances in Computer Science and Ubiquitous Computing [[electronic resource] ] : CSA & CUTE / / edited by Doo-Soon Park, Han-Chieh Chao, Young-Sik Jeong, James J. (Jong Hyuk) Park
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (883 p.)
Disciplina 004
Collana Lecture Notes in Electrical Engineering
Soggetto topico Computer communication systems
Electrical engineering
Data mining
Computational intelligence
Computer security
Computer Communication Networks
Communications Engineering, Networks
Data Mining and Knowledge Discovery
Computational Intelligence
Systems and Data Security
ISBN 981-10-0281-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto I CSA -- 1 Mobile and ubiquitous computing -- 2 Dependable, reliable and autonomic computing -- 3 Security and trust management -- 4 Multimedia systems and services -- 5 Networking and communications -- 6 Database and data mining - 7 Game and software engineering -- 8 Grid and scalable computing -- 9 Embedded system and software -- 10 Artificial intelligence -- 11 Distributed and parallel algorithms -- 12 Web and internet computing -- 13 IT policy and business management -- II CUTE -- 1 Ubiquitous Communication and Networking -- 2 Ubiquitous Software Technology -- 3 Ubiquitous Systems and Applications -- 4 Ubiquitous Security, Privacy and Trust -- 5 IT Convergence Services.
Record Nr. UNINA-9910298963903321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Computing and Data Sciences [[electronic resource] ] : Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part I / / edited by Mayank Singh, P.K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer Ören, Rekha Kashyap
Advances in Computing and Data Sciences [[electronic resource] ] : Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part I / / edited by Mayank Singh, P.K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer Ören, Rekha Kashyap
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (532 pages)
Disciplina 004
Collana Communications in Computer and Information Science
Soggetto topico Data structures (Computer science)
Artificial intelligence
Computers
Optical data processing
Computer security
Law and legislation
Data Structures and Information Theory
Artificial Intelligence
Information Systems and Communication Service
Image Processing and Computer Vision
Systems and Data Security
Legal Aspects of Computing
ISBN 981-13-9939-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910350216903321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Computing and Data Sciences [[electronic resource] ] : Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part II / / edited by Mayank Singh, P.K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer Ören, Rekha Kashyap
Advances in Computing and Data Sciences [[electronic resource] ] : Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part II / / edited by Mayank Singh, P.K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer Ören, Rekha Kashyap
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (771 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Data structures (Computer science)
Artificial intelligence
Optical data processing
Computers
Computer security
Computer communication systems
Data Structures and Information Theory
Artificial Intelligence
Image Processing and Computer Vision
Information Systems and Communication Service
Systems and Data Security
Computer Communication Networks
ISBN 981-13-9942-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910350217403321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology - ASIACRYPT 2010 [[electronic resource] ] : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings / / edited by Masayuki Abe
Advances in Cryptology - ASIACRYPT 2010 [[electronic resource] ] : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings / / edited by Masayuki Abe
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIV, 634 p. 70 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Management information systems
Computer science
Computer science—Mathematics
Computer security
Applied mathematics
Engineering mathematics
Cryptology
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Discrete Mathematics in Computer Science
Systems and Data Security
Applications of Mathematics
ISBN 1-280-39053-0
9786613568458
3-642-17373-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash Attacks -- Rotational Rebound Attacks on Reduced Skein -- Finding Second Preimages of Short Messages for Hamsi-256 -- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl -- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 -- Collision Attacks against the Knudsen-Preneel Compression Functions -- Symmetric-Key Cryptosystems -- Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions -- The World Is Not Enough: Another Look on Second-Order DPA -- Block and Stream Ciphers -- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems -- A Byte-Based Guess and Determine Attack on SOSEMANUK -- Improved Single-Key Attacks on 8-Round AES-192 and AES-256 -- Protocols -- Constant-Size Commitments to Polynomials and Their Applications -- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries -- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model -- Key Exchange -- Generic Compilers for Authenticated Key Exchange -- A Forward-Secure Symmetric-Key Derivation Protocol -- Foundation -- Efficient String-Commitment from Weak Bit-Commitment -- On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields -- Random Oracles with(out) Programmability -- Zero-Knowledge -- Short Pairing-Based Non-interactive Zero-Knowledge Arguments -- Short Non-interactive Zero-Knowledge Proofs -- Optimistic Concurrent Zero Knowledge -- Lattice-Based Cryptography -- Faster Fully Homomorphic Encryption -- A Group Signature Scheme from Lattice Assumptions -- Lattice-Based Blind Signatures -- Secure Communication and Computation -- The Round Complexity of Verifiable Secret Sharing: The Statistical Case -- General Perfectly Secure Message Transmission Using Linear Codes -- On Invertible Sampling and Adaptive Security -- Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition -- Models, Notions, and Assumptions -- A Closer Look at Anonymity and Robustness in Encryption Schemes -- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures -- The Semi-Generic Group Model and Applications to Pairing-Based Cryptography -- Public-Key Encryption -- The Degree of Regularity of HFE Systems -- Structured Encryption and Controlled Disclosure -- Leakage Resilient ElGamal Encryption -- Efficient Public-Key Cryptography in the Presence of Key Leakage.
Record Nr. UNISA-996465949903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology - ASIACRYPT 2010 [[electronic resource] ] : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings / / edited by Masayuki Abe
Advances in Cryptology - ASIACRYPT 2010 [[electronic resource] ] : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings / / edited by Masayuki Abe
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIV, 634 p. 70 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Management information systems
Computer science
Computer science—Mathematics
Computer security
Applied mathematics
Engineering mathematics
Cryptology
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Discrete Mathematics in Computer Science
Systems and Data Security
Applications of Mathematics
ISBN 1-280-39053-0
9786613568458
3-642-17373-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash Attacks -- Rotational Rebound Attacks on Reduced Skein -- Finding Second Preimages of Short Messages for Hamsi-256 -- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl -- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 -- Collision Attacks against the Knudsen-Preneel Compression Functions -- Symmetric-Key Cryptosystems -- Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions -- The World Is Not Enough: Another Look on Second-Order DPA -- Block and Stream Ciphers -- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems -- A Byte-Based Guess and Determine Attack on SOSEMANUK -- Improved Single-Key Attacks on 8-Round AES-192 and AES-256 -- Protocols -- Constant-Size Commitments to Polynomials and Their Applications -- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries -- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model -- Key Exchange -- Generic Compilers for Authenticated Key Exchange -- A Forward-Secure Symmetric-Key Derivation Protocol -- Foundation -- Efficient String-Commitment from Weak Bit-Commitment -- On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields -- Random Oracles with(out) Programmability -- Zero-Knowledge -- Short Pairing-Based Non-interactive Zero-Knowledge Arguments -- Short Non-interactive Zero-Knowledge Proofs -- Optimistic Concurrent Zero Knowledge -- Lattice-Based Cryptography -- Faster Fully Homomorphic Encryption -- A Group Signature Scheme from Lattice Assumptions -- Lattice-Based Blind Signatures -- Secure Communication and Computation -- The Round Complexity of Verifiable Secret Sharing: The Statistical Case -- General Perfectly Secure Message Transmission Using Linear Codes -- On Invertible Sampling and Adaptive Security -- Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition -- Models, Notions, and Assumptions -- A Closer Look at Anonymity and Robustness in Encryption Schemes -- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures -- The Semi-Generic Group Model and Applications to Pairing-Based Cryptography -- Public-Key Encryption -- The Degree of Regularity of HFE Systems -- Structured Encryption and Controlled Disclosure -- Leakage Resilient ElGamal Encryption -- Efficient Public-Key Cryptography in the Presence of Key Leakage.
Record Nr. UNINA-9910484643303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology - ASIACRYPT 2013 [[electronic resource] ] : 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I / / edited by Kazue Sako, Palash Sarkar
Advances in Cryptology - ASIACRYPT 2013 [[electronic resource] ] : 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I / / edited by Kazue Sako, Palash Sarkar
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XXIV, 546 p. 82 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Management information systems
Computer science
Computer science—Mathematics
Computer security
Applied mathematics
Engineering mathematics
Cryptology
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Discrete Mathematics in Computer Science
Systems and Data Security
Applications of Mathematics
ISBN 3-642-42033-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash Functions.
Record Nr. UNISA-996465559903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology - ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I / / edited by Kazue Sako, Palash Sarkar
Advances in Cryptology - ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I / / edited by Kazue Sako, Palash Sarkar
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XXIV, 546 p. 82 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Management information systems
Computer science
Computer science—Mathematics
Computer security
Applied mathematics
Engineering mathematics
Cryptology
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Discrete Mathematics in Computer Science
Systems and Data Security
Applications of Mathematics
ISBN 3-642-42033-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash Functions.
Record Nr. UNINA-9910484063003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology - CRYPTO '98 [[electronic resource] ] : 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings / / edited by Hugo Krawczyk
Advances in Cryptology - CRYPTO '98 [[electronic resource] ] : 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings / / edited by Hugo Krawczyk
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (XII, 524 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer security
Computers
Computer science—Mathematics
Computer communication systems
Management information systems
Computer science
Cryptology
Systems and Data Security
Theory of Computation
Discrete Mathematics in Computer Science
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-540-68462-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1 -- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack -- Relations among notions of security for public-key encryption schemes -- Cryptography and the internet -- Differential collisions in SHA-0 -- From differential cryptanalysis to ciphertext-only attacks -- A simplified approach to threshold and proactive RSA -- New efficient and secure protocols for verifiable signature sharing and other applications -- Trading correctness for privacy in unconditional multi-party computation -- Fast digital identity revocation -- Self-delegation with controlled propagation — or — What if you lose your laptop -- Identity escrow -- Generalized birthday attacks on unbalanced Feistel networks -- Quadratic relation of S-box and its application to the linear attack of full round DES -- Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree -- Cryptanalysis of the Ajtai-Dwork cryptosystem -- Cryptanalysis of the Chor-Rivest cryptosystem -- Cryptanalysis of the oil and vinegar signature scheme -- From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs -- Many-to-one trapdoor functions and their relation to public-key cryptosystems -- Authentication, enhanced security and error correcting codes -- An efficient discrete log pseudo random generator -- Fast RSA-type cryptosystem modulo p k q -- An elliptic curve implementation of the finite field digital signature algorithm -- Quantum bit commitment from a physical assumption -- On concrete security treatment of signatures derived from identification -- Building PRFs from PRPs -- Security amplification by composition: The case of doubly-iterated, ideal ciphers -- On the existence of 3-round zero-knowledge protocols -- Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free? -- Concurrent zero-knowledge: Reducing the need for timing constraints -- The solution of McCurley's discrete log challenge -- Optimal extension fields for fast arithmetic in public-key algorithms -- Time-stamping with binary linking schemes -- Threshold traitor tracing.
Record Nr. UNISA-996466138803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui