top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Proceedings of the IFIP TC 11 23rd International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy / / Sushil Jajodia; Pierangela Samarati; Stelvio Cimato
Proceedings of the IFIP TC 11 23rd International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy / / Sushil Jajodia; Pierangela Samarati; Stelvio Cimato
Edizione [1st ed. 2008.]
Pubbl/distr/stampa New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (722 p.)
Disciplina 616.994
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Preleukemia
ISBN 0-387-09699-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hiding in Groups: On the Expressiveness of Privacy Distributions -- Practical Privacy-Preserving Benchmarking -- Enhancing Privacy in Remote Data Classification -- Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators -- Robbing Banks with Their Own Software—an Exploit Against Norwegian Online Banks -- Collaborative architecture for malware detection and analysis -- Realizing Stateful Public Key Encryption in Wireless Sensor Network -- Establishing secure links in low-rate wireless personal area networks -- An Asynchronous Node Replication Attack in Wireless Sensor Networks -- A B Formal Framework for Security Developments in the Domain of Smart Card Applications -- An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies -- Negotiation of Prohibition: An Approach Based on Policy Rewriting -- An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations -- Role Signatures for Access Control in Open Distributed Systems -- Policies and Security Aspects For Distributed Scientific Laboratories -- A Fuzzy Model for the Composition of Intrusion Detectors -- Investigating the problem of IDS false alarms: An experimental study using Snort -- User Session Modeling for Effective Application Intrusion Detection -- A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems -- Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs -- Behavioral Intrusion Detection Indicators -- Leveraging Lattices to Improve Role Mining -- A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases -- Efficient Coalition Detection in Traitor Tracing -- SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned -- Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models -- A Decentralized Bayesian Attack Detection Algorithm for Network Security -- An Operation-Based Metric for CPA Resistance -- YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems -- Adversary Modeling and Simulation in Cyber Warfare -- Interactive Selection of ISO 27001 Controls under Multiple Objectives -- Feasibility of Automated Information Security Compliance Auditing -- Software Licence Protection and Management for Organisations -- A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach -- ASTRA : A Security Analysis Method Based on Asset Tracking -- A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack -- Portable User-Centric Identity Management -- Ubiquitous Privacy-Preserving Identity Management -- Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data -- Using Virtualization to Create and Deploy Computer Security Lab Exercises -- DigForNet: Digital Forensic in Networking -- A Live Digital Forensic system for Windows networks -- HoneyID : Unveiling Hidden Spywares by Generating Bogus Events -- A Security Protocol for Self-Organizing Data Storage -- Protecting Financial Institutions from Brute-Force Attacks -- Agency Theory: Can it be Used to Strengthen IT Governance? -- A new Accounting Mechanism for Modern and Future AAA Services -- A user survey on the sense of security, Anshin -- Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks -- A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection -- Managing the lifecycle of XACML delegation policies in federated environments -- Assessing the Likelihood of Privacy Policy Compliance -- Classification features for detecting Server-side and Client-side Web attacks.
Record Nr. UNINA-9910485051903321
New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in Communication Networks [[electronic resource] ] : 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers / / edited by Carlo Blundo, Stelvio Cimato
Security in Communication Networks [[electronic resource] ] : 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers / / edited by Carlo Blundo, Stelvio Cimato
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 388 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Computers and civilization
Management information systems
Computer science
Algorithms
Cryptology
Computer Communication Networks
Operating Systems
Computers and Society
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Soggetto non controllato Communication networks
SCN
Security
ISBN 3-540-30598-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- ECRYPT: The Cryptographic Research Challenges for the Next Decade -- Reduction of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions for Public-Key Encryption Schemes -- Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel -- Signature Schemes -- A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs -- Group Signatures with Separate and Distributed Authorities -- Threshold Cryptography in Mobile Ad Hoc Networks -- Anonymity and Privacy -- Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map -- Group Signatures: Better Efficiency and New Theoretical Aspects -- Efficient Blind Signatures Without Random Oracles -- Authentication and Identification -- Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract) -- On the Key Exposure Problem in Chameleon Hashes -- Zero Knowledge -- Identity-Based Zero-Knowledge -- Public Key Cryptosystems -- A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation -- Efficient Key Encapsulation to Multiple Parties -- Improved Signcryption from q-Diffie-Hellman Problems -- Distributed Cryptography -- Colored Visual Cryptography Without Color Darkening -- On the Size of Monotone Span Programs -- Universally Composable DKG with Linear Number of Exponentiations -- Cryptanalysis of Public Key Cryptosystems -- An Algebraic Approach to NTRU (q = 2 n ) via Witt Vectors and Overdetermined Systems of Nonlinear Equations -- Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC -- Cryptanalysis -- The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters -- Non-randomness of the Full 4 and 5-Pass HAVAL -- Email Security -- Controlling Spam by Secure Internet Content Selection -- Key Distribution and Feedback Shift Registers -- On Session Identifiers in Provably Secure Protocols -- How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers.
Record Nr. UNISA-996466060603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security in Communication Networks [[electronic resource] ] : 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers / / edited by Carlo Blundo, Stelvio Cimato
Security in Communication Networks [[electronic resource] ] : 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers / / edited by Carlo Blundo, Stelvio Cimato
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 388 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Computers and civilization
Management information systems
Computer science
Algorithms
Cryptology
Computer Communication Networks
Operating Systems
Computers and Society
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Soggetto non controllato Communication networks
SCN
Security
ISBN 3-540-30598-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- ECRYPT: The Cryptographic Research Challenges for the Next Decade -- Reduction of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions for Public-Key Encryption Schemes -- Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel -- Signature Schemes -- A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs -- Group Signatures with Separate and Distributed Authorities -- Threshold Cryptography in Mobile Ad Hoc Networks -- Anonymity and Privacy -- Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map -- Group Signatures: Better Efficiency and New Theoretical Aspects -- Efficient Blind Signatures Without Random Oracles -- Authentication and Identification -- Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract) -- On the Key Exposure Problem in Chameleon Hashes -- Zero Knowledge -- Identity-Based Zero-Knowledge -- Public Key Cryptosystems -- A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation -- Efficient Key Encapsulation to Multiple Parties -- Improved Signcryption from q-Diffie-Hellman Problems -- Distributed Cryptography -- Colored Visual Cryptography Without Color Darkening -- On the Size of Monotone Span Programs -- Universally Composable DKG with Linear Number of Exponentiations -- Cryptanalysis of Public Key Cryptosystems -- An Algebraic Approach to NTRU (q = 2 n ) via Witt Vectors and Overdetermined Systems of Nonlinear Equations -- Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC -- Cryptanalysis -- The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters -- Non-randomness of the Full 4 and 5-Pass HAVAL -- Email Security -- Controlling Spam by Secure Internet Content Selection -- Key Distribution and Feedback Shift Registers -- On Session Identifiers in Provably Secure Protocols -- How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers.
Record Nr. UNINA-9910483316003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in Communication Networks [[electronic resource] ] : Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers / / edited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano
Security in Communication Networks [[electronic resource] ] : Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers / / edited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (IX, 263 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer communication systems
Data encryption (Computer science)
Operating systems (Computers)
Algorithms
Computers and civilization
Computers
Law and legislation
Computer Communication Networks
Cryptology
Operating Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Legal Aspects of Computing
ISBN 3-540-36413-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Some Applications of Polynomials for the Design of Cryptographic Protocols -- Secure Multi-party Computation Made Simple -- Forward Security -- Forward Secrecy in Password-Only Key Exchange Protocols -- Weak Forward Security in Mediated RSA -- Foundations of Cryptography -- On the Power of Claw-Free Permutations -- Equivocable and Extractable Commitment Schemes -- An Improved Pseudorandom Generator Based on Hardness of Factoring -- Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions -- Key Management -- Efficient Re-keying Protocols for Multicast Encryption -- On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure -- A Group Key Distribution Scheme with Decentralised User Join -- Cryptanalysis -- On a Resynchronization Weakness in a Class of Combiners with Memory -- On Probability of Success in Linear and Differential Cryptanalysis -- Differential Cryptanalysis of a Reduced-Round SEED -- System Security -- Medical Information Privacy Assurance: Cryptographic and System Aspects -- A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code -- Signature Schemes -- How to Repair ESIGN -- Forward-Secure Signatures with Fast Key Update -- Constructing Elliptic Curves with Prescribed Embedding Degrees -- A Signature Scheme with Efficient Protocols -- Zero Knowledge -- Efficient Zero-Knowledge Proofs for Some Practical Graph Problems -- Reduction Zero-Knowledge -- A New Notion of Soundness in Bare Public-Key Model -- Information Theory and Secret Sharing -- Robust Information-Theoretic Private Information Retrieval -- Trading Players for Efficiency in Unconditional Multiparty Computation -- Secret Sharing Schemes on Access Structures with Intersection Number Equal to One.
Record Nr. UNINA-9910143884303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in Communication Networks [[electronic resource] ] : Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers / / edited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano
Security in Communication Networks [[electronic resource] ] : Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers / / edited by Stelvio Cimato, Clemente Galdi, Giuseppe Persiano
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (IX, 263 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer communication systems
Data encryption (Computer science)
Operating systems (Computers)
Algorithms
Computers and civilization
Computers
Law and legislation
Computer Communication Networks
Cryptology
Operating Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Legal Aspects of Computing
ISBN 3-540-36413-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Some Applications of Polynomials for the Design of Cryptographic Protocols -- Secure Multi-party Computation Made Simple -- Forward Security -- Forward Secrecy in Password-Only Key Exchange Protocols -- Weak Forward Security in Mediated RSA -- Foundations of Cryptography -- On the Power of Claw-Free Permutations -- Equivocable and Extractable Commitment Schemes -- An Improved Pseudorandom Generator Based on Hardness of Factoring -- Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions -- Key Management -- Efficient Re-keying Protocols for Multicast Encryption -- On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure -- A Group Key Distribution Scheme with Decentralised User Join -- Cryptanalysis -- On a Resynchronization Weakness in a Class of Combiners with Memory -- On Probability of Success in Linear and Differential Cryptanalysis -- Differential Cryptanalysis of a Reduced-Round SEED -- System Security -- Medical Information Privacy Assurance: Cryptographic and System Aspects -- A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code -- Signature Schemes -- How to Repair ESIGN -- Forward-Secure Signatures with Fast Key Update -- Constructing Elliptic Curves with Prescribed Embedding Degrees -- A Signature Scheme with Efficient Protocols -- Zero Knowledge -- Efficient Zero-Knowledge Proofs for Some Practical Graph Problems -- Reduction Zero-Knowledge -- A New Notion of Soundness in Bare Public-Key Model -- Information Theory and Secret Sharing -- Robust Information-Theoretic Private Information Retrieval -- Trading Players for Efficiency in Unconditional Multiparty Computation -- Secret Sharing Schemes on Access Structures with Intersection Number Equal to One.
Record Nr. UNISA-996465667703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2012
Descrizione fisica 1 online resource (533 p.)
Disciplina 005.8/2
Altri autori (Persone) CimatoStelvio
YangChing-Nung
Collana Digital imaging and computer vision
Soggetto topico Image processing - Security measures
Data encryption (Computer science)
Computer file sharing - Security measures
Image files - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-351-83354-5
1-315-21765-1
1-283-31163-1
9786613311634
1-4398-3722-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method
Record Nr. UNINA-9910464706103321
Boca Raton, Fla. : , : CRC Press, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2012
Descrizione fisica 1 online resource (533 p.)
Disciplina 005.8/2
Altri autori (Persone) CimatoStelvio
YangChing-Nung
Collana Digital imaging and computer vision
Soggetto topico Image processing - Security measures
Data encryption (Computer science)
Computer file sharing - Security measures
Image files - Security measures
ISBN 1-351-83354-5
1-315-21765-1
1-283-31163-1
9786613311634
1-4398-3722-8
Classificazione COM083000MAT003000TEC015000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method
Record Nr. UNINA-9910789483503321
Boca Raton, Fla. : , : CRC Press, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang
Visual cryptography and secret image sharing / / edited by Stelvio Cimato, Ching-Nung Yang
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2012
Descrizione fisica 1 online resource (533 p.)
Disciplina 005.8/2
Altri autori (Persone) CimatoStelvio
YangChing-Nung
Collana Digital imaging and computer vision
Soggetto topico Image processing - Security measures
Data encryption (Computer science)
Computer file sharing - Security measures
Image files - Security measures
ISBN 1-351-83354-5
1-315-21765-1
1-283-31163-1
9786613311634
1-4398-3722-8
Classificazione COM083000MAT003000TEC015000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Contributors; 1. Visual Cryptography from Halftone Error Diffusion; 2. Visual Cryptography for Color Images; 3. Visual Cryptography for Multiple Secrets; 4. Extended Visual Cryptography for Photograph Images; 5. Probabilistic Visual Cryptography Schemes; 6. XOR-Based Visual Cryptography; 7. Visual Cryptography and Random Grids; 8. Visual Cryptography and Contrast Bounds; 9. Visual Cryptography Schemes with Reversing; 10. Cheating Prevention in Visual Cryptography
11. Resolving the Alignment Problem in Visual Cryptography12. Applications of Visual Cryptography; 13. Steganography in Halftone Images; 14. Image Secret Sharing; 15. Polynomial-Based Image Sharing; 16. Image Sharing with Steganography and Authentication; 17. Two-Decoding-Option Image Sharing Method
Record Nr. UNINA-9910813853303321
Boca Raton, Fla. : , : CRC Press, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui