Data Privacy Management, Cryptocurrencies and Blockchain Technology [[electronic resource] ] : ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26–27, 2019, Proceedings / / edited by Cristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov, Joaquin Garcia-Alfaro |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XV, 400 p. 636 illus., 62 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data mining Computers and civilization Systems and Data Security Security Services Data Mining and Knowledge Discovery Computers and Society |
ISBN | 3-030-31500-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | DPM Workshop: Privacy Preserving Data Analysis -- Pinfer: Privacy-Preserving Inference -- Integral Privacy Compliant Statistics Computation -- Towards Data Anonymization in Data Mining via Meta-Heuristic Approaches -- Skiplist Timing Attack Vulnerability -- DPM Workshop: Field/Lab Studies -- A Study on Subject Data Access in Online Advertising after the GDPR -- On Privacy Risks of Public WiFi Captive Portals -- User Perceptions of Security and Usability of Mobile-based Single Password Authentication and Two-Factor Authentication -- DPM Workshop: Privacy by Design and Data Anonymization -- Graph perturbation as noise graph addition: a new perspective for graph anonymization -- Towards Minimising Timestamp Usage in Application Software -- Card-based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations -- CBT Workshop: Lightning Networks and Level 2 -- TEE-Based Distributed Watchtowers for Fraud Protection in the Lightning Network -- Payment Networks as Creation Games -- An Efficient Micropayment Channel on Ethereum -- Extending Atomic Cross-Chain Swaps -- CBT Workshop: Smart Contracts and Applications -- A minimal core calculus for Solidity contracts -- Multi-Stage Contracts in the UTXO Model -- The Operational Cost of Ethereum Airdrops -- Blockchain Driven Platform for Energy Distribution in a Microgrid -- Practical Mutation Testing for Smart Contracts -- CBT Workshop: Payment Systems, Privacy and Mining -- Online Payment Network Design -- A Multi-Protocol Payment System to Facilitate Financial Inclusion -- Simulation Extractability in Groth's zk-SNARK -- Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts -- Bonded Mining: Difficulty Adjustment by Miner Commitment -- 12 Angry Miners. |
Record Nr. | UNISA-996466294403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26–27, 2019, Proceedings / / edited by Cristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov, Joaquin Garcia-Alfaro |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XV, 400 p. 636 illus., 62 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data mining Computers and civilization Systems and Data Security Security Services Data Mining and Knowledge Discovery Computers and Society |
ISBN | 3-030-31500-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | DPM Workshop: Privacy Preserving Data Analysis -- Pinfer: Privacy-Preserving Inference -- Integral Privacy Compliant Statistics Computation -- Towards Data Anonymization in Data Mining via Meta-Heuristic Approaches -- Skiplist Timing Attack Vulnerability -- DPM Workshop: Field/Lab Studies -- A Study on Subject Data Access in Online Advertising after the GDPR -- On Privacy Risks of Public WiFi Captive Portals -- User Perceptions of Security and Usability of Mobile-based Single Password Authentication and Two-Factor Authentication -- DPM Workshop: Privacy by Design and Data Anonymization -- Graph perturbation as noise graph addition: a new perspective for graph anonymization -- Towards Minimising Timestamp Usage in Application Software -- Card-based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations -- CBT Workshop: Lightning Networks and Level 2 -- TEE-Based Distributed Watchtowers for Fraud Protection in the Lightning Network -- Payment Networks as Creation Games -- An Efficient Micropayment Channel on Ethereum -- Extending Atomic Cross-Chain Swaps -- CBT Workshop: Smart Contracts and Applications -- A minimal core calculus for Solidity contracts -- Multi-Stage Contracts in the UTXO Model -- The Operational Cost of Ethereum Airdrops -- Blockchain Driven Platform for Energy Distribution in a Microgrid -- Practical Mutation Testing for Smart Contracts -- CBT Workshop: Payment Systems, Privacy and Mining -- Online Payment Network Design -- A Multi-Protocol Payment System to Facilitate Financial Inclusion -- Simulation Extractability in Groth's zk-SNARK -- Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts -- Bonded Mining: Difficulty Adjustment by Miner Commitment -- 12 Angry Miners. |
Record Nr. | UNINA-9910349280303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers / / Alex Biryukov, editor |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (XI, 470 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers - Access control
Data encryption (Computer science) |
ISBN | 3-540-74619-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hash Function Cryptanalysis and Design (I) -- Producing Collisions for Panama, Instantaneously -- Cryptanalysis of FORK-256 -- The Grindahl Hash Functions -- Stream Ciphers Cryptanalysis (I) -- Overtaking VEST -- Cryptanalysis of Achterbahn-128/80 -- Differential-Linear Attacks Against the Stream Cipher Phelix -- Theory -- How to Enrich the Message Space of a Cipher -- Security Analysis of Constructions Combining FIL Random Oracles -- Bad and Good Ways of Post-processing Biased Physical Random Numbers -- Fast Talks: Block Cipher Cryptanalysis -- Improved Slide Attacks -- A New Class of Weak Keys for Blowfish -- Fast Talks: Block Cipher Design -- The 128-Bit Blockcipher CLEFIA (Extended Abstract) -- New Lightweight DES Variants -- Block Cipher Cryptanalysis -- A New Attack on 6-Round IDEA -- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 -- An Analysis of XSL Applied to BES -- Stream Cipher Cryptanalysis (II) -- On the Security of IV Dependent Stream Ciphers -- Two General Attacks on Pomaranch-Like Keystream Generators -- Analysis of QUAD -- Cryptanalysis of Hash Functions (II) -- Message Freedom in MD4 and MD5 Collisions: Application to APOP -- New Message Difference for MD4 -- Algebraic Cryptanalysis of 58-Round SHA-1 -- Theory of Stream Ciphers -- Algebraic Immunity of S-Boxes and Augmented Functions -- Generalized Correlation Analysis of Vectorial Boolean Functions -- Side Channel Attacks -- An Analytical Model for Time-Driven Cache Attacks -- MACs and Small Block Ciphers -- Improving the Security of MACs Via Randomized Message Preprocessing -- New Bounds for PMAC, TMAC, and XCBC -- Perfect Block Ciphers with Small Blocks. |
Record Nr. | UNINA-9910483346803321 |
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers / / Alex Biryukov, editor |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (XI, 470 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers - Access control
Data encryption (Computer science) |
ISBN | 3-540-74619-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hash Function Cryptanalysis and Design (I) -- Producing Collisions for Panama, Instantaneously -- Cryptanalysis of FORK-256 -- The Grindahl Hash Functions -- Stream Ciphers Cryptanalysis (I) -- Overtaking VEST -- Cryptanalysis of Achterbahn-128/80 -- Differential-Linear Attacks Against the Stream Cipher Phelix -- Theory -- How to Enrich the Message Space of a Cipher -- Security Analysis of Constructions Combining FIL Random Oracles -- Bad and Good Ways of Post-processing Biased Physical Random Numbers -- Fast Talks: Block Cipher Cryptanalysis -- Improved Slide Attacks -- A New Class of Weak Keys for Blowfish -- Fast Talks: Block Cipher Design -- The 128-Bit Blockcipher CLEFIA (Extended Abstract) -- New Lightweight DES Variants -- Block Cipher Cryptanalysis -- A New Attack on 6-Round IDEA -- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 -- An Analysis of XSL Applied to BES -- Stream Cipher Cryptanalysis (II) -- On the Security of IV Dependent Stream Ciphers -- Two General Attacks on Pomaranch-Like Keystream Generators -- Analysis of QUAD -- Cryptanalysis of Hash Functions (II) -- Message Freedom in MD4 and MD5 Collisions: Application to APOP -- New Message Difference for MD4 -- Algebraic Cryptanalysis of 58-Round SHA-1 -- Theory of Stream Ciphers -- Algebraic Immunity of S-Boxes and Augmented Functions -- Generalized Correlation Analysis of Vectorial Boolean Functions -- Side Channel Attacks -- An Analytical Model for Time-Driven Cache Attacks -- MACs and Small Block Ciphers -- Improving the Security of MACs Via Randomized Message Preprocessing -- New Bounds for PMAC, TMAC, and XCBC -- Perfect Block Ciphers with Small Blocks. |
Record Nr. | UNISA-996465945203316 |
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Progress in Cryptology -- INDOCRYPT 2015 [[electronic resource] ] : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings / / edited by Alex Biryukov, Vipul Goyal |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XX, 371 p. 53 illus. in color.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Algorithms Computer science—Mathematics Cryptology Systems and Data Security Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science |
ISBN | 3-319-26617-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public key encryption -- Cryptanalysis -- Side channel attacks -- Information theoretic cryptography -- Lightweight cryptography. |
Record Nr. | UNISA-996466216903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Progress in Cryptology -- INDOCRYPT 2015 : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings / / edited by Alex Biryukov, Vipul Goyal |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XX, 371 p. 53 illus. in color.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Algorithms Computer science—Mathematics Cryptology Systems and Data Security Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science |
ISBN | 3-319-26617-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public key encryption -- Cryptanalysis -- Side channel attacks -- Information theoretic cryptography -- Lightweight cryptography. |
Record Nr. | UNINA-9910483640103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Selected Areas in Cryptography [[electronic resource] ] : 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers / / edited by Alex Biryukov, Guang Gong, Douglas R. Stinson |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XIII, 411 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Algorithms Computer communication systems Application software Cryptology Operating Systems Algorithm Analysis and Problem Complexity Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-642-19574-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465909403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|