top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in network and distributed systems security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security : November 26-27, 2001, Leuven, Belgium / / edited by Bart de Decker ... [et al.]
Advances in network and distributed systems security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security : November 26-27, 2001, Leuven, Belgium / / edited by Bart de Decker ... [et al.]
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Boston, : Kluwer Academic Publishers, c2002
Descrizione fisica 1 online resource (218 p.)
Disciplina 005.8
Altri autori (Persone) DeckerBart de <1958->
Collana International Federation for Information Processing
Soggetto topico Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-280-20490-7
9786610204908
0-306-46958-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell’s Trust Domain Infrastructure Security Certification.
Record Nr. UNINA-9910454808503321
Boston, : Kluwer Academic Publishers, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
Edizione [1st ed. 2002.]
Pubbl/distr/stampa New York, NY : , : Springer US : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (218 p.)
Disciplina 005.8
Altri autori (Persone) DeckerBart de <1958->
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer science
Microprocessors
Computer architecture
Computer networks
Electronic commerce
Electronic data processing - Management
Theory of Computation
Processor Architectures
Computer Communication Networks
e-Commerce and e-Business
IT Operations
ISBN 1-280-20490-7
9786610204908
0-306-46958-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell’s Trust Domain Infrastructure Security Certification.
Record Nr. UNINA-9910780042403321
New York, NY : , : Springer US : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
Edizione [1st ed. 2002.]
Pubbl/distr/stampa New York, NY : , : Springer US : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (218 p.)
Disciplina 005.8
Altri autori (Persone) DeckerBart de <1958->
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer science
Microprocessors
Computer architecture
Computer networks
Electronic commerce
Electronic data processing - Management
Theory of Computation
Processor Architectures
Computer Communication Networks
e-Commerce and e-Business
IT Operations
ISBN 1-280-20490-7
9786610204908
0-306-46958-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell’s Trust Domain Infrastructure Security Certification.
Record Nr. UNINA-9910825744303321
New York, NY : , : Springer US : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communications and Multimedia Security [[electronic resource] ] : 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings / / edited by Bart De Decker, André Zúquete
Communications and Multimedia Security [[electronic resource] ] : 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings / / edited by Bart De Decker, André Zúquete
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 157 p. 37 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Biometrics (Biology)
Computer communication systems
E-commerce
Data encryption (Computer science)
Management information systems
Computer science
Systems and Data Security
Biometrics
Computer Communication Networks
e-Commerce/e-business
Cryptology
Management of Computing and Information Systems
ISBN 3-662-44885-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Table of Contents -- Part I: Research Papers -- Malicious MPLS Policy Engine Reconnaissance -- 1 Introduction -- 2 Related Work -- 3 MPLS Policy Engine -- 4 Policy Engine State Analysis Design -- 4.1 Network Model -- 4.2 Adversary Model -- 4.3 Probe Elements -- 4.4 Simulation Scenarios -- 5 Analysis Results -- 5.1 Probing Process Validation -- 5.2 Policy Reveal -- 6 MPLS Policy States Probability -- 7 Conclusions -- References -- USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations -- 1 Introduction -- 2 Attack Scenario -- 3 Vulnerabilities -- 3.1 AT COMMANDS -- 3.2 Vulnerabilities Disc covered and AT Samsung Proprietary Commands -- 3.3 ADB Enabled -- 4 Anatomy of the Attack (Script) -- 4.1 Architecture -- 4.2 Using the Vulnerabilities Found -- 5 Conclusion -- References -- Free Typed Text Using Keystroke Dynamics for Continuous Authentication -- 1 Introduction -- 2 Biometrics and Keystroke Dynamics -- 3 State of the Art -- 4 Software Design and Algorithm -- 4.1 Architecture -- 4.2 Absolute Scores -- 4.3 Relative Scores -- 4.4 Decision Criterion -- 4.5 Parameter Space -- 5 Validation -- 5.1 Tool Description for Artificial Attacks -- 5.2 Acceptance Neighbourhoods Study -- 5.3 Transients Study for Sample Reduction -- 5.4 Weights Study -- 5.5 ROC Curve -- 5.6 Evaluations Scheme -- 6 Conclusions -- References -- Secure Storage on Android with Context-Aware Access Control -- 1 Introduction -- 2 Related Work -- 3 General Approach -- 3.1 Security Requirements -- 3.2 Usability Requirements -- 3.3 Interoperability Requirements -- 3.4 Assumptions -- 3.5 Architecture -- 4 Secure Asset Storage -- 4.1 Protocols -- 5 Context-Aware Asset Management -- 6 Prototype: Context-Aware File Management -- 6.1 File Server -- 6.2 Administration Component -- 6.3 Mobile Component -- 7 Evaluation.
8 Conclusions and Future Work -- References -- Part II: Work in Progress -- A Study on Advanced Persistent Threats -- 1 Introduction -- 2 Definition: What Is APT? -- 3 Attack Model: How Does APT Work? -- 3.1 Phases of an APT Attack -- 3.2 Case Study of APT Attacks -- 3.3 Countermeasures -- 4 Related Work -- 5 Conclusion -- References -- Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems -- 1 Introduction -- 2 Attack Mechanism Outline -- 3 Threat Model -- 4 Literature Review -- 5 Estimating Cloud Migration Parameters -- 6 Analysis and Discussion -- 7 Conclusions and Future Work -- References -- Touchpad Input for Continuous Biometric Authentication -- 1 Introduction -- 2 Related Work -- 3 Data Collection -- 4 Results -- 5 Discussions and Conclusions -- References -- A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption -- 1 Introduction -- 2 Federated Cloud Identity Broker-Model -- 2.1 Cryptographic Preliminaries -- 2.2 Model Architecture -- 2.3 Requirements -- 3 Concrete Model and Proof of Concept -- 3.1 Components -- 3.2 Communication Interfaces -- 3.3 Process Flows -- 4 Evaluation and Discussion -- 5 Conclusions and Future Work -- References -- D-Shuffle for Pret ˆ`a Voter -- 1 Introduction -- 1.1 Pret ˆa `Voter Overview -- 1.2 Motivation and Contribution -- 2 The Design of the Verifiable D-Shuffle -- 2.1 Intuition Behind the Design -- 2.2 The Construction of the D-Shuffle -- 2.3 Security of the D-Shuffle -- 2.4 On Instantiations of the D-Shuffle -- 2.5 On the Efficiency of D-Shuffle -- 3 The D-Shuffle Used for Pret ˆa `Voter -- 4 Conclusion -- References -- A Secrecy of the D-Shuffle -- B Non-interactive Zero knowledge proofs -- An Approach to Information Security Policy Modeling for Enterprise Networks -- 1 Introduction -- 2 Related Work -- 3 A Policy Model -- 4 A Policy Algebra.
5 Conclusion -- References -- Part III: Extended Abstracts -- Introduction to Attribute Based Searchable Encryption -- 1 Introduction -- 2 Formal Definition of ABSE -- 3 Conclusion -- References -- Risk Analysis of Physically Unclonable Functions -- 1 Introduction -- 2 Physically Unclonable Functions -- 3 Risk Analysis -- 4 Conclusion and Outlook -- References -- Decentralized Bootstrap for Social Overlay Networks -- 1 Introduction -- 1.1 Problem -- 1.2 Contribution -- 2 Decentralized Bootstrap for Our Social Overlay Network -- 3 Conclusions and Future Work -- References -- Part IV: Keynotes -- Enhancing Privacy with Quantum Networks -- 1 Introduction -- 2 Preliminaries -- 3 Oblivious Transfer -- 4 Conclusions -- References -- The Fundamental Principle of Breach Prevention -- 1 Introduction -- 2 What Is a Malicious Insider? -- 3 Data-Centric Security -- 4 Information Security "Rules of Thumb" -- Author Index.
Record Nr. UNISA-996202527503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Communications and Multimedia Security : 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings / / edited by Bart De Decker, André Zúquete
Communications and Multimedia Security : 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings / / edited by Bart De Decker, André Zúquete
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 157 p. 37 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Biometrics (Biology)
Computer communication systems
E-commerce
Data encryption (Computer science)
Management information systems
Computer science
Systems and Data Security
Biometrics
Computer Communication Networks
e-Commerce/e-business
Cryptology
Management of Computing and Information Systems
ISBN 3-662-44885-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Table of Contents -- Part I: Research Papers -- Malicious MPLS Policy Engine Reconnaissance -- 1 Introduction -- 2 Related Work -- 3 MPLS Policy Engine -- 4 Policy Engine State Analysis Design -- 4.1 Network Model -- 4.2 Adversary Model -- 4.3 Probe Elements -- 4.4 Simulation Scenarios -- 5 Analysis Results -- 5.1 Probing Process Validation -- 5.2 Policy Reveal -- 6 MPLS Policy States Probability -- 7 Conclusions -- References -- USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations -- 1 Introduction -- 2 Attack Scenario -- 3 Vulnerabilities -- 3.1 AT COMMANDS -- 3.2 Vulnerabilities Disc covered and AT Samsung Proprietary Commands -- 3.3 ADB Enabled -- 4 Anatomy of the Attack (Script) -- 4.1 Architecture -- 4.2 Using the Vulnerabilities Found -- 5 Conclusion -- References -- Free Typed Text Using Keystroke Dynamics for Continuous Authentication -- 1 Introduction -- 2 Biometrics and Keystroke Dynamics -- 3 State of the Art -- 4 Software Design and Algorithm -- 4.1 Architecture -- 4.2 Absolute Scores -- 4.3 Relative Scores -- 4.4 Decision Criterion -- 4.5 Parameter Space -- 5 Validation -- 5.1 Tool Description for Artificial Attacks -- 5.2 Acceptance Neighbourhoods Study -- 5.3 Transients Study for Sample Reduction -- 5.4 Weights Study -- 5.5 ROC Curve -- 5.6 Evaluations Scheme -- 6 Conclusions -- References -- Secure Storage on Android with Context-Aware Access Control -- 1 Introduction -- 2 Related Work -- 3 General Approach -- 3.1 Security Requirements -- 3.2 Usability Requirements -- 3.3 Interoperability Requirements -- 3.4 Assumptions -- 3.5 Architecture -- 4 Secure Asset Storage -- 4.1 Protocols -- 5 Context-Aware Asset Management -- 6 Prototype: Context-Aware File Management -- 6.1 File Server -- 6.2 Administration Component -- 6.3 Mobile Component -- 7 Evaluation.
8 Conclusions and Future Work -- References -- Part II: Work in Progress -- A Study on Advanced Persistent Threats -- 1 Introduction -- 2 Definition: What Is APT? -- 3 Attack Model: How Does APT Work? -- 3.1 Phases of an APT Attack -- 3.2 Case Study of APT Attacks -- 3.3 Countermeasures -- 4 Related Work -- 5 Conclusion -- References -- Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems -- 1 Introduction -- 2 Attack Mechanism Outline -- 3 Threat Model -- 4 Literature Review -- 5 Estimating Cloud Migration Parameters -- 6 Analysis and Discussion -- 7 Conclusions and Future Work -- References -- Touchpad Input for Continuous Biometric Authentication -- 1 Introduction -- 2 Related Work -- 3 Data Collection -- 4 Results -- 5 Discussions and Conclusions -- References -- A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption -- 1 Introduction -- 2 Federated Cloud Identity Broker-Model -- 2.1 Cryptographic Preliminaries -- 2.2 Model Architecture -- 2.3 Requirements -- 3 Concrete Model and Proof of Concept -- 3.1 Components -- 3.2 Communication Interfaces -- 3.3 Process Flows -- 4 Evaluation and Discussion -- 5 Conclusions and Future Work -- References -- D-Shuffle for Pret ˆ`a Voter -- 1 Introduction -- 1.1 Pret ˆa `Voter Overview -- 1.2 Motivation and Contribution -- 2 The Design of the Verifiable D-Shuffle -- 2.1 Intuition Behind the Design -- 2.2 The Construction of the D-Shuffle -- 2.3 Security of the D-Shuffle -- 2.4 On Instantiations of the D-Shuffle -- 2.5 On the Efficiency of D-Shuffle -- 3 The D-Shuffle Used for Pret ˆa `Voter -- 4 Conclusion -- References -- A Secrecy of the D-Shuffle -- B Non-interactive Zero knowledge proofs -- An Approach to Information Security Policy Modeling for Enterprise Networks -- 1 Introduction -- 2 Related Work -- 3 A Policy Model -- 4 A Policy Algebra.
5 Conclusion -- References -- Part III: Extended Abstracts -- Introduction to Attribute Based Searchable Encryption -- 1 Introduction -- 2 Formal Definition of ABSE -- 3 Conclusion -- References -- Risk Analysis of Physically Unclonable Functions -- 1 Introduction -- 2 Physically Unclonable Functions -- 3 Risk Analysis -- 4 Conclusion and Outlook -- References -- Decentralized Bootstrap for Social Overlay Networks -- 1 Introduction -- 1.1 Problem -- 1.2 Contribution -- 2 Decentralized Bootstrap for Our Social Overlay Network -- 3 Conclusions and Future Work -- References -- Part IV: Keynotes -- Enhancing Privacy with Quantum Networks -- 1 Introduction -- 2 Preliminaries -- 3 Oblivious Transfer -- 4 Conclusions -- References -- The Fundamental Principle of Breach Prevention -- 1 Introduction -- 2 What Is a Malicious Insider? -- 3 Data-Centric Security -- 4 Information Security "Rules of Thumb" -- Author Index.
Record Nr. UNINA-9910484955903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communications and Multimedia Security [[electronic resource] ] : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings / / edited by Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer
Communications and Multimedia Security [[electronic resource] ] : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings / / edited by Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 249 p. 83 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Biometrics (Biology)
Computer communication systems
E-commerce
Data encryption (Computer science)
Management information systems
Computer science
Systems and Data Security
Biometrics
Computer Communication Networks
e-Commerce/e-business
Cryptology
Management of Computing and Information Systems
ISBN 3-642-40779-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Biometrics -- Applied cryptography -- Digital watermarking -- Steganography and forensics.- Social network privacy -- Security and authentication.
Record Nr. UNISA-996465407503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Communications and Multimedia Security : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings / / edited by Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer
Communications and Multimedia Security : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings / / edited by Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 249 p. 83 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Biometrics (Biology)
Computer communication systems
E-commerce
Data encryption (Computer science)
Management information systems
Computer science
Systems and Data Security
Biometrics
Computer Communication Networks
e-Commerce/e-business
Cryptology
Management of Computing and Information Systems
ISBN 3-642-40779-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Biometrics -- Applied cryptography -- Digital watermarking -- Steganography and forensics.- Social network privacy -- Security and authentication.
Record Nr. UNINA-9910483736503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communications and Multimedia Security [[electronic resource] ] : 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012, Proceedings / / edited by Bart De Decker, David W. Chadwick
Communications and Multimedia Security [[electronic resource] ] : 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012, Proceedings / / edited by Bart De Decker, David W. Chadwick
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (VIII, 239 p. 57 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Biometrics (Biology)
E-commerce
Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Systems and Data Security
Biometrics
e-Commerce/e-business
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Soggetto genere / forma Conference papers and proceedings.
ISBN 3-642-32805-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Image and Handwriting Analysis -- Authentication and Performance -- Biometrics, Forensics and Watermarking -- Communications Security.
Record Nr. UNISA-996465738703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Communications and Multimedia Security [[electronic resource] ] : 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings / / edited by Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl
Communications and Multimedia Security [[electronic resource] ] : 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings / / edited by Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIV, 257 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Operating systems (Computers)
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Operating Systems
ISBN 3-642-24712-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Research papers -- pt. 2. Work in progress -- pt. 3. Posters -- pt. 4. Keynotes.
Record Nr. UNISA-996465876803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Communications and Multimedia Security [[electronic resource] ] : 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings / / edited by Bart De Decker, Ingrid Schaumüller-Bichl
Communications and Multimedia Security [[electronic resource] ] : 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings / / edited by Bart De Decker, Ingrid Schaumüller-Bichl
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 281 p. 74 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Operating systems (Computers)
Data encryption (Computer science)
Computer Communication Networks
Operating Systems
Cryptology
ISBN 1-280-38674-6
9786613564665
3-642-13241-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynotes -- Keynotes -- WiFi and RF Security -- A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks -- Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion -- XML and Web Services Security -- Throwing a MonkeyWrench into Web Attackers Plans -- Security in OpenSocial-Instrumented Social Networking Services -- Security for XML Data Binding -- Watermarking and Multimedia Security -- Watermark Detection for Video Bookmarking Using Mobile Phone Camera -- Watermark-Based Authentication and Key Exchange in Teleconferencing Systems -- Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking -- Analysis and Detection of Malicious Code and Risk Management -- Statistical Detection of Malicious PE-Executables for Fast Offline Analysis -- A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC) -- Business and IT Continuity Benchmarking -- VoIP Security -- Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks -- SIP Proxies: New Reflectors in the Internet -- Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal -- Biometrics -- Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication -- Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction -- Privacy Preserving Key Generation for Iris Biometrics -- Applied Cryptography -- Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare -- Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption -- Detecting Hidden Encrypted Volumes -- Secure Communications -- Tor HTTP Usage and Information Leakage -- Secure Communication Using Identity Based Encryption -- Anonymous Client Authentication for Transport Layer Security.
Record Nr. UNISA-996465894803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui