top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology – EUROCRYPT 2004 [[electronic resource] ] : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings / / edited by Christian Cachin, Jan Camenisch
Advances in Cryptology – EUROCRYPT 2004 [[electronic resource] ] : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings / / edited by Christian Cachin, Jan Camenisch
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 630 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computer science—Mathematics
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
ISBN 1-280-30737-4
9786610307371
3-540-24676-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Private Computation -- Efficient Private Matching and Set Intersection -- Positive Results and Techniques for Obfuscation -- Secure Computation of the k th -Ranked Element -- Signatures I -- Short Signatures Without Random Oracles -- Sequential Aggregate Signatures from Trapdoor Permutations -- Unconditional Security -- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission -- The Exact Price for Unconditionally Secure Asymmetric Cryptography -- On Generating the Initial Key in the Bounded-Storage Model -- Distributed Cryptography -- Practical Large-Scale Distributed Key Generation -- Optimal Communication Complexity of Generic Multicast Key Distribution -- Foundations I -- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem -- Black-Box Composition Does Not Imply Adaptive Security -- Identity-Based Encryption -- Chosen-Ciphertext Security from Identity-Based Encryption -- Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles -- Elliptic Curves -- Construction of Secure Random Curves of Genus 2 over Prime Fields -- Projective Coordinates Leak -- Signatures II -- Security Proofs for Identity-Based Identification and Signature Schemes -- Concurrent Signatures -- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures -- Public-Key Cryptography -- Public-Key Steganography -- Immunizing Encryption Schemes from Decryption Errors -- Secure Hashed Diffie-Hellman over Non-DDH Groups -- Foundations II -- On Simulation-Sound Trapdoor Commitments -- Hash Function Balance and Its Impact on Birthday Attacks -- Multiparty Computation -- Multi-party Computation with Hybrid Security -- On the Hardness of Information-Theoretic Multiparty Computation -- Dining Cryptographers Revisited -- Cryptanalysis -- Algebraic Attacks and Decomposition of Boolean Functions -- Finding Small Roots of Bivariate Integer Polynomial Equations Revisited -- New Applications -- Public Key Encryption with Keyword Search -- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data -- Algorithms and Implementation -- Merkle Tree Traversal in Log Space and Time -- Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3 -- Anonymity -- Traceable Signatures -- Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme -- Anonymous Identification in Ad Hoc Groups.
Record Nr. UNISA-996465405503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings / / edited by Christian Cachin, Jan Camenisch
Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings / / edited by Christian Cachin, Jan Camenisch
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 630 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Algorithms
Computer science - Mathematics
Discrete mathematics
Electronic data processing - Management
Cryptology
Computer Communication Networks
Operating Systems
Discrete Mathematics in Computer Science
IT Operations
ISBN 1-280-30737-4
9786610307371
3-540-24676-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Private Computation -- Efficient Private Matching and Set Intersection -- Positive Results and Techniques for Obfuscation -- Secure Computation of the k th -Ranked Element -- Signatures I -- Short Signatures Without Random Oracles -- Sequential Aggregate Signatures from Trapdoor Permutations -- Unconditional Security -- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission -- The Exact Price for Unconditionally Secure Asymmetric Cryptography -- On Generating the Initial Key in the Bounded-Storage Model -- Distributed Cryptography -- Practical Large-Scale Distributed Key Generation -- Optimal Communication Complexity of Generic Multicast Key Distribution -- Foundations I -- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem -- Black-Box Composition Does Not Imply Adaptive Security -- Identity-Based Encryption -- Chosen-Ciphertext Security from Identity-Based Encryption -- Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles -- Elliptic Curves -- Construction of Secure Random Curves of Genus 2 over Prime Fields -- Projective Coordinates Leak -- Signatures II -- Security Proofs for Identity-Based Identification and Signature Schemes -- Concurrent Signatures -- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures -- Public-Key Cryptography -- Public-Key Steganography -- Immunizing Encryption Schemes from Decryption Errors -- Secure Hashed Diffie-Hellman over Non-DDH Groups -- Foundations II -- On Simulation-Sound Trapdoor Commitments -- Hash Function Balance and Its Impact on Birthday Attacks -- Multiparty Computation -- Multi-party Computation with Hybrid Security -- On the Hardness of Information-Theoretic Multiparty Computation -- Dining Cryptographers Revisited -- Cryptanalysis -- Algebraic Attacks and Decomposition of Boolean Functions -- Finding Small Roots of Bivariate Integer Polynomial Equations Revisited -- New Applications -- Public Key Encryption with Keyword Search -- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data -- Algorithms and Implementation -- Merkle Tree Traversal in Log Space and Time -- Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3 -- Anonymity -- Traceable Signatures -- Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme -- Anonymous Identification in Ad Hoc Groups.
Record Nr. UNINA-9910144186503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Attribute-based Credentials for Trust : Identity in the Information Society / / edited by Kai Rannenberg, Jan Camenisch, Ahmad Sabouri
Attribute-based Credentials for Trust : Identity in the Information Society / / edited by Kai Rannenberg, Jan Camenisch, Ahmad Sabouri
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (395 p.)
Disciplina 005.8
005.82
330
343099
Soggetto topico Information technology
Business—Data processing
Computer security
Mass media
Law
Data encryption (Computer science)
E-commerce
IT in Business
Systems and Data Security
IT Law, Media Law, Intellectual Property
Cryptology
e-Commerce/e-business
ISBN 3-319-14439-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Architecture for Application Developers -- Architecture for Crypto Developers -- Comparison -- The Soederhamn Pilot -- The Patras Pilot -- Experiences and Feedback from the Pilots -- Annexes.
Record Nr. UNINA-9910298492003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptology and Network Security [[electronic resource] ] : 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings / / edited by Jan Camenisch, Panos Papadimitratos
Cryptology and Network Security [[electronic resource] ] : 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings / / edited by Jan Camenisch, Panos Papadimitratos
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIII, 518 p. 114 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Computer communication systems
Computers and civilization
Computers
Cryptology
Software Engineering/Programming and Operating Systems
Computer Communication Networks
Computers and Society
Information Systems and Communication Service
ISBN 3-030-00434-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy -- Internet misbehavior and protection -- Malware -- Symmetric key cryptography -- Signatures -- Cryptanalysis -- Cryptographic primitives -- Cryptographic protocols.
Record Nr. UNISA-996466194103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptology and Network Security : 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings / / edited by Jan Camenisch, Panos Papadimitratos
Cryptology and Network Security : 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings / / edited by Jan Camenisch, Panos Papadimitratos
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIII, 518 p. 114 illus.)
Disciplina 005.82
005.824
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Computer communication systems
Computers and civilization
Computers
Cryptology
Software Engineering/Programming and Operating Systems
Computer Communication Networks
Computers and Society
Information Systems and Communication Service
ISBN 3-030-00434-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy -- Internet misbehavior and protection -- Malware -- Symmetric key cryptography -- Signatures -- Cryptanalysis -- Cryptographic primitives -- Cryptographic protocols.
Record Nr. UNINA-9910349404703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Privacy [[electronic resource] ] : PRIME - Privacy and Identity Management for Europe / / edited by Jan Camenisch, Ronald Leenes, Dieter Sommer
Digital Privacy [[electronic resource] ] : PRIME - Privacy and Identity Management for Europe / / edited by Jan Camenisch, Ronald Leenes, Dieter Sommer
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (800 p. 105 illus., 58 illus. in color.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computers and civilization
Management information systems
Computer science
Application software
Computers
Data encryption (Computer science)
Computers and Society
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Models and Principles
Computer Appl. in Administrative Data Processing
Cryptology
ISBN 3-642-19050-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I Privacy and Identity Management -- An Introduction to Privacy-Enhancing Identity Management -- Part II Setting the Stage -- The Identity Landscape -- The Need for Privacy-Enhancing Identity Management -- Regulating Identity Management -- User-Centric Privacy-Enhancing Identity Management -- Privacy-Enhancing Identity Management in Business -- Part III What Technology Can Do for Privacy and How -- Introduction: Privacy, Trust, and Identity Management -- Architecture -- Pseudonyms and Private Credentials -- Privacy Models and Languages: Access Control and Data -- Privacy Models and Languages: Obligation Policies -- Privacy Models and Languages: Assurance Checking -- Privacy-Aware Access Control System -- Privacy-Aware Identity Lifecycle Management -- Privacy Assurance Checking -- Security/Trustworthiness Assessment of Platforms -- Further Privacy Mechanisms -- Reputation Management -- Human-Computer Interaction -- Technology Assurance -- Multilateral Interactions -- Part IV PRIME Applied -- Collaborative E-Learning -- Location-Based Services -- e-Health -- Airport Security Controls -- Privacy and Identity Management Requirements -- Part V Conclusion and Outlook.
Record Nr. UNISA-996465901803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information hiding : 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers / / Jan Leonhard Camenisch [and four others], editors
Information hiding : 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers / / Jan Leonhard Camenisch [and four others], editors
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer Verlag, , [2007]
Descrizione fisica 1 online resource (VIII, 392 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Data protection - Security measures
ISBN 3-540-74124-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hamiltonian Mechanics -- Natural Watermarking: A Secure Spread Spectrum Technique for WOA -- An Improved Asymmetric Watermarking System Using Matrix Embedding -- A Cryptographic Method for Secure Watermark Detection -- Steganographic Communication in Ordered Channels -- Analyzing Network-Aware Active Wardens in IPv6 -- Video Watermarking by Using Geometic Warping Without Visible Artifacts -- Video Watermarking by Using Geometric Warping Without Visible Artifacts -- Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain -- Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens -- Noisy Timing Channels with Binary Inputs and Outputs -- A Computational Model for Watermark Robustness -- Hiding Information Hiding -- Reversible Watermarking of NURBS-Based CAD Models -- A High-Capacity Data Hiding Method for Polygonal Meshes -- Steganography for Radio Amateurs— A DSSS Based Approach for Slow Scan Television -- Delayed and Controlled Failures in Tamper-Resistant Software -- A Model for Self-Modifying Code -- A Markov Process Based Approach to Effective Attacking JPEG Steganography -- Batch Steganography and Pooled Steganalysis -- On Steganographic Embedding Efficiency -- Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks -- Modified Matrix Encoding Technique for Minimal Distortion Steganography -- Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting -- A Collusion-Resistant Video Watermarking Scheme -- An Elliptic Curve Backdoor Algorithm for RSASSA -- A Subliminal-Free Variant of ECDSA.
Record Nr. UNINA-9910483535403321
Berlin ; ; Heidelberg : , : Springer Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information hiding : 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers / / Jan Leonhard Camenisch [and four others], editors
Information hiding : 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 ; revised selected papers / / Jan Leonhard Camenisch [and four others], editors
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer Verlag, , [2007]
Descrizione fisica 1 online resource (VIII, 392 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Data protection - Security measures
ISBN 3-540-74124-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hamiltonian Mechanics -- Natural Watermarking: A Secure Spread Spectrum Technique for WOA -- An Improved Asymmetric Watermarking System Using Matrix Embedding -- A Cryptographic Method for Secure Watermark Detection -- Steganographic Communication in Ordered Channels -- Analyzing Network-Aware Active Wardens in IPv6 -- Video Watermarking by Using Geometic Warping Without Visible Artifacts -- Video Watermarking by Using Geometric Warping Without Visible Artifacts -- Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain -- Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens -- Noisy Timing Channels with Binary Inputs and Outputs -- A Computational Model for Watermark Robustness -- Hiding Information Hiding -- Reversible Watermarking of NURBS-Based CAD Models -- A High-Capacity Data Hiding Method for Polygonal Meshes -- Steganography for Radio Amateurs— A DSSS Based Approach for Slow Scan Television -- Delayed and Controlled Failures in Tamper-Resistant Software -- A Model for Self-Modifying Code -- A Markov Process Based Approach to Effective Attacking JPEG Steganography -- Batch Steganography and Pooled Steganalysis -- On Steganographic Embedding Efficiency -- Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks -- Modified Matrix Encoding Technique for Minimal Distortion Steganography -- Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting -- A Collusion-Resistant Video Watermarking Scheme -- An Elliptic Curve Backdoor Algorithm for RSASSA -- A Subliminal-Free Variant of ECDSA.
Record Nr. UNISA-996465854803316
Berlin ; ; Heidelberg : , : Springer Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings / / edited by Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
Information Security [[electronic resource] ] : 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings / / edited by Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 570 p. 95 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Special purpose computers
Computers and civilization
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
Math Applications in Computer Science
Special Purpose and Application-Based Systems
Computers and Society
ISBN 3-319-13257-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs and Arguments -- Outsourced and Multi-party Computations -- Implementation -- Information Leakage -- Firewall and Forensics -- Web Security -- Android Security.
Record Nr. UNISA-996210526603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security : 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings / / edited by Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
Information Security : 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings / / edited by Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 570 p. 95 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Special purpose computers
Computers and civilization
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
Math Applications in Computer Science
Special Purpose and Application-Based Systems
Computers and Society
ISBN 3-319-13257-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs and Arguments -- Outsourced and Multi-party Computations -- Implementation -- Information Leakage -- Firewall and Forensics -- Web Security -- Android Security.
Record Nr. UNINA-9910483890103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui