top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Innovative Security Solutions for Information Technology and Communications [[electronic resource] ] : 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers / / edited by Ion Bica, Reza Reyhanitabar
Innovative Security Solutions for Information Technology and Communications [[electronic resource] ] : 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers / / edited by Ion Bica, Reza Reyhanitabar
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 287 p. 86 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Information storage and retrieval
Application software
Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Systems and Data Security
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-319-47238-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Circular Security Reconsidered -- Visual Cryptography: Models, Issues, Applications and New Directions -- Paper Tigers: An Endless Fight -- Security of Identity-based Encryption Schemes from Quadratic Residues -- Long-Term Secure One-Round Group Key Establishment from Multilinear Mappings -- RSA Weak Public Keys Available on the Internet -- A Tweak for a PRF Mode of a Compression Function and Its Applications -- May-Ozerov Algorithm for Nearest-Neighbor Problem over mathbb{F}_qandIts Application to Information Set Decoding -- A Cryptographic Approach for Implementing Semantic Web's Trust Layer -- Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret -- Homomorphic Encryption Based On Group Algebras and Goldwasser-Micali Scheme -- Increasing the Robustness of the Montgomery kP-Algorithm against SCA by Modifying its Initialization -- When Pythons Bite -- Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations -- Pushing the Optimization Limits of Ring Oscillator-based True Random Number Generators -- TOR - Didactic Pluggable Transport -- Preparation of SCA Attacks: Successfully Decapsulating BGA Packages -- Comparative Analysis of Security Operations Center Architectures; Proposals and Architectural Considerations for Frameworks and Operating Models -- Secure Transaction Authentication Protocol -- Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing. .
Record Nr. UNISA-996465661303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Innovative Security Solutions for Information Technology and Communications : 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers / / edited by Ion Bica, Reza Reyhanitabar
Innovative Security Solutions for Information Technology and Communications : 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers / / edited by Ion Bica, Reza Reyhanitabar
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 287 p. 86 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Information storage and retrieval
Application software
Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Systems and Data Security
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-319-47238-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Circular Security Reconsidered -- Visual Cryptography: Models, Issues, Applications and New Directions -- Paper Tigers: An Endless Fight -- Security of Identity-based Encryption Schemes from Quadratic Residues -- Long-Term Secure One-Round Group Key Establishment from Multilinear Mappings -- RSA Weak Public Keys Available on the Internet -- A Tweak for a PRF Mode of a Compression Function and Its Applications -- May-Ozerov Algorithm for Nearest-Neighbor Problem over mathbb{F}_qandIts Application to Information Set Decoding -- A Cryptographic Approach for Implementing Semantic Web's Trust Layer -- Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret -- Homomorphic Encryption Based On Group Algebras and Goldwasser-Micali Scheme -- Increasing the Robustness of the Montgomery kP-Algorithm against SCA by Modifying its Initialization -- When Pythons Bite -- Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations -- Pushing the Optimization Limits of Ring Oscillator-based True Random Number Generators -- TOR - Didactic Pluggable Transport -- Preparation of SCA Attacks: Successfully Decapsulating BGA Packages -- Comparative Analysis of Security Operations Center Architectures; Proposals and Architectural Considerations for Frameworks and Operating Models -- Secure Transaction Authentication Protocol -- Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing. .
Record Nr. UNINA-9910484220403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovative Security Solutions for Information Technology and Communications [[electronic resource] ] : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers / / edited by Ion Bica, David Naccache, Emil Simion
Innovative Security Solutions for Information Technology and Communications [[electronic resource] ] : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers / / edited by Ion Bica, David Naccache, Emil Simion
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XXIV, 281 p. 88 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Information storage and retrieval
Application software
Data encryption (Computer science)
Computer communication systems
Algorithms
Systems and Data Security
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
ISBN 3-319-27179-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authenticated-Encryption: Security Notions, Designs and Applications -- New Results on Identity-based Encryption from Quadratic Residuosity -- Efficient techniques for extracting secrets from electronic devices -- Secure and Trusted Application Execution on Embedded Devices -- A Number-Theoretic Error-Correcting Code -- Full duplex OTP cryptosystem based on DNA key for text transmissions -- Evaluation of Lightweight Block Ciphers for Embedded Systems -- SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON -- A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption -- A Novel Key Management for Virtually Limitless Key Size -- Efficient Montgomery Multiplication on GPUs -- Applying Cryptographic Acceleration Techniques to Error Correction -- A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs -- Up-high to Down-low: Applying Machine Learning to an Exploit Database -- Detecting Computers in the Cyber Space Maliciously Exploited as SSH Proxies -- On a Lightweight Authentication Protocol for RFID -- Spam Filtering using Automated Classifying Services Over a Cloud Computing Infrastructure -- Contributions to Steganographic Techniques on Mobile Devices -- Secure implementation of Stream cipher: Trivium -- Fast Searching in Image Databases Using Multi-Hash Robust Fingerprinting.
Record Nr. UNISA-996466227703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Innovative Security Solutions for Information Technology and Communications : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers / / edited by Ion Bica, David Naccache, Emil Simion
Innovative Security Solutions for Information Technology and Communications : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers / / edited by Ion Bica, David Naccache, Emil Simion
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XXIV, 281 p. 88 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Information storage and retrieval
Application software
Data encryption (Computer science)
Computer communication systems
Algorithms
Systems and Data Security
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
ISBN 3-319-27179-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authenticated-Encryption: Security Notions, Designs and Applications -- New Results on Identity-based Encryption from Quadratic Residuosity -- Efficient techniques for extracting secrets from electronic devices -- Secure and Trusted Application Execution on Embedded Devices -- A Number-Theoretic Error-Correcting Code -- Full duplex OTP cryptosystem based on DNA key for text transmissions -- Evaluation of Lightweight Block Ciphers for Embedded Systems -- SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON -- A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption -- A Novel Key Management for Virtually Limitless Key Size -- Efficient Montgomery Multiplication on GPUs -- Applying Cryptographic Acceleration Techniques to Error Correction -- A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs -- Up-high to Down-low: Applying Machine Learning to an Exploit Database -- Detecting Computers in the Cyber Space Maliciously Exploited as SSH Proxies -- On a Lightweight Authentication Protocol for RFID -- Spam Filtering using Automated Classifying Services Over a Cloud Computing Infrastructure -- Contributions to Steganographic Techniques on Mobile Devices -- Secure implementation of Stream cipher: Trivium -- Fast Searching in Image Databases Using Multi-Hash Robust Fingerprinting.
Record Nr. UNINA-9910484003003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui