Security and Cryptography for Networks [[electronic resource] ] : 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings / / edited by Dario Catalano, Roberto De Prisco |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIII, 584 p. 57 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Software engineering Coding theory Information theory Computer communication systems Computers and civilization Management information systems Computer science Cryptology Software Engineering/Programming and Operating Systems Coding and Information Theory Computer Communication Networks Computers and Society Management of Computing and Information Systems |
ISBN | 3-319-98113-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Signatures and Watermarking -- Composability -- Encryption I -- Multiparty computation -- Anonymity and Zero Knowledge -- Secret Sharing and Oblivious Transfer -- Lattices and Post Quantum Cryptography -- Obfuscation -- Two-party Computation -- Protocols -- Encryption II. |
Record Nr. | UNISA-996466355903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Cryptography for Networks : 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings / / edited by Dario Catalano, Roberto De Prisco |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIII, 584 p. 57 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Software engineering Coding theory Information theory Computer communication systems Computers and civilization Management information systems Computer science Cryptology Software Engineering/Programming and Operating Systems Coding and Information Theory Computer Communication Networks Computers and Society Management of Computing and Information Systems |
ISBN | 3-319-98113-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Signatures and Watermarking -- Composability -- Encryption I -- Multiparty computation -- Anonymity and Zero Knowledge -- Secret Sharing and Oblivious Transfer -- Lattices and Post Quantum Cryptography -- Obfuscation -- Two-party Computation -- Protocols -- Encryption II. |
Record Nr. | UNINA-9910349411803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Cryptography for Networks [[electronic resource] ] : 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings / / edited by Vassilis Zikas, Roberto De Prisco |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIX, 606 p. 75 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Computer communication systems Cryptology Systems and Data Security Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-319-44618-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Encryption -- Memory Protection -- Multi-party Computation -- Zero-knowledge Proofs -- Efficient Protocols -- Outsourcing Computation -- Digital Signatures -- Cryptanalysis -- Two-party Computation -- Secret Sharing -- Obfuscation. |
Record Nr. | UNISA-996465650103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Cryptography for Networks : 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings / / edited by Vassilis Zikas, Roberto De Prisco |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIX, 606 p. 75 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Computer communication systems Cryptology Systems and Data Security Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-319-44618-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Encryption -- Memory Protection -- Multi-party Computation -- Zero-knowledge Proofs -- Efficient Protocols -- Outsourcing Computation -- Digital Signatures -- Cryptanalysis -- Two-party Computation -- Secret Sharing -- Obfuscation. |
Record Nr. | UNINA-9910483935603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Cryptography for Networks [[electronic resource] ] : 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings / / edited by Michel Abdalla, Roberto De Prisco |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XX, 609 p. 101 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Cryptology Systems and Data Security Management of Computing and Information Systems |
ISBN | 3-319-10879-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key exchange -- Multilinear maps and obfuscation.-Pseudorandom function extensions -- Secure computation - foundations and algorithms -- Network security -- Functional encryption -- Cryptanalysis -- Secure computation - implementation -- Zero knowledge -- Message authentication -- Proofs of space and erasure -- Public-key encryption. |
Record Nr. | UNISA-996202529803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Cryptography for Networks : 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings / / edited by Michel Abdalla, Roberto De Prisco |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XX, 609 p. 101 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Cryptology Systems and Data Security Management of Computing and Information Systems |
ISBN | 3-319-10879-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key exchange -- Multilinear maps and obfuscation.-Pseudorandom function extensions -- Secure computation - foundations and algorithms -- Network security -- Functional encryption -- Cryptanalysis -- Secure computation - implementation -- Zero knowledge -- Message authentication -- Proofs of space and erasure -- Public-key encryption. |
Record Nr. | UNINA-9910483506903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Cryptography for Networks [[electronic resource] ] : 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012, Proceedings / / edited by Ivan Visconti, Roberto De Prisco |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XI, 582 p. 75 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Management information systems Computer science Application software Cryptology Systems and Data Security Computer Communication Networks Management of Computing and Information Systems Computer Appl. in Administrative Data Processing |
ISBN | 3-642-32928-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption. |
Record Nr. | UNISA-996465498703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Cryptography for Networks [[electronic resource] ] : 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings / / edited by Juan A. Garay, Roberto De Prisco |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (VII, 474 p. 54 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Management information systems Computer science Algorithms Computers and civilization Systems and Data Security Cryptology Computer Communication Networks Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society |
ISBN | 3-642-15317-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Encryption I -- Time-Specific Encryption -- Public-Key Encryption with Efficient Amortized Updates -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor in Lattice-Based Cryptography -- Cryptanalysis -- Differential Fault Analysis of LEX -- Generalized RC4 Key Collisions and Hash Collisions -- Hash Functions -- On the Indifferentiability of the Grøstl Hash Function -- Side Channel Attacks and Leakage Resilience -- Algorithmic Tamper-Proof Security under Probing Attacks -- Leakage-Resilient Storage -- Encryption II -- Searching Keywords with Wildcards on Encrypted Data -- Threshold Attribute-Based Signcryption -- Cryptographic Protocols I -- Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption -- Improved Primitives for Secure Multiparty Integer Computation -- How to Pair with a Human -- Authentication and Key Agreement -- A New Security Model for Authenticated Key Agreement -- A Security Enhancement and Proof for Authentication and Key Agreement (AKA) -- Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model -- Cryptographic Primitives and Schemes -- Kleptography from Standard Assumptions and Applications -- Provably Secure Convertible Undeniable Signatures with Unambiguity -- History-Free Aggregate Message Authentication Codes -- Lattice-Based Cryptography -- Recursive Lattice Reduction -- Adaptively Secure Identity-Based Identification from Lattices without Random Oracles -- Groups Signatures and Authentication -- The Fiat–Shamir Transform for Group and Ring Signature Schemes -- Get Shorty via Group Signatures without Encryption -- Group Message Authentication -- Cryptographic Protocols II -- Fast Secure Computation of Set Intersection -- Distributed Private-Key Generators for Identity-Based Cryptography -- Anonymity -- Solving Revocation with Efficient Update of Anonymous Credentials. |
Record Nr. | UNISA-996465675503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and cryptography for networks : 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010 : proceedings / / Juan A. Garay, Roberto De Prisco (eds.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2010 |
Descrizione fisica | 1 online resource (VII, 474 p. 54 illus.) |
Disciplina | 005.8 |
Altri autori (Persone) |
GarayJuan A
De PriscoRoberto |
Collana |
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science |
Soggetto topico |
Computer networks - Security measures
Computer security Cryptography |
ISBN | 3-642-15317-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Encryption I -- Time-Specific Encryption -- Public-Key Encryption with Efficient Amortized Updates -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor in Lattice-Based Cryptography -- Cryptanalysis -- Differential Fault Analysis of LEX -- Generalized RC4 Key Collisions and Hash Collisions -- Hash Functions -- On the Indifferentiability of the Grøstl Hash Function -- Side Channel Attacks and Leakage Resilience -- Algorithmic Tamper-Proof Security under Probing Attacks -- Leakage-Resilient Storage -- Encryption II -- Searching Keywords with Wildcards on Encrypted Data -- Threshold Attribute-Based Signcryption -- Cryptographic Protocols I -- Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption -- Improved Primitives for Secure Multiparty Integer Computation -- How to Pair with a Human -- Authentication and Key Agreement -- A New Security Model for Authenticated Key Agreement -- A Security Enhancement and Proof for Authentication and Key Agreement (AKA) -- Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model -- Cryptographic Primitives and Schemes -- Kleptography from Standard Assumptions and Applications -- Provably Secure Convertible Undeniable Signatures with Unambiguity -- History-Free Aggregate Message Authentication Codes -- Lattice-Based Cryptography -- Recursive Lattice Reduction -- Adaptively Secure Identity-Based Identification from Lattices without Random Oracles -- Groups Signatures and Authentication -- The Fiat–Shamir Transform for Group and Ring Signature Schemes -- Get Shorty via Group Signatures without Encryption -- Group Message Authentication -- Cryptographic Protocols II -- Fast Secure Computation of Set Intersection -- Distributed Private-Key Generators for Identity-Based Cryptography -- Anonymity -- Solving Revocation with Efficient Update of Anonymous Credentials. |
Record Nr. | UNINA-9910483950503321 |
Berlin ; ; New York, : Springer, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Cryptography for Networks [[electronic resource] ] : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings / / edited by Roberto De Prisco, Moti Yung |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XII, 368 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Operating systems (Computers) Electronic data processing—Management Algorithms Computers and civilization Cryptology Computer Communication Networks Operating Systems IT Operations Computers and Society |
ISBN | 3-540-38081-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Distributed Systems Security: Foundations -- Edge Eavesdropping Games -- Universally Composable Simultaneous Broadcast -- Signature Schemes Variants -- Relations Among Security Notions for Undeniable Signature Schemes -- Concurrent Blind Signatures Without Random Oracles -- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions -- Block Ciphers Analysis -- Understanding Two-Round Differentials in AES -- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b -- Anonymity and E-Commerce -- Constant-Size Dynamic k-TAA -- On Secure Orders in the Presence of Faults -- Balancing Accountability and Privacy Using E-Cash (Extended Abstract) -- Public Key Encryption and Key Exchange -- About the Security of MTI/C0 and MQV -- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles -- A New Key Exchange Protocol Based on MQV Assuming Public Computations -- Secret Sharing -- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants -- Cheating Immune (2,n)-Threshold Visual Secret Sharing -- Rational Secret Sharing, Revisited -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) -- Distinguishing Stream Ciphers with Convolutional Filters -- On Statistical Testing of Random Numbers Generators -- Applied Authentication -- Lightweight Email Signatures (Extended Abstract) -- Shoehorning Security into the EPC Tag Standard -- Proof-Carrying Proxy Certificates -- Public Key Related Cryptanalysis -- Cryptanalysis of Rainbow -- An Improved LPN Algorithm -- Invited Talk -- Theory and Practice of Multiparty Computation. |
Record Nr. | UNISA-996466120803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|