top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer security - ESORICS 2009 : 14th European symposium on research in computer security, Saint-Malo, France, September 21-23, 2009 : proceedings / / Michael Backes, Peng Ning (eds.)
Computer security - ESORICS 2009 : 14th European symposium on research in computer security, Saint-Malo, France, September 21-23, 2009 : proceedings / / Michael Backes, Peng Ning (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; hHeidelberg, : Springer-Verlag, 2009
Descrizione fisica 1 online resource (XVI, 706 p.)
Disciplina 005.822gerDNB
Altri autori (Persone) BackesMichael
NingPeng
Collana Lecture notes in computer science
Soggetto topico Computer security
Computers - Access control
ISBN 3-642-04444-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Security I -- Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones -- User-Centric Handling of Identity Agent Compromise -- The Coremelt Attack -- Type-Based Analysis of PIN Processing APIs -- Declassification with Explicit Reference Points -- Tracking Information Flow in Dynamic Tree Structures -- Network Security II -- Lightweight Opportunistic Tunneling (LOT) -- Hide and Seek in Time — Robust Covert Timing Channels -- Authentic Time-Stamps for Archival Storage -- Towards a Theory of Accountability and Audit -- Reliable Evidence: Auditability by Typing -- PCAL: Language Support for Proof-Carrying Authorization Systems -- Network Security III -- ReFormat: Automatic Reverse Engineering of Encrypted Messages -- Protocol Normalization Using Attribute Grammars -- Automatically Generating Models for Botnet Detection -- Dynamic Enforcement of Abstract Separation of Duty Constraints -- Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging -- Requirements and Protocols for Inference-Proof Interactions in Information Systems -- A Privacy Preservation Model for Facebook-Style Social Network Systems -- New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing -- Secure Pseudonymous Channels -- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing -- Content Delivery Networks: Protection or Threat? -- Model-Checking DoS Amplification for VoIP Session Initiation -- The Wisdom of Crowds: Attacks and Optimal Constructions -- Secure Evaluation of Private Linear Branching Programs with Medical Applications -- Keep a Few: Outsourcing Data While Maintaining Confidentiality -- Data Structures with Unpredictable Timing -- WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance -- Corruption-Localizing Hashing -- Isolating JavaScript with Filters, Rewriting, and Wrappers -- An Effective Method for Combating Malicious Scripts Clickbots -- Client-Side Detection of XSS Worms by Monitoring Payload Propagation -- Formal Indistinguishability Extended to the Random Oracle Model -- Computationally Sound Analysis of a Probabilistic Contract Signing Protocol -- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption -- A Generic Security API for Symmetric Key Management on Cryptographic Devices -- ID-Based Secure Distance Bounding and Localization -- Secure Ownership and Ownership Transfer in RFID Systems -- Cumulative Attestation Kernels for Embedded Systems -- Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries -- Set Covering Problems in Role-Based Access Control.
Record Nr. UNINA-9910483357103321
Berlin ; ; hHeidelberg, : Springer-Verlag, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security -- ESORICS 2009 [[electronic resource] ] : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings / / edited by Michael Backes, Peng Ning
Computer Security -- ESORICS 2009 [[electronic resource] ] : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings / / edited by Michael Backes, Peng Ning
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XVI, 706 p.)
Disciplina 005.822gerDNB
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Data structures (Computer science)
Computer science—Mathematics
E-commerce
Systems and Data Security
Cryptology
Coding and Information Theory
Data Structures and Information Theory
Discrete Mathematics in Computer Science
e-Commerce/e-business
ISBN 3-642-04444-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Security I -- Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones -- User-Centric Handling of Identity Agent Compromise -- The Coremelt Attack -- Type-Based Analysis of PIN Processing APIs -- Declassification with Explicit Reference Points -- Tracking Information Flow in Dynamic Tree Structures -- Network Security II -- Lightweight Opportunistic Tunneling (LOT) -- Hide and Seek in Time — Robust Covert Timing Channels -- Authentic Time-Stamps for Archival Storage -- Towards a Theory of Accountability and Audit -- Reliable Evidence: Auditability by Typing -- PCAL: Language Support for Proof-Carrying Authorization Systems -- Network Security III -- ReFormat: Automatic Reverse Engineering of Encrypted Messages -- Protocol Normalization Using Attribute Grammars -- Automatically Generating Models for Botnet Detection -- Dynamic Enforcement of Abstract Separation of Duty Constraints -- Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging -- Requirements and Protocols for Inference-Proof Interactions in Information Systems -- A Privacy Preservation Model for Facebook-Style Social Network Systems -- New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing -- Secure Pseudonymous Channels -- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing -- Content Delivery Networks: Protection or Threat? -- Model-Checking DoS Amplification for VoIP Session Initiation -- The Wisdom of Crowds: Attacks and Optimal Constructions -- Secure Evaluation of Private Linear Branching Programs with Medical Applications -- Keep a Few: Outsourcing Data While Maintaining Confidentiality -- Data Structures with Unpredictable Timing -- WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance -- Corruption-Localizing Hashing -- Isolating JavaScript with Filters, Rewriting, and Wrappers -- An Effective Method for Combating Malicious Scripts Clickbots -- Client-Side Detection of XSS Worms by Monitoring Payload Propagation -- Formal Indistinguishability Extended to the Random Oracle Model -- Computationally Sound Analysis of a Probabilistic Contract Signing Protocol -- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption -- A Generic Security API for Symmetric Key Management on Cryptographic Devices -- ID-Based Secure Distance Bounding and Localization -- Secure Ownership and Ownership Transfer in RFID Systems -- Cumulative Attestation Kernels for Embedded Systems -- Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries -- Set Covering Problems in Role-Based Access Control.
Record Nr. UNISA-996465663603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
FMSE '03 : proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering : Washington, DC, USA, October 30, 2003 : co-located with CCS'03
FMSE '03 : proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering : Washington, DC, USA, October 30, 2003 : co-located with CCS'03
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2003
Descrizione fisica 1 online resource (93 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Formal Methods in Security Engineering '03 : proceedings of the 2003 Association for Computing Machinery Workshop on Formal Methods in Security Engineering : Washington, District of Columbia, United States of America, October 30, 2003 : co-located with Computer and Communications Security'03
Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering
Record Nr. UNINA-9910375934303321
[Place of publication not identified], : ACM, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings / / edited by Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Bart Preneel
Information Security [[electronic resource] ] : 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings / / edited by Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Bart Preneel
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 548 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Algorithms
Computer communication systems
Special purpose computers
Management information systems
Computer science
Cryptology
Operating Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Special Purpose and Application-Based Systems
Management of Computing and Information Systems
ISBN 3-540-38343-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation -- Privacy and Anonymity -- Low Latency Anonymity with Mix Rings -- Breaking Four Mix-Related Schemes Based on Universal Re-encryption -- Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy -- Protecting Data Privacy Through Hard-to-Reverse Negative Databases -- Block Ciphers and Hash Functions -- Related-Key Rectangle Attack on 42-Round SHACAL-2 -- On the Collision Resistance of RIPEMD-160 -- Digital Signatures -- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption -- Multi-party Concurrent Signatures -- Formal Security Model of Multisignatures -- Cryptanalysis of Variants of UOV -- Stream Ciphers -- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles -- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s -- Encryption I -- A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice -- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search -- Collusion-Free Policy-Based Encryption -- Pervasive Computing -- Using Multiple Smart Cards for Signing Messages at Malicious Terminals -- Diverging Keys in Wireless Sensor Networks -- Encryption II -- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption -- Transparent Image Encryption Using Progressive JPEG -- Network Security -- Preserving TCP Connections Across Host Address Changes -- A Security Architecture for Protecting LAN Interactions -- Simulation of Internet DDoS Attacks and Defense -- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr -- Watermarking and DRM -- Rights Protection for Data Cubes -- An Efficient Probabilistic Packet Marking Scheme (NOD-PPM) -- Intrusion Detection and Worms -- Resistance Analysis to Intruders’ Evasion of Detecting Intrusion -- A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks -- Anomaly Intrusion Detection Based on Clustering a Data Stream -- Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation -- Key Exchange -- An Authentication and Key Exchange Protocol for Secure Credential Services -- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders -- Security Protocols and Formal Methods -- Formalising Receipt-Freeness -- Enhancing the Security and Efficiency of 3-D Secure -- Designing and Verifying Core Protocols for Location Privacy -- Information Systems Security -- Delegation in a Distributed Healthcare Context: A Survey of Current Approaches -- Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness.
Record Nr. UNISA-996466144403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui