top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data Privacy Management, Cryptocurrencies and Blockchain Technology [[electronic resource] ] : ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26–27, 2019, Proceedings / / edited by Cristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov, Joaquin Garcia-Alfaro
Data Privacy Management, Cryptocurrencies and Blockchain Technology [[electronic resource] ] : ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26–27, 2019, Proceedings / / edited by Cristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov, Joaquin Garcia-Alfaro
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 400 p. 636 illus., 62 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data mining
Computers and civilization
Systems and Data Security
Security Services
Data Mining and Knowledge Discovery
Computers and Society
ISBN 3-030-31500-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto DPM Workshop: Privacy Preserving Data Analysis -- Pinfer: Privacy-Preserving Inference -- Integral Privacy Compliant Statistics Computation -- Towards Data Anonymization in Data Mining via Meta-Heuristic Approaches -- Skiplist Timing Attack Vulnerability -- DPM Workshop: Field/Lab Studies -- A Study on Subject Data Access in Online Advertising after the GDPR -- On Privacy Risks of Public WiFi Captive Portals -- User Perceptions of Security and Usability of Mobile-based Single Password Authentication and Two-Factor Authentication -- DPM Workshop: Privacy by Design and Data Anonymization -- Graph perturbation as noise graph addition: a new perspective for graph anonymization -- Towards Minimising Timestamp Usage in Application Software -- Card-based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations -- CBT Workshop: Lightning Networks and Level 2 -- TEE-Based Distributed Watchtowers for Fraud Protection in the Lightning Network -- Payment Networks as Creation Games -- An Efficient Micropayment Channel on Ethereum -- Extending Atomic Cross-Chain Swaps -- CBT Workshop: Smart Contracts and Applications -- A minimal core calculus for Solidity contracts -- Multi-Stage Contracts in the UTXO Model -- The Operational Cost of Ethereum Airdrops -- Blockchain Driven Platform for Energy Distribution in a Microgrid -- Practical Mutation Testing for Smart Contracts -- CBT Workshop: Payment Systems, Privacy and Mining -- Online Payment Network Design -- A Multi-Protocol Payment System to Facilitate Financial Inclusion -- Simulation Extractability in Groth's zk-SNARK -- Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts -- Bonded Mining: Difficulty Adjustment by Miner Commitment -- 12 Angry Miners.
Record Nr. UNISA-996466294403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26–27, 2019, Proceedings / / edited by Cristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov, Joaquin Garcia-Alfaro
Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26–27, 2019, Proceedings / / edited by Cristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov, Joaquin Garcia-Alfaro
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 400 p. 636 illus., 62 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data mining
Computers and civilization
Systems and Data Security
Security Services
Data Mining and Knowledge Discovery
Computers and Society
ISBN 3-030-31500-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto DPM Workshop: Privacy Preserving Data Analysis -- Pinfer: Privacy-Preserving Inference -- Integral Privacy Compliant Statistics Computation -- Towards Data Anonymization in Data Mining via Meta-Heuristic Approaches -- Skiplist Timing Attack Vulnerability -- DPM Workshop: Field/Lab Studies -- A Study on Subject Data Access in Online Advertising after the GDPR -- On Privacy Risks of Public WiFi Captive Portals -- User Perceptions of Security and Usability of Mobile-based Single Password Authentication and Two-Factor Authentication -- DPM Workshop: Privacy by Design and Data Anonymization -- Graph perturbation as noise graph addition: a new perspective for graph anonymization -- Towards Minimising Timestamp Usage in Application Software -- Card-based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations -- CBT Workshop: Lightning Networks and Level 2 -- TEE-Based Distributed Watchtowers for Fraud Protection in the Lightning Network -- Payment Networks as Creation Games -- An Efficient Micropayment Channel on Ethereum -- Extending Atomic Cross-Chain Swaps -- CBT Workshop: Smart Contracts and Applications -- A minimal core calculus for Solidity contracts -- Multi-Stage Contracts in the UTXO Model -- The Operational Cost of Ethereum Airdrops -- Blockchain Driven Platform for Energy Distribution in a Microgrid -- Practical Mutation Testing for Smart Contracts -- CBT Workshop: Payment Systems, Privacy and Mining -- Online Payment Network Design -- A Multi-Protocol Payment System to Facilitate Financial Inclusion -- Simulation Extractability in Groth's zk-SNARK -- Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts -- Bonded Mining: Difficulty Adjustment by Miner Commitment -- 12 Angry Miners.
Record Nr. UNINA-9910349280303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers / / Alex Biryukov, editor
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers / / Alex Biryukov, editor
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (XI, 470 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computers - Access control
Data encryption (Computer science)
ISBN 3-540-74619-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash Function Cryptanalysis and Design (I) -- Producing Collisions for Panama, Instantaneously -- Cryptanalysis of FORK-256 -- The Grindahl Hash Functions -- Stream Ciphers Cryptanalysis (I) -- Overtaking VEST -- Cryptanalysis of Achterbahn-128/80 -- Differential-Linear Attacks Against the Stream Cipher Phelix -- Theory -- How to Enrich the Message Space of a Cipher -- Security Analysis of Constructions Combining FIL Random Oracles -- Bad and Good Ways of Post-processing Biased Physical Random Numbers -- Fast Talks: Block Cipher Cryptanalysis -- Improved Slide Attacks -- A New Class of Weak Keys for Blowfish -- Fast Talks: Block Cipher Design -- The 128-Bit Blockcipher CLEFIA (Extended Abstract) -- New Lightweight DES Variants -- Block Cipher Cryptanalysis -- A New Attack on 6-Round IDEA -- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 -- An Analysis of XSL Applied to BES -- Stream Cipher Cryptanalysis (II) -- On the Security of IV Dependent Stream Ciphers -- Two General Attacks on Pomaranch-Like Keystream Generators -- Analysis of QUAD -- Cryptanalysis of Hash Functions (II) -- Message Freedom in MD4 and MD5 Collisions: Application to APOP -- New Message Difference for MD4 -- Algebraic Cryptanalysis of 58-Round SHA-1 -- Theory of Stream Ciphers -- Algebraic Immunity of S-Boxes and Augmented Functions -- Generalized Correlation Analysis of Vectorial Boolean Functions -- Side Channel Attacks -- An Analytical Model for Time-Driven Cache Attacks -- MACs and Small Block Ciphers -- Improving the Security of MACs Via Randomized Message Preprocessing -- New Bounds for PMAC, TMAC, and XCBC -- Perfect Block Ciphers with Small Blocks.
Record Nr. UNINA-9910483346803321
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers / / Alex Biryukov, editor
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers / / Alex Biryukov, editor
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (XI, 470 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computers - Access control
Data encryption (Computer science)
ISBN 3-540-74619-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash Function Cryptanalysis and Design (I) -- Producing Collisions for Panama, Instantaneously -- Cryptanalysis of FORK-256 -- The Grindahl Hash Functions -- Stream Ciphers Cryptanalysis (I) -- Overtaking VEST -- Cryptanalysis of Achterbahn-128/80 -- Differential-Linear Attacks Against the Stream Cipher Phelix -- Theory -- How to Enrich the Message Space of a Cipher -- Security Analysis of Constructions Combining FIL Random Oracles -- Bad and Good Ways of Post-processing Biased Physical Random Numbers -- Fast Talks: Block Cipher Cryptanalysis -- Improved Slide Attacks -- A New Class of Weak Keys for Blowfish -- Fast Talks: Block Cipher Design -- The 128-Bit Blockcipher CLEFIA (Extended Abstract) -- New Lightweight DES Variants -- Block Cipher Cryptanalysis -- A New Attack on 6-Round IDEA -- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 -- An Analysis of XSL Applied to BES -- Stream Cipher Cryptanalysis (II) -- On the Security of IV Dependent Stream Ciphers -- Two General Attacks on Pomaranch-Like Keystream Generators -- Analysis of QUAD -- Cryptanalysis of Hash Functions (II) -- Message Freedom in MD4 and MD5 Collisions: Application to APOP -- New Message Difference for MD4 -- Algebraic Cryptanalysis of 58-Round SHA-1 -- Theory of Stream Ciphers -- Algebraic Immunity of S-Boxes and Augmented Functions -- Generalized Correlation Analysis of Vectorial Boolean Functions -- Side Channel Attacks -- An Analytical Model for Time-Driven Cache Attacks -- MACs and Small Block Ciphers -- Improving the Security of MACs Via Randomized Message Preprocessing -- New Bounds for PMAC, TMAC, and XCBC -- Perfect Block Ciphers with Small Blocks.
Record Nr. UNISA-996465945203316
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology -- INDOCRYPT 2015 [[electronic resource] ] : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings / / edited by Alex Biryukov, Vipul Goyal
Progress in Cryptology -- INDOCRYPT 2015 [[electronic resource] ] : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings / / edited by Alex Biryukov, Vipul Goyal
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XX, 371 p. 53 illus. in color.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computer science—Mathematics
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-319-26617-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public key encryption -- Cryptanalysis -- Side channel attacks -- Information theoretic cryptography -- Lightweight cryptography.
Record Nr. UNISA-996466216903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology -- INDOCRYPT 2015 : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings / / edited by Alex Biryukov, Vipul Goyal
Progress in Cryptology -- INDOCRYPT 2015 : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings / / edited by Alex Biryukov, Vipul Goyal
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XX, 371 p. 53 illus. in color.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computer science—Mathematics
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-319-26617-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public key encryption -- Cryptanalysis -- Side channel attacks -- Information theoretic cryptography -- Lightweight cryptography.
Record Nr. UNINA-9910483640103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected Areas in Cryptography [[electronic resource] ] : 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers / / edited by Alex Biryukov, Guang Gong, Douglas R. Stinson
Selected Areas in Cryptography [[electronic resource] ] : 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers / / edited by Alex Biryukov, Guang Gong, Douglas R. Stinson
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIII, 411 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Algorithms
Computer communication systems
Application software
Cryptology
Operating Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-642-19574-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465909403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui