top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Public Key Infrastructures, Services and Applications : 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers / / edited by Sokratis Katsikas, Isaac Agudo
Public Key Infrastructures, Services and Applications : 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers / / edited by Sokratis Katsikas, Isaac Agudo
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 205 p. 27 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Computer security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Systems and Data Security
ISBN 3-642-53997-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Partial Model Checking for the Verification and Synthesis of Secure Service Compositions -- Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures -- Revocation and Non-repudiation: When the First Destroys the Latter -- New Results for the Practical Use of Range Proofs -- STUNT: A Simple, Transparent, User-Centered Network of Trust -- What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange -- Towards a More Secure and Scalable Verifying PKI of eMRTD -- Mutual Restricted Identification -- Trust Views for the Web PKI -- A User-Centric Digital Signature Scheme -- A Test-Bed for Intrusion Detection Systems Results Post-processing -- Uncertainty in Intrusion Detection Signaling Games.
Record Nr. UNINA-9910483854703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public Key Infrastructures, Services and Applications : 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers / / edited by Sokratis Katsikas, Isaac Agudo
Public Key Infrastructures, Services and Applications : 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers / / edited by Sokratis Katsikas, Isaac Agudo
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 205 p. 27 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Computer security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Systems and Data Security
ISBN 3-642-53997-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Partial Model Checking for the Verification and Synthesis of Secure Service Compositions -- Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures -- Revocation and Non-repudiation: When the First Destroys the Latter -- New Results for the Practical Use of Range Proofs -- STUNT: A Simple, Transparent, User-Centered Network of Trust -- What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange -- Towards a More Secure and Scalable Verifying PKI of eMRTD -- Mutual Restricted Identification -- Trust Views for the Web PKI -- A User-Centric Digital Signature Scheme -- A Test-Bed for Intrusion Detection Systems Results Post-processing -- Uncertainty in Intrusion Detection Signaling Games.
Record Nr. UNISA-996205181603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust Management VII [[electronic resource] ] : 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013, Proceedings / / edited by Carmen Fernandez-Gago, Fabio Martinelli, Siani Pearson, Isaac Agudo
Trust Management VII [[electronic resource] ] : 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013, Proceedings / / edited by Carmen Fernandez-Gago, Fabio Martinelli, Siani Pearson, Isaac Agudo
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 289 p. 49 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer security
Computers and civilization
Computer communication systems
Data encryption (Computer science)
Systems and Data Security
Computers and Society
Computer Communication Networks
Cryptology
ISBN 3-642-38323-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symbolic Privacy Analysis through Linkability and Detectability -- Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications -- Towards Automated Trust Establishment in Federated Identity Management -- On Beta Models with Trust Chains -- Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review -- Understanding Trust within Online Discussion Boards: Trust Formation in the Absence of Reputation Systems -- In Cloud We Trust: Risk-Assessment-as-a-Service -- An Empirical Test of How Events Turn the Cognitive Gears of Trust -- Reflections on Measuring the Trust Empowerment Potential of a Digital Environment -- Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity -- Securing Identity Assignment Using Implicit Certificates in P2P Overlays -- Impact of Dataset Representation on Smartphone Malware Detection Performance -- Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness -- Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems -- An Automatic Trust Calculation Based on the Improved Kalman Filter Detection Algorithm -- The Method of Trust and Reputation Systems Based on Link Prediction and Network-Aware Evaluation Environment for Reputation Systems -- Trust Model for Cloud Based on Cloud -- Modeling Reactive Trust Acquisition Using State Transition Systems -- Towards Trust-Aware and Self-adaptive Systems -- An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss -- PERSONA - A Personalized Data Protection Framework -- A Socio-technical Understanding of TLS Certificate Validation.
Record Nr. UNINA-9910437960303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui