Information Security [[electronic resource] ] : First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings / / edited by Eiji Okamoto, George Davida, Masahiro Mambo |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 |
Descrizione fisica | 1 online resource (XII, 364 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer security Algorithms Computer communication systems Operating systems (Computers) Cryptology Systems and Data Security Algorithm Analysis and Problem Complexity Computer Communication Networks Operating Systems |
ISBN | 3-540-69767-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A general theory of codes, II: Paradigms and homomorphisms -- Improving the higher order differential attack and cryptanalysis of the KN cipher -- An optimised linear attack on pseudorandom generators using a non-linear combiner -- Cryptanalysis of message authentication codes -- The least witness of a composite number -- Fast algorithm for finding a small root of a quadratic modular equation -- Modified Finite Automata Public Key Cryptosystem -- Modified ElGamal cryptosystem -- Remarks on blind decryption -- High-speed cryptography -- Secure applications of low-entropy keys -- A key escrow system of the RSA cryptosystem -- A key escrow system with protecting user's privacy by blind decoding -- Some recent research aspects of threshold cryptography -- A high-speed small RSA encryption LSI with low power dissipation -- The case for a secure multi-application smart card operating system -- An augmented family of cryptographic Parity Circuits -- A new byte-oriented block cipher -- Practice-oriented provable-security -- A framework for the management of information security -- Specifying security in a composite system -- On rough sets and inference analysis -- Arbitrated unconditionally secure authentication scheme with multi-senders -- Group signatures for hierarchical multigroups -- Threshold proxy signature schemes -- Signcryption and its applications in efficient public key solutions -- A new digital cash scheme based on blind Nyberg-Rueppel digital signature -- An incremental payment method for internet based streaming real-time media -- A new identity-based key exchange protocol minimizing computation and communication -- The application of ID-based key distribution systems to an elliptic curve -- On reconciliation of discrepant sequences shared through quantum mechanical channels. |
Record Nr. | UNISA-996466084503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security [[electronic resource] ] : First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings / / edited by Eiji Okamoto, George Davida, Masahiro Mambo |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 |
Descrizione fisica | 1 online resource (XII, 364 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer security Algorithms Computer networks Operating systems (Computers) Cryptology Systems and Data Security Algorithm Analysis and Problem Complexity Computer Communication Networks Operating Systems |
ISBN | 3-540-69767-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A general theory of codes, II: Paradigms and homomorphisms -- Improving the higher order differential attack and cryptanalysis of the KN cipher -- An optimised linear attack on pseudorandom generators using a non-linear combiner -- Cryptanalysis of message authentication codes -- The least witness of a composite number -- Fast algorithm for finding a small root of a quadratic modular equation -- Modified Finite Automata Public Key Cryptosystem -- Modified ElGamal cryptosystem -- Remarks on blind decryption -- High-speed cryptography -- Secure applications of low-entropy keys -- A key escrow system of the RSA cryptosystem -- A key escrow system with protecting user's privacy by blind decoding -- Some recent research aspects of threshold cryptography -- A high-speed small RSA encryption LSI with low power dissipation -- The case for a secure multi-application smart card operating system -- An augmented family of cryptographic Parity Circuits -- A new byte-oriented block cipher -- Practice-oriented provable-security -- A framework for the management of information security -- Specifying security in a composite system -- On rough sets and inference analysis -- Arbitrated unconditionally secure authentication scheme with multi-senders -- Group signatures for hierarchical multigroups -- Threshold proxy signature schemes -- Signcryption and its applications in efficient public key solutions -- A new digital cash scheme based on blind Nyberg-Rueppel digital signature -- An incremental payment method for internet based streaming real-time media -- A new identity-based key exchange protocol minimizing computation and communication -- The application of ID-based key distribution systems to an elliptic curve -- On reconciliation of discrepant sequences shared through quantum mechanical channels. |
Record Nr. | UNINA-9910144913803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Infrastructure Security [[electronic resource] ] : International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings / / edited by George Davida, Yair Frankel, Owen Rees |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (XII, 340 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Seguridad informática
Computer Communication Networks Operating Systems Management of Computing and Information Systems Cryptology Database Management Computers and Society |
ISBN | 3-540-45831-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Biometrics -- Biometric Authentication in Infrastructure Security -- Denial of Access in Biometrics-Based Authentication Systems -- Identification, Authentication, and Process -- A Novel Approach to Proactive Password Checking -- Single Sign-On Architectures -- Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information -- Analysis Process -- How to Buy Better Testing Using Competition to Get the Most Security and Robustness for Your Dollar -- Structured Risk Analysis -- A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls -- Mobile Networks -- Authentication and Authorization of Mobile Clients in Public Data Networks -- A Contemporary Foreword on GSM Security -- Vulnerability Assessment and Logs -- Vulnerability Assessment Simulation for Information Infrastructure Protection -- Pseudonymizing Unix Log Files -- System Design -- DPS: An Architectural Style for Development of Secure Software -- A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping -- Different Smartcard-Based Approaches to Physical Access Control -- Formal Methods -- Authenticity and Provability — A Formal Framework -- Protocol Engineering Applied to Formal Analysis of Security Systems -- Cryptographic Techniques -- Applications of Multiple Trust Authorities in Pairing Based Cryptosystems -- Plausible Deniability Using Automated Linguistic Stegonagraphy -- Virtual Software Tokens - A Practical Way to Secure PKI Roaming -- Bit-Serial AOP Arithmetic Architectures over GF(2m) -- Networks -- A Practical Distributed Authorization System for GARA -- Design of a VPN Software Solution Integrating TCP and UDP Services. |
Altri titoli varianti | InfraSec 2002 |
Record Nr. | UNISA-996466220803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Infrastructure Security : International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings / / edited by George Davida, Yair Frankel, Owen Rees |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (XII, 340 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Seguridad informática
Computer Communication Networks Operating Systems Management of Computing and Information Systems Cryptology Database Management Computers and Society |
ISBN | 3-540-45831-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Biometrics -- Biometric Authentication in Infrastructure Security -- Denial of Access in Biometrics-Based Authentication Systems -- Identification, Authentication, and Process -- A Novel Approach to Proactive Password Checking -- Single Sign-On Architectures -- Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information -- Analysis Process -- How to Buy Better Testing Using Competition to Get the Most Security and Robustness for Your Dollar -- Structured Risk Analysis -- A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls -- Mobile Networks -- Authentication and Authorization of Mobile Clients in Public Data Networks -- A Contemporary Foreword on GSM Security -- Vulnerability Assessment and Logs -- Vulnerability Assessment Simulation for Information Infrastructure Protection -- Pseudonymizing Unix Log Files -- System Design -- DPS: An Architectural Style for Development of Secure Software -- A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping -- Different Smartcard-Based Approaches to Physical Access Control -- Formal Methods -- Authenticity and Provability — A Formal Framework -- Protocol Engineering Applied to Formal Analysis of Security Systems -- Cryptographic Techniques -- Applications of Multiple Trust Authorities in Pairing Based Cryptosystems -- Plausible Deniability Using Automated Linguistic Stegonagraphy -- Virtual Software Tokens - A Practical Way to Secure PKI Roaming -- Bit-Serial AOP Arithmetic Architectures over GF(2m) -- Networks -- A Practical Distributed Authorization System for GARA -- Design of a VPN Software Solution Integrating TCP and UDP Services. |
Altri titoli varianti | InfraSec 2002 |
Record Nr. | UNINA-9910143903903321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|