top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information security and privacy : 26th Australasian Conference, ACISP 2021, virtual event, December 1-3, 2021, proceedings / / Joonsang Baek, Sushmita Ruj (editors)
Information security and privacy : 26th Australasian Conference, ACISP 2021, virtual event, December 1-3, 2021, proceedings / / Joonsang Baek, Sushmita Ruj (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (715 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Computers - Access control
Data encryption (Computer science)
ISBN 3-030-90567-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910508445903321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security and privacy : 26th Australasian Conference, ACISP 2021, virtual event, December 1-3, 2021, proceedings / / Joonsang Baek, Sushmita Ruj (editors)
Information security and privacy : 26th Australasian Conference, ACISP 2021, virtual event, December 1-3, 2021, proceedings / / Joonsang Baek, Sushmita Ruj (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (715 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Computers - Access control
Data encryption (Computer science)
ISBN 3-030-90567-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464389003316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Provable Security [[electronic resource] ] : 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings / / edited by Joonsang Baek, Willy Susilo, Jongkil Kim
Provable Security [[electronic resource] ] : 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings / / edited by Joonsang Baek, Willy Susilo, Jongkil Kim
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XI, 424 p. 42 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Computer organization
Data structures (Computer science)
Computers
Cryptology
Software Engineering/Programming and Operating Systems
Computer Systems Organization and Communication Networks
Data Structures and Information Theory
Computing Milieux
ISBN 3-030-01446-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On the Leakage of Corrupted Garbled Circuits -- Location-Proof System Based on Secure Multi-Party Computations -- Verifiable Homomorphic Secret Sharing -- Single Private-Key Generator Security Implies Multiple Private-Key Generators Security -- Secure Outsourcing of Cryptographic Circuits Manufacturing -- On the Hardness of Learning Parity with Noise over Rings -- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme -- Multivariate Encryption Schemes Based on the Constrained MQ Problem -- Token-Based Multi-Input Functional Encryption -- On the CCA2 Security of McEliece in the Standard Model -- Efficient Attribute-Based Encryption with BlackBox Traceability -- A Code-Based Linkable Ring Signature Scheme -- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature -- Digital Signatures from the Middle-Product LWE -- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation -- A Simpler Construction of Identity-Based Ring Signatures from Lattices -- A Generic Construction of Sequential Aggregate MACs from Any MACs -- Length-Preserving Encryption Based on Single-key Tweakable Block Cipher -- Modeling Privacy in WiFi Fingerprinting Indoor Localization -- Security Notions for Cloud Storage and Deduplication -- Forward Secrecy for SPAKE2 -- User-Mediated Authentication Protocols and Unforgeability for Key Collision -- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing -- Signcryption with Quantum Random Oracles -- Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. .
Record Nr. UNISA-996466325403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Provable Security : 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings / / edited by Joonsang Baek, Willy Susilo, Jongkil Kim
Provable Security : 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings / / edited by Joonsang Baek, Willy Susilo, Jongkil Kim
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XI, 424 p. 42 illus.)
Disciplina 005.8
005.82
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Software engineering
Computer engineering
Computer networks
Data structures (Computer science)
Information theory
Computers
Cryptology
Software Engineering
Computer Engineering and Networks
Data Structures and Information Theory
Computing Milieux
ISBN 3-030-01446-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On the Leakage of Corrupted Garbled Circuits -- Location-Proof System Based on Secure Multi-Party Computations -- Verifiable Homomorphic Secret Sharing -- Single Private-Key Generator Security Implies Multiple Private-Key Generators Security -- Secure Outsourcing of Cryptographic Circuits Manufacturing -- On the Hardness of Learning Parity with Noise over Rings -- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme -- Multivariate Encryption Schemes Based on the Constrained MQ Problem -- Token-Based Multi-Input Functional Encryption -- On the CCA2 Security of McEliece in the Standard Model -- Efficient Attribute-Based Encryption with BlackBox Traceability -- A Code-Based Linkable Ring Signature Scheme -- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature -- Digital Signatures from the Middle-Product LWE -- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation -- A Simpler Construction of Identity-Based Ring Signatures from Lattices -- A Generic Construction of Sequential Aggregate MACs from Any MACs -- Length-Preserving Encryption Based on Single-key Tweakable Block Cipher -- Modeling Privacy in WiFi Fingerprinting Indoor Localization -- Security Notions for Cloud Storage and Deduplication -- Forward Secrecy for SPAKE2 -- User-Mediated Authentication Protocols and Unforgeability for Key Collision -- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing -- Signcryption with Quantum Random Oracles -- Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. .
Record Nr. UNINA-9910349399903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui