top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied Cryptography and Network Security [[electronic resource] ] : 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings / / edited by Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud
Applied Cryptography and Network Security [[electronic resource] ] : 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings / / edited by Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 535 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer security
Application software
Coding theory
Information theory
Data structures (Computer science)
Cryptology
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Coding and Information Theory
Data Structures and Information Theory
ISBN 3-642-01957-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Key Exchange -- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys -- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results -- Secure Computation -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Efficient Robust Private Set Intersection -- Public-Key Encryption -- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual-Policy Attribute Based Encryption -- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions -- Network Security I -- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis -- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks -- Traitor Tracing -- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size -- Tracing and Revoking Pirate Rebroadcasts -- Authentication and Anonymity -- Efficient Deniable Authentication for Signatures -- Homomorphic MACs: MAC-Based Integrity for Network Coding -- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN -- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks -- Hash Functions -- Cryptanalysis of Twister -- Cryptanalysis of CubeHash -- Collision Attack on Boole -- Network Security II -- Integrity Protection for Revision Control -- Fragility of the Robust Security Network: 802.11 Denial of Service -- Fast Packet Classification Using Condition Factorization -- Lattices -- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches -- Broadcast Attacks against Lattice-Based Cryptosystems -- Partial Key Exposure Attack on CRT-RSA -- Side-Channel Attacks -- How to Compare Profiled Side-Channel Attacks? -- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis -- Attacking ECDSA-Enabled RFID Devices.
Record Nr. UNISA-996465979303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied cryptography and network security : 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 : proceedings / / Michel Abdalla ... [et al.] (eds.)
Applied cryptography and network security : 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 : proceedings / / Michel Abdalla ... [et al.] (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2009
Descrizione fisica 1 online resource (XIII, 535 p.)
Disciplina 005.8
Altri autori (Persone) AbdallaMichel
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Telecommunication - Security measures
ISBN 3-642-01957-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Key Exchange -- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys -- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results -- Secure Computation -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Efficient Robust Private Set Intersection -- Public-Key Encryption -- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual-Policy Attribute Based Encryption -- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions -- Network Security I -- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis -- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks -- Traitor Tracing -- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size -- Tracing and Revoking Pirate Rebroadcasts -- Authentication and Anonymity -- Efficient Deniable Authentication for Signatures -- Homomorphic MACs: MAC-Based Integrity for Network Coding -- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN -- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks -- Hash Functions -- Cryptanalysis of Twister -- Cryptanalysis of CubeHash -- Collision Attack on Boole -- Network Security II -- Integrity Protection for Revision Control -- Fragility of the Robust Security Network: 802.11 Denial of Service -- Fast Packet Classification Using Condition Factorization -- Lattices -- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches -- Broadcast Attacks against Lattice-Based Cryptosystems -- Partial Key Exposure Attack on CRT-RSA -- Side-Channel Attacks -- How to Compare Profiled Side-Channel Attacks? -- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis -- Attacking ECDSA-Enabled RFID Devices.
Altri titoli varianti ACNS 2009
Record Nr. UNINA-9910484102303321
Berlin ; ; New York, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptology and Network Security [[electronic resource] ] : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings / / edited by Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab
Cryptology and Network Security [[electronic resource] ] : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings / / edited by Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVIII, 349 p. 52 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Coding theory
Information theory
Cryptology
Systems and Data Security
Computer Communication Networks
Coding and Information Theory
ISBN 3-319-02937-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis -- Zero-Knowledge Protocols -- Distributed Protocols -- Network Security and Applications -- Advanced Cryptographic Primitives -- Verifiable Computation. .
Record Nr. UNISA-996465771103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptology and Network Security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings / / edited by Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab
Cryptology and Network Security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings / / edited by Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVIII, 349 p. 52 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Coding theory
Information theory
Cryptology
Systems and Data Security
Computer Communication Networks
Coding and Information Theory
ISBN 3-319-02937-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis -- Zero-Knowledge Protocols -- Distributed Protocols -- Network Security and Applications -- Advanced Cryptographic Primitives -- Verifiable Computation. .
Record Nr. UNINA-9910484140403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Pairing-Based Cryptography -- Pairing 2012 [[electronic resource] ] : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers / / edited by Michel Abdalla, Tanja Lange
Pairing-Based Cryptography -- Pairing 2012 [[electronic resource] ] : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers / / edited by Michel Abdalla, Tanja Lange
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 333 p. 18 illus.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
Algorithms
Cryptology
Systems and Data Security
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Soggetto genere / forma Conference proceedings.
ISBN 3-642-36334-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466247403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Pairing-Based Cryptography -- Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers / / edited by Michel Abdalla, Tanja Lange
Pairing-Based Cryptography -- Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers / / edited by Michel Abdalla, Tanja Lange
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 333 p. 18 illus.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
Algorithms
Cryptology
Systems and Data Security
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Soggetto genere / forma Conference proceedings.
ISBN 3-642-36334-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910739479603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Progress in Cryptology - LATINCRYPT 2010 [[electronic resource] ] : First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings / / edited by Michel Abdalla, Paulo S.L.M. Barreto
Progress in Cryptology - LATINCRYPT 2010 [[electronic resource] ] : First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings / / edited by Michel Abdalla, Paulo S.L.M. Barreto
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XII, 323 p. 47 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Cryptology
ISBN 3-642-14712-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Encryption -- Broadcast Encryption with Multiple Trust Authorities -- Security of Sequential Multiple Encryption -- Mediated Traceable Anonymous Encryption -- Elliptic Curves -- Starfish on Strike -- Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves -- Implementation of Pairings -- Fixed Argument Pairings -- New Software Speed Records for Cryptographic Pairings -- Implementation of Cryptographic Algorithms -- Accelerating Lattice Reduction with FPGAs -- Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets -- Cryptographic Protocols and Foundations -- Communication Optimal Multi-valued Asynchronous Broadcast Protocol -- On the Impossibility of Batch Update for Cryptographic Accumulators -- On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations -- Cryptanalysis of Symmetric Primitives -- Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256 -- Generic Attacks on Misty Schemes -- Post-Quantum Cryptography -- Cryptanalysis of the Hidden Matrix Cryptosystem -- A Lattice-Based Threshold Ring Signature Scheme -- Side-Channel Attacks -- Defeating Any Secret Cryptography with SCARE Attacks -- How Leaky Is an Extractor? -- Combined Implementation Attack Resistant Exponentiation.
Record Nr. UNISA-996466215603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in cryptology-- LATINCRYPT 2010 : first International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010 : proceedings / / Michel Abdalla, Paulo S.L.M. Barreto, (eds.)
Progress in cryptology-- LATINCRYPT 2010 : first International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010 : proceedings / / Michel Abdalla, Paulo S.L.M. Barreto, (eds.)
Edizione [1st ed.]
Pubbl/distr/stampa Berlin, : Springer, 2010
Descrizione fisica 1 online resource (XII, 323 p. 47 illus.)
Disciplina 005.8
Altri autori (Persone) AbdallaMichel
BarretoPaulo S. L. M
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Cryptography - Latin America
Data encryption (Computer science)
ISBN 3-642-14712-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Encryption -- Broadcast Encryption with Multiple Trust Authorities -- Security of Sequential Multiple Encryption -- Mediated Traceable Anonymous Encryption -- Elliptic Curves -- Starfish on Strike -- Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves -- Implementation of Pairings -- Fixed Argument Pairings -- New Software Speed Records for Cryptographic Pairings -- Implementation of Cryptographic Algorithms -- Accelerating Lattice Reduction with FPGAs -- Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets -- Cryptographic Protocols and Foundations -- Communication Optimal Multi-valued Asynchronous Broadcast Protocol -- On the Impossibility of Batch Update for Cryptographic Accumulators -- On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations -- Cryptanalysis of Symmetric Primitives -- Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256 -- Generic Attacks on Misty Schemes -- Post-Quantum Cryptography -- Cryptanalysis of the Hidden Matrix Cryptosystem -- A Lattice-Based Threshold Ring Signature Scheme -- Side-Channel Attacks -- Defeating Any Secret Cryptography with SCARE Attacks -- How Leaky Is an Extractor? -- Combined Implementation Attack Resistant Exponentiation.
Record Nr. UNINA-9910483053503321
Berlin, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public-Key Cryptography – PKC 2018 [[electronic resource] ] : 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I / / edited by Michel Abdalla, Ricardo Dahab
Public-Key Cryptography – PKC 2018 [[electronic resource] ] : 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I / / edited by Michel Abdalla, Ricardo Dahab
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIX, 714 p. 164 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Computer organization
Computers
Cryptology
Software Engineering/Programming and Operating Systems
Computer Systems Organization and Communication Networks
Computing Milieux
ISBN 3-319-76578-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Key-Dependent-Message and Selective-Opening Security -- Searchable and Fully Homomorphic Encryption -- Public-Key Encryption -- Encryption with Bad Randomness -- Subversion Resistance -- Cryptanalysis -- Composable Security -- Oblivious Transfer -- Multiparty Computation -- Signatures -- Structure-Preserving Signatures -- Functional Encryption -- Foundations -- Obfuscation-Based Cryptographic Constructions -- Protocols -- Blockchain -- Zero-Knowledge -- Lattices.
Record Nr. UNISA-996465516503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-Key Cryptography – PKC 2018 [[electronic resource] ] : 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II / / edited by Michel Abdalla, Ricardo Dahab
Public-Key Cryptography – PKC 2018 [[electronic resource] ] : 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II / / edited by Michel Abdalla, Ricardo Dahab
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIX, 760 p. 95 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Computer organization
Computers
Cryptology
Software Engineering/Programming and Operating Systems
Computer Systems Organization and Communication Networks
Computing Milieux
ISBN 3-319-76581-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Key-Dependent-Message and Selective-Opening Security -- Searchable and Fully Homomorphic Encryption -- Public-Key Encryption -- Encryption with Bad Randomness -- Subversion Resistance -- Cryptanalysis -- Composable Security -- Oblivious Transfer -- Multiparty Computation -- Signatures -- Structure-Preserving Signatures -- Functional Encryption -- Foundations -- Obfuscation-Based Cryptographic Constructions -- Protocols -- Blockchain -- Zero-Knowledge -- Lattices.
Record Nr. UNISA-996465772103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui