Advances in network and distributed systems security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security : November 26-27, 2001, Leuven, Belgium / / edited by Bart de Decker ... [et al.] |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Boston, : Kluwer Academic Publishers, c2002 |
Descrizione fisica | 1 online resource (218 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | DeckerBart de <1958-> |
Collana | International Federation for Information Processing |
Soggetto topico | Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-20490-7
9786610204908 0-306-46958-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell’s Trust Domain Infrastructure Security Certification. |
Record Nr. | UNINA-9910454808503321 |
Boston, : Kluwer Academic Publishers, c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | New York, NY : , : Springer US : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (218 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | DeckerBart de <1958-> |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computer science
Microprocessors Computer architecture Computer networks Electronic commerce Electronic data processing - Management Theory of Computation Processor Architectures Computer Communication Networks e-Commerce and e-Business IT Operations |
ISBN |
1-280-20490-7
9786610204908 0-306-46958-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell’s Trust Domain Infrastructure Security Certification. |
Record Nr. | UNINA-9910780042403321 |
New York, NY : , : Springer US : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Communications and Multimedia Security [[electronic resource] ] : 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings / / edited by Bart De Decker, André Zúquete |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 157 p. 37 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Biometrics (Biology) Computer communication systems E-commerce Data encryption (Computer science) Management information systems Computer science Systems and Data Security Biometrics Computer Communication Networks e-Commerce/e-business Cryptology Management of Computing and Information Systems |
ISBN | 3-662-44885-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Table of Contents -- Part I: Research Papers -- Malicious MPLS Policy Engine Reconnaissance -- 1 Introduction -- 2 Related Work -- 3 MPLS Policy Engine -- 4 Policy Engine State Analysis Design -- 4.1 Network Model -- 4.2 Adversary Model -- 4.3 Probe Elements -- 4.4 Simulation Scenarios -- 5 Analysis Results -- 5.1 Probing Process Validation -- 5.2 Policy Reveal -- 6 MPLS Policy States Probability -- 7 Conclusions -- References -- USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations -- 1 Introduction -- 2 Attack Scenario -- 3 Vulnerabilities -- 3.1 AT COMMANDS -- 3.2 Vulnerabilities Disc covered and AT Samsung Proprietary Commands -- 3.3 ADB Enabled -- 4 Anatomy of the Attack (Script) -- 4.1 Architecture -- 4.2 Using the Vulnerabilities Found -- 5 Conclusion -- References -- Free Typed Text Using Keystroke Dynamics for Continuous Authentication -- 1 Introduction -- 2 Biometrics and Keystroke Dynamics -- 3 State of the Art -- 4 Software Design and Algorithm -- 4.1 Architecture -- 4.2 Absolute Scores -- 4.3 Relative Scores -- 4.4 Decision Criterion -- 4.5 Parameter Space -- 5 Validation -- 5.1 Tool Description for Artificial Attacks -- 5.2 Acceptance Neighbourhoods Study -- 5.3 Transients Study for Sample Reduction -- 5.4 Weights Study -- 5.5 ROC Curve -- 5.6 Evaluations Scheme -- 6 Conclusions -- References -- Secure Storage on Android with Context-Aware Access Control -- 1 Introduction -- 2 Related Work -- 3 General Approach -- 3.1 Security Requirements -- 3.2 Usability Requirements -- 3.3 Interoperability Requirements -- 3.4 Assumptions -- 3.5 Architecture -- 4 Secure Asset Storage -- 4.1 Protocols -- 5 Context-Aware Asset Management -- 6 Prototype: Context-Aware File Management -- 6.1 File Server -- 6.2 Administration Component -- 6.3 Mobile Component -- 7 Evaluation.
8 Conclusions and Future Work -- References -- Part II: Work in Progress -- A Study on Advanced Persistent Threats -- 1 Introduction -- 2 Definition: What Is APT? -- 3 Attack Model: How Does APT Work? -- 3.1 Phases of an APT Attack -- 3.2 Case Study of APT Attacks -- 3.3 Countermeasures -- 4 Related Work -- 5 Conclusion -- References -- Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems -- 1 Introduction -- 2 Attack Mechanism Outline -- 3 Threat Model -- 4 Literature Review -- 5 Estimating Cloud Migration Parameters -- 6 Analysis and Discussion -- 7 Conclusions and Future Work -- References -- Touchpad Input for Continuous Biometric Authentication -- 1 Introduction -- 2 Related Work -- 3 Data Collection -- 4 Results -- 5 Discussions and Conclusions -- References -- A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption -- 1 Introduction -- 2 Federated Cloud Identity Broker-Model -- 2.1 Cryptographic Preliminaries -- 2.2 Model Architecture -- 2.3 Requirements -- 3 Concrete Model and Proof of Concept -- 3.1 Components -- 3.2 Communication Interfaces -- 3.3 Process Flows -- 4 Evaluation and Discussion -- 5 Conclusions and Future Work -- References -- D-Shuffle for Pret ˆ`a Voter -- 1 Introduction -- 1.1 Pret ˆa `Voter Overview -- 1.2 Motivation and Contribution -- 2 The Design of the Verifiable D-Shuffle -- 2.1 Intuition Behind the Design -- 2.2 The Construction of the D-Shuffle -- 2.3 Security of the D-Shuffle -- 2.4 On Instantiations of the D-Shuffle -- 2.5 On the Efficiency of D-Shuffle -- 3 The D-Shuffle Used for Pret ˆa `Voter -- 4 Conclusion -- References -- A Secrecy of the D-Shuffle -- B Non-interactive Zero knowledge proofs -- An Approach to Information Security Policy Modeling for Enterprise Networks -- 1 Introduction -- 2 Related Work -- 3 A Policy Model -- 4 A Policy Algebra. 5 Conclusion -- References -- Part III: Extended Abstracts -- Introduction to Attribute Based Searchable Encryption -- 1 Introduction -- 2 Formal Definition of ABSE -- 3 Conclusion -- References -- Risk Analysis of Physically Unclonable Functions -- 1 Introduction -- 2 Physically Unclonable Functions -- 3 Risk Analysis -- 4 Conclusion and Outlook -- References -- Decentralized Bootstrap for Social Overlay Networks -- 1 Introduction -- 1.1 Problem -- 1.2 Contribution -- 2 Decentralized Bootstrap for Our Social Overlay Network -- 3 Conclusions and Future Work -- References -- Part IV: Keynotes -- Enhancing Privacy with Quantum Networks -- 1 Introduction -- 2 Preliminaries -- 3 Oblivious Transfer -- 4 Conclusions -- References -- The Fundamental Principle of Breach Prevention -- 1 Introduction -- 2 What Is a Malicious Insider? -- 3 Data-Centric Security -- 4 Information Security "Rules of Thumb" -- Author Index. |
Record Nr. | UNISA-996202527503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Communications and Multimedia Security : 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings / / edited by Bart De Decker, André Zúquete |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 157 p. 37 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Biometry Computer networks Electronic commerce Data encryption (Computer science) Management information systems Computer science Systems and Data Security Biometrics Computer Communication Networks e-Commerce/e-business Cryptology Management of Computing and Information Systems |
ISBN | 3-662-44885-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Table of Contents -- Part I: Research Papers -- Malicious MPLS Policy Engine Reconnaissance -- 1 Introduction -- 2 Related Work -- 3 MPLS Policy Engine -- 4 Policy Engine State Analysis Design -- 4.1 Network Model -- 4.2 Adversary Model -- 4.3 Probe Elements -- 4.4 Simulation Scenarios -- 5 Analysis Results -- 5.1 Probing Process Validation -- 5.2 Policy Reveal -- 6 MPLS Policy States Probability -- 7 Conclusions -- References -- USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations -- 1 Introduction -- 2 Attack Scenario -- 3 Vulnerabilities -- 3.1 AT COMMANDS -- 3.2 Vulnerabilities Disc covered and AT Samsung Proprietary Commands -- 3.3 ADB Enabled -- 4 Anatomy of the Attack (Script) -- 4.1 Architecture -- 4.2 Using the Vulnerabilities Found -- 5 Conclusion -- References -- Free Typed Text Using Keystroke Dynamics for Continuous Authentication -- 1 Introduction -- 2 Biometrics and Keystroke Dynamics -- 3 State of the Art -- 4 Software Design and Algorithm -- 4.1 Architecture -- 4.2 Absolute Scores -- 4.3 Relative Scores -- 4.4 Decision Criterion -- 4.5 Parameter Space -- 5 Validation -- 5.1 Tool Description for Artificial Attacks -- 5.2 Acceptance Neighbourhoods Study -- 5.3 Transients Study for Sample Reduction -- 5.4 Weights Study -- 5.5 ROC Curve -- 5.6 Evaluations Scheme -- 6 Conclusions -- References -- Secure Storage on Android with Context-Aware Access Control -- 1 Introduction -- 2 Related Work -- 3 General Approach -- 3.1 Security Requirements -- 3.2 Usability Requirements -- 3.3 Interoperability Requirements -- 3.4 Assumptions -- 3.5 Architecture -- 4 Secure Asset Storage -- 4.1 Protocols -- 5 Context-Aware Asset Management -- 6 Prototype: Context-Aware File Management -- 6.1 File Server -- 6.2 Administration Component -- 6.3 Mobile Component -- 7 Evaluation.
8 Conclusions and Future Work -- References -- Part II: Work in Progress -- A Study on Advanced Persistent Threats -- 1 Introduction -- 2 Definition: What Is APT? -- 3 Attack Model: How Does APT Work? -- 3.1 Phases of an APT Attack -- 3.2 Case Study of APT Attacks -- 3.3 Countermeasures -- 4 Related Work -- 5 Conclusion -- References -- Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems -- 1 Introduction -- 2 Attack Mechanism Outline -- 3 Threat Model -- 4 Literature Review -- 5 Estimating Cloud Migration Parameters -- 6 Analysis and Discussion -- 7 Conclusions and Future Work -- References -- Touchpad Input for Continuous Biometric Authentication -- 1 Introduction -- 2 Related Work -- 3 Data Collection -- 4 Results -- 5 Discussions and Conclusions -- References -- A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption -- 1 Introduction -- 2 Federated Cloud Identity Broker-Model -- 2.1 Cryptographic Preliminaries -- 2.2 Model Architecture -- 2.3 Requirements -- 3 Concrete Model and Proof of Concept -- 3.1 Components -- 3.2 Communication Interfaces -- 3.3 Process Flows -- 4 Evaluation and Discussion -- 5 Conclusions and Future Work -- References -- D-Shuffle for Pret ˆ`a Voter -- 1 Introduction -- 1.1 Pret ˆa `Voter Overview -- 1.2 Motivation and Contribution -- 2 The Design of the Verifiable D-Shuffle -- 2.1 Intuition Behind the Design -- 2.2 The Construction of the D-Shuffle -- 2.3 Security of the D-Shuffle -- 2.4 On Instantiations of the D-Shuffle -- 2.5 On the Efficiency of D-Shuffle -- 3 The D-Shuffle Used for Pret ˆa `Voter -- 4 Conclusion -- References -- A Secrecy of the D-Shuffle -- B Non-interactive Zero knowledge proofs -- An Approach to Information Security Policy Modeling for Enterprise Networks -- 1 Introduction -- 2 Related Work -- 3 A Policy Model -- 4 A Policy Algebra. 5 Conclusion -- References -- Part III: Extended Abstracts -- Introduction to Attribute Based Searchable Encryption -- 1 Introduction -- 2 Formal Definition of ABSE -- 3 Conclusion -- References -- Risk Analysis of Physically Unclonable Functions -- 1 Introduction -- 2 Physically Unclonable Functions -- 3 Risk Analysis -- 4 Conclusion and Outlook -- References -- Decentralized Bootstrap for Social Overlay Networks -- 1 Introduction -- 1.1 Problem -- 1.2 Contribution -- 2 Decentralized Bootstrap for Our Social Overlay Network -- 3 Conclusions and Future Work -- References -- Part IV: Keynotes -- Enhancing Privacy with Quantum Networks -- 1 Introduction -- 2 Preliminaries -- 3 Oblivious Transfer -- 4 Conclusions -- References -- The Fundamental Principle of Breach Prevention -- 1 Introduction -- 2 What Is a Malicious Insider? -- 3 Data-Centric Security -- 4 Information Security "Rules of Thumb" -- Author Index. |
Record Nr. | UNINA-9910484955903321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Communications and Multimedia Security [[electronic resource] ] : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings / / edited by Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XIV, 249 p. 83 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Biometrics (Biology) Computer communication systems E-commerce Data encryption (Computer science) Management information systems Computer science Systems and Data Security Biometrics Computer Communication Networks e-Commerce/e-business Cryptology Management of Computing and Information Systems |
ISBN | 3-642-40779-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Biometrics -- Applied cryptography -- Digital watermarking -- Steganography and forensics.- Social network privacy -- Security and authentication. |
Record Nr. | UNISA-996465407503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Communications and Multimedia Security : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings / / edited by Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XIV, 249 p. 83 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Biometry Computer networks Electronic commerce Data encryption (Computer science) Management information systems Computer science Systems and Data Security Biometrics Computer Communication Networks e-Commerce/e-business Cryptology Management of Computing and Information Systems |
ISBN | 3-642-40779-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Biometrics -- Applied cryptography -- Digital watermarking -- Steganography and forensics.- Social network privacy -- Security and authentication. |
Record Nr. | UNINA-9910483736503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Communications and Multimedia Security [[electronic resource] ] : 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012, Proceedings / / edited by Bart De Decker, David W. Chadwick |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (VIII, 239 p. 57 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Biometrics (Biology) E-commerce Computer communication systems Data encryption (Computer science) Management information systems Computer science Systems and Data Security Biometrics e-Commerce/e-business Computer Communication Networks Cryptology Management of Computing and Information Systems |
Soggetto genere / forma | Conference papers and proceedings. |
ISBN | 3-642-32805-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Image and Handwriting Analysis -- Authentication and Performance -- Biometrics, Forensics and Watermarking -- Communications Security. |
Record Nr. | UNISA-996465738703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Communications and Multimedia Security [[electronic resource] ] : 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings / / edited by Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XIV, 257 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Operating systems (Computers) Computer Communication Networks Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Operating Systems |
ISBN | 3-642-24712-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. Research papers -- pt. 2. Work in progress -- pt. 3. Posters -- pt. 4. Keynotes. |
Record Nr. | UNISA-996465876803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Communications and Multimedia Security [[electronic resource] ] : 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings / / edited by Bart De Decker, Ingrid Schaumüller-Bichl |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIII, 281 p. 74 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Operating systems (Computers) Data encryption (Computer science) Computer Communication Networks Operating Systems Cryptology |
ISBN |
1-280-38674-6
9786613564665 3-642-13241-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynotes -- Keynotes -- WiFi and RF Security -- A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks -- Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion -- XML and Web Services Security -- Throwing a MonkeyWrench into Web Attackers Plans -- Security in OpenSocial-Instrumented Social Networking Services -- Security for XML Data Binding -- Watermarking and Multimedia Security -- Watermark Detection for Video Bookmarking Using Mobile Phone Camera -- Watermark-Based Authentication and Key Exchange in Teleconferencing Systems -- Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking -- Analysis and Detection of Malicious Code and Risk Management -- Statistical Detection of Malicious PE-Executables for Fast Offline Analysis -- A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC) -- Business and IT Continuity Benchmarking -- VoIP Security -- Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks -- SIP Proxies: New Reflectors in the Internet -- Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal -- Biometrics -- Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication -- Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction -- Privacy Preserving Key Generation for Iris Biometrics -- Applied Cryptography -- Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare -- Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption -- Detecting Hidden Encrypted Volumes -- Secure Communications -- Tor HTTP Usage and Information Leakage -- Secure Communication Using Identity Based Encryption -- Anonymous Client Authentication for Transport Layer Security. |
Record Nr. | UNISA-996465894803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|