Advances in Cryptology – EUROCRYPT 2004 [[electronic resource] ] : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings / / edited by Christian Cachin, Jan Camenisch |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XII, 630 p.) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Algorithms Computer science—Mathematics Management information systems Computer science Cryptology Computer Communication Networks Operating Systems Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science Management of Computing and Information Systems |
ISBN |
1-280-30737-4
9786610307371 3-540-24676-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Private Computation -- Efficient Private Matching and Set Intersection -- Positive Results and Techniques for Obfuscation -- Secure Computation of the k th -Ranked Element -- Signatures I -- Short Signatures Without Random Oracles -- Sequential Aggregate Signatures from Trapdoor Permutations -- Unconditional Security -- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission -- The Exact Price for Unconditionally Secure Asymmetric Cryptography -- On Generating the Initial Key in the Bounded-Storage Model -- Distributed Cryptography -- Practical Large-Scale Distributed Key Generation -- Optimal Communication Complexity of Generic Multicast Key Distribution -- Foundations I -- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem -- Black-Box Composition Does Not Imply Adaptive Security -- Identity-Based Encryption -- Chosen-Ciphertext Security from Identity-Based Encryption -- Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles -- Elliptic Curves -- Construction of Secure Random Curves of Genus 2 over Prime Fields -- Projective Coordinates Leak -- Signatures II -- Security Proofs for Identity-Based Identification and Signature Schemes -- Concurrent Signatures -- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures -- Public-Key Cryptography -- Public-Key Steganography -- Immunizing Encryption Schemes from Decryption Errors -- Secure Hashed Diffie-Hellman over Non-DDH Groups -- Foundations II -- On Simulation-Sound Trapdoor Commitments -- Hash Function Balance and Its Impact on Birthday Attacks -- Multiparty Computation -- Multi-party Computation with Hybrid Security -- On the Hardness of Information-Theoretic Multiparty Computation -- Dining Cryptographers Revisited -- Cryptanalysis -- Algebraic Attacks and Decomposition of Boolean Functions -- Finding Small Roots of Bivariate Integer Polynomial Equations Revisited -- New Applications -- Public Key Encryption with Keyword Search -- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data -- Algorithms and Implementation -- Merkle Tree Traversal in Log Space and Time -- Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3 -- Anonymity -- Traceable Signatures -- Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme -- Anonymous Identification in Ad Hoc Groups. |
Record Nr. | UNISA-996465405503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings / / edited by Christian Cachin, Jan Camenisch |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XII, 630 p.) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Operating systems (Computers) Algorithms Computer science - Mathematics Discrete mathematics Electronic data processing - Management Cryptology Computer Communication Networks Operating Systems Discrete Mathematics in Computer Science IT Operations |
ISBN |
1-280-30737-4
9786610307371 3-540-24676-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Private Computation -- Efficient Private Matching and Set Intersection -- Positive Results and Techniques for Obfuscation -- Secure Computation of the k th -Ranked Element -- Signatures I -- Short Signatures Without Random Oracles -- Sequential Aggregate Signatures from Trapdoor Permutations -- Unconditional Security -- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission -- The Exact Price for Unconditionally Secure Asymmetric Cryptography -- On Generating the Initial Key in the Bounded-Storage Model -- Distributed Cryptography -- Practical Large-Scale Distributed Key Generation -- Optimal Communication Complexity of Generic Multicast Key Distribution -- Foundations I -- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem -- Black-Box Composition Does Not Imply Adaptive Security -- Identity-Based Encryption -- Chosen-Ciphertext Security from Identity-Based Encryption -- Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles -- Elliptic Curves -- Construction of Secure Random Curves of Genus 2 over Prime Fields -- Projective Coordinates Leak -- Signatures II -- Security Proofs for Identity-Based Identification and Signature Schemes -- Concurrent Signatures -- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures -- Public-Key Cryptography -- Public-Key Steganography -- Immunizing Encryption Schemes from Decryption Errors -- Secure Hashed Diffie-Hellman over Non-DDH Groups -- Foundations II -- On Simulation-Sound Trapdoor Commitments -- Hash Function Balance and Its Impact on Birthday Attacks -- Multiparty Computation -- Multi-party Computation with Hybrid Security -- On the Hardness of Information-Theoretic Multiparty Computation -- Dining Cryptographers Revisited -- Cryptanalysis -- Algebraic Attacks and Decomposition of Boolean Functions -- Finding Small Roots of Bivariate Integer Polynomial Equations Revisited -- New Applications -- Public Key Encryption with Keyword Search -- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data -- Algorithms and Implementation -- Merkle Tree Traversal in Log Space and Time -- Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3 -- Anonymity -- Traceable Signatures -- Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme -- Anonymous Identification in Ad Hoc Groups. |
Record Nr. | UNINA-9910144186503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Attribute-based Credentials for Trust : Identity in the Information Society / / edited by Kai Rannenberg, Jan Camenisch, Ahmad Sabouri |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (395 p.) |
Disciplina |
005.8
005.82 330 343099 |
Soggetto topico |
Information technology
Business—Data processing Computer security Mass media Law Data encryption (Computer science) E-commerce IT in Business Systems and Data Security IT Law, Media Law, Intellectual Property Cryptology e-Commerce/e-business |
ISBN | 3-319-14439-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Architecture for Application Developers -- Architecture for Crypto Developers -- Comparison -- The Soederhamn Pilot -- The Patras Pilot -- Experiences and Feedback from the Pilots -- Annexes. |
Record Nr. | UNINA-9910298492003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptology and Network Security [[electronic resource] ] : 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings / / edited by Jan Camenisch, Panos Papadimitratos |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIII, 518 p. 114 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Software engineering Computer communication systems Computers and civilization Computers Cryptology Software Engineering/Programming and Operating Systems Computer Communication Networks Computers and Society Information Systems and Communication Service |
ISBN | 3-030-00434-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy -- Internet misbehavior and protection -- Malware -- Symmetric key cryptography -- Signatures -- Cryptanalysis -- Cryptographic primitives -- Cryptographic protocols. |
Record Nr. | UNISA-996466194103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptology and Network Security : 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings / / edited by Jan Camenisch, Panos Papadimitratos |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIII, 518 p. 114 illus.) |
Disciplina |
005.82
005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Software engineering Computer communication systems Computers and civilization Computers Cryptology Software Engineering/Programming and Operating Systems Computer Communication Networks Computers and Society Information Systems and Communication Service |
ISBN | 3-030-00434-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy -- Internet misbehavior and protection -- Malware -- Symmetric key cryptography -- Signatures -- Cryptanalysis -- Cryptographic primitives -- Cryptographic protocols. |
Record Nr. | UNINA-9910349404703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Privacy [[electronic resource] ] : PRIME - Privacy and Identity Management for Europe / / edited by Jan Camenisch, Ronald Leenes, Dieter Sommer |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (800 p. 105 illus., 58 illus. in color.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Computers and civilization
Management information systems Computer science Application software Computers Data encryption (Computer science) Computers and Society Management of Computing and Information Systems Information Systems Applications (incl. Internet) Models and Principles Computer Appl. in Administrative Data Processing Cryptology |
ISBN | 3-642-19050-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I Privacy and Identity Management -- An Introduction to Privacy-Enhancing Identity Management -- Part II Setting the Stage -- The Identity Landscape -- The Need for Privacy-Enhancing Identity Management -- Regulating Identity Management -- User-Centric Privacy-Enhancing Identity Management -- Privacy-Enhancing Identity Management in Business -- Part III What Technology Can Do for Privacy and How -- Introduction: Privacy, Trust, and Identity Management -- Architecture -- Pseudonyms and Private Credentials -- Privacy Models and Languages: Access Control and Data -- Privacy Models and Languages: Obligation Policies -- Privacy Models and Languages: Assurance Checking -- Privacy-Aware Access Control System -- Privacy-Aware Identity Lifecycle Management -- Privacy Assurance Checking -- Security/Trustworthiness Assessment of Platforms -- Further Privacy Mechanisms -- Reputation Management -- Human-Computer Interaction -- Technology Assurance -- Multilateral Interactions -- Part IV PRIME Applied -- Collaborative E-Learning -- Location-Based Services -- e-Health -- Airport Security Controls -- Privacy and Identity Management Requirements -- Part V Conclusion and Outlook. |
Record Nr. | UNISA-996465901803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information hiding : 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers / / Jan Leonhard Camenisch [and four others], editors |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer Verlag, , [2007] |
Descrizione fisica | 1 online resource (VIII, 392 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Data protection - Security measures |
ISBN | 3-540-74124-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hamiltonian Mechanics -- Natural Watermarking: A Secure Spread Spectrum Technique for WOA -- An Improved Asymmetric Watermarking System Using Matrix Embedding -- A Cryptographic Method for Secure Watermark Detection -- Steganographic Communication in Ordered Channels -- Analyzing Network-Aware Active Wardens in IPv6 -- Video Watermarking by Using Geometic Warping Without Visible Artifacts -- Video Watermarking by Using Geometric Warping Without Visible Artifacts -- Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain -- Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens -- Noisy Timing Channels with Binary Inputs and Outputs -- A Computational Model for Watermark Robustness -- Hiding Information Hiding -- Reversible Watermarking of NURBS-Based CAD Models -- A High-Capacity Data Hiding Method for Polygonal Meshes -- Steganography for Radio Amateurs— A DSSS Based Approach for Slow Scan Television -- Delayed and Controlled Failures in Tamper-Resistant Software -- A Model for Self-Modifying Code -- A Markov Process Based Approach to Effective Attacking JPEG Steganography -- Batch Steganography and Pooled Steganalysis -- On Steganographic Embedding Efficiency -- Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks -- Modified Matrix Encoding Technique for Minimal Distortion Steganography -- Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting -- A Collusion-Resistant Video Watermarking Scheme -- An Elliptic Curve Backdoor Algorithm for RSASSA -- A Subliminal-Free Variant of ECDSA. |
Record Nr. | UNINA-9910483535403321 |
Berlin ; ; Heidelberg : , : Springer Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information hiding : 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers / / Jan Leonhard Camenisch [and four others], editors |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer Verlag, , [2007] |
Descrizione fisica | 1 online resource (VIII, 392 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Data protection - Security measures |
ISBN | 3-540-74124-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hamiltonian Mechanics -- Natural Watermarking: A Secure Spread Spectrum Technique for WOA -- An Improved Asymmetric Watermarking System Using Matrix Embedding -- A Cryptographic Method for Secure Watermark Detection -- Steganographic Communication in Ordered Channels -- Analyzing Network-Aware Active Wardens in IPv6 -- Video Watermarking by Using Geometic Warping Without Visible Artifacts -- Video Watermarking by Using Geometric Warping Without Visible Artifacts -- Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain -- Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens -- Noisy Timing Channels with Binary Inputs and Outputs -- A Computational Model for Watermark Robustness -- Hiding Information Hiding -- Reversible Watermarking of NURBS-Based CAD Models -- A High-Capacity Data Hiding Method for Polygonal Meshes -- Steganography for Radio Amateurs— A DSSS Based Approach for Slow Scan Television -- Delayed and Controlled Failures in Tamper-Resistant Software -- A Model for Self-Modifying Code -- A Markov Process Based Approach to Effective Attacking JPEG Steganography -- Batch Steganography and Pooled Steganalysis -- On Steganographic Embedding Efficiency -- Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks -- Modified Matrix Encoding Technique for Minimal Distortion Steganography -- Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting -- A Collusion-Resistant Video Watermarking Scheme -- An Elliptic Curve Backdoor Algorithm for RSASSA -- A Subliminal-Free Variant of ECDSA. |
Record Nr. | UNISA-996465854803316 |
Berlin ; ; Heidelberg : , : Springer Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security [[electronic resource] ] : 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings / / edited by Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 570 p. 95 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Algorithms Computer science—Mathematics Special purpose computers Computers and civilization Systems and Data Security Cryptology Algorithm Analysis and Problem Complexity Math Applications in Computer Science Special Purpose and Application-Based Systems Computers and Society |
ISBN | 3-319-13257-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs and Arguments -- Outsourced and Multi-party Computations -- Implementation -- Information Leakage -- Firewall and Forensics -- Web Security -- Android Security. |
Record Nr. | UNISA-996210526603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security : 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings / / edited by Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 570 p. 95 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Algorithms Computer science—Mathematics Special purpose computers Computers and civilization Systems and Data Security Cryptology Algorithm Analysis and Problem Complexity Math Applications in Computer Science Special Purpose and Application-Based Systems Computers and Society |
ISBN | 3-319-13257-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs and Arguments -- Outsourced and Multi-party Computations -- Implementation -- Information Leakage -- Firewall and Forensics -- Web Security -- Android Security. |
Record Nr. | UNINA-9910483890103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|