top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied Cryptography and Network Security Workshops [[electronic resource] ] : ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang
Applied Cryptography and Network Security Workshops [[electronic resource] ] : ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIV, 193 p. 41 illus., 28 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Computer networks - Security measures
Data encryption (Computer science)
Machine learning
Application software
Systems and Data Security
Computer Communication Networks
Mobile and Network Security
Cryptology
Machine Learning
Information Systems Applications (incl. Internet)
ISBN 3-030-29729-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SiMLA - Security in Machine Learning and its Applications -- Risk-based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics -- Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks -- Cloud S&P - Cloud Security and Privacy -- Graphene: A Secure Cloud Communication Architecture -- A Survey on Machine Learning applications for Software Defined Network Security -- AIBlock - Application Intelligence and Blockchain Security -- A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations -- BSIEM-IoT: A Blockchain-based and Distributed SIEM for the Internet of Things -- Towards Blockchained Challenge-based Collaborative Intrusion Detection -- AIoTS - Artificial Intelligence and Industrial Internet-of-Things Security -- Enhancement to the Privacy-aware Authentication for Wi-Fi based Indoor Positioning Systems -- Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set -- Strong Leakage Resilient Encryption by Hiding Partial Ciphertext.
Record Nr. UNISA-996466435403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security Workshops [[electronic resource] ] : ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang
Applied Cryptography and Network Security Workshops [[electronic resource] ] : ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIV, 193 p. 41 illus., 28 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Computer networks - Security measures
Data encryption (Computer science)
Machine learning
Application software
Systems and Data Security
Computer Communication Networks
Mobile and Network Security
Cryptology
Machine Learning
Information Systems Applications (incl. Internet)
ISBN 3-030-29729-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SiMLA - Security in Machine Learning and its Applications -- Risk-based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics -- Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks -- Cloud S&P - Cloud Security and Privacy -- Graphene: A Secure Cloud Communication Architecture -- A Survey on Machine Learning applications for Software Defined Network Security -- AIBlock - Application Intelligence and Blockchain Security -- A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations -- BSIEM-IoT: A Blockchain-based and Distributed SIEM for the Internet of Things -- Towards Blockchained Challenge-based Collaborative Intrusion Detection -- AIoTS - Artificial Intelligence and Industrial Internet-of-Things Security -- Enhancement to the Privacy-aware Authentication for Wi-Fi based Indoor Positioning Systems -- Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set -- Strong Leakage Resilient Encryption by Hiding Partial Ciphertext.
Record Nr. UNINA-9910349306203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings / / edited by Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou
Information Security Practice and Experience [[electronic resource] ] : Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings / / edited by Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 392 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Computers and civilization
Management information systems
Computer science
Information retrieval
Cryptology
Computer Communication Networks
Operating Systems
Computers and Society
Management of Computing and Information Systems
Information Storage and Retrieval
ISBN 3-540-33058-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptoanalysis -- DPA-Resistant Finite Field Multipliers and Secure AES Design -- Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication -- Diophantine Approximation Attack on a Fast Public Key Cryptosystem -- Further Security Analysis of XTR -- Network Security I -- A Counting-Based Method for Massive Spam Mail Classification -- Model and Estimation of Worm Propagation Under Network Partition -- Tackling Worm Detection Speed and False Alarm in Virus Throttling -- Network Security II -- Using Data Field to Analyze Network Intrusions -- Adversarial Organization Modeling for Network Attack/Defense -- A Novel Dynamic Immunization Strategy for Computer Network Epidemics -- Preventing Web-Spoofing with Automatic Detecting Security Indicator -- Security Protocol -- Security Protocol Analysis with Improved Authentication Tests -- A Protocol of Member-Join in a Secret Sharing Scheme -- More on Shared-Scalar-Product Protocols -- Communication Security -- Efficient Public Key Broadcast Encryption Using Identifier of Receivers -- A Practical Clumped-Tree Multicast Encryption Scheme -- Trojan Horse Attack Strategy on Quantum Private Communication -- Signature and Key Agreement -- Linkable Democratic Group Signatures -- Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings -- Short (Identity-Based) Strong Designated Verifier Signature Schemes -- Identity Based Key Insulated Signature -- Application I -- Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems -- A Design and Implementation of Profile Based Web Application Securing Proxy -- An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards -- Application II -- Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments -- Using ?-Calculus to Formalize Domain Administration of RBAC -- An Efficient Way to Build Secure Disk -- Practical Forensic Analysis in Advanced Access Content System -- Cryptographic Techniques -- Security Analysis of a Server-Aided RSA Key Generation Protocol -- Integrating Grid with Cryptographic Computing -- Three-Round Secret Handshakes Based on ElGamal and DSA -- System Security -- Securing C Programs by Dynamic Type Checking -- A Chaos-Based Robust Software Watermarking -- Privately Retrieve Data from Large Databases -- An Empirical Study of Quality and Cost Based Security Engineering.
Record Nr. UNINA-9910483262903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings / / edited by Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou
Information Security Practice and Experience [[electronic resource] ] : Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings / / edited by Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 392 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Computers and civilization
Management information systems
Computer science
Information retrieval
Cryptology
Computer Communication Networks
Operating Systems
Computers and Society
Management of Computing and Information Systems
Information Storage and Retrieval
ISBN 3-540-33058-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptoanalysis -- DPA-Resistant Finite Field Multipliers and Secure AES Design -- Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication -- Diophantine Approximation Attack on a Fast Public Key Cryptosystem -- Further Security Analysis of XTR -- Network Security I -- A Counting-Based Method for Massive Spam Mail Classification -- Model and Estimation of Worm Propagation Under Network Partition -- Tackling Worm Detection Speed and False Alarm in Virus Throttling -- Network Security II -- Using Data Field to Analyze Network Intrusions -- Adversarial Organization Modeling for Network Attack/Defense -- A Novel Dynamic Immunization Strategy for Computer Network Epidemics -- Preventing Web-Spoofing with Automatic Detecting Security Indicator -- Security Protocol -- Security Protocol Analysis with Improved Authentication Tests -- A Protocol of Member-Join in a Secret Sharing Scheme -- More on Shared-Scalar-Product Protocols -- Communication Security -- Efficient Public Key Broadcast Encryption Using Identifier of Receivers -- A Practical Clumped-Tree Multicast Encryption Scheme -- Trojan Horse Attack Strategy on Quantum Private Communication -- Signature and Key Agreement -- Linkable Democratic Group Signatures -- Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings -- Short (Identity-Based) Strong Designated Verifier Signature Schemes -- Identity Based Key Insulated Signature -- Application I -- Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems -- A Design and Implementation of Profile Based Web Application Securing Proxy -- An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards -- Application II -- Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments -- Using ?-Calculus to Formalize Domain Administration of RBAC -- An Efficient Way to Build Secure Disk -- Practical Forensic Analysis in Advanced Access Content System -- Cryptographic Techniques -- Security Analysis of a Server-Aided RSA Key Generation Protocol -- Integrating Grid with Cryptographic Computing -- Three-Round Secret Handshakes Based on ElGamal and DSA -- System Security -- Securing C Programs by Dynamic Type Checking -- A Chaos-Based Robust Software Watermarking -- Privately Retrieve Data from Large Databases -- An Empirical Study of Quality and Cost Based Security Engineering.
Record Nr. UNISA-996465794203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Proceedings of the ACM Symposium on Information, Computer, and Communications Security : ASIACCS'07, Singapore, March 20-22, 2007
Proceedings of the ACM Symposium on Information, Computer, and Communications Security : ASIACCS'07, Singapore, March 20-22, 2007
Autore Bao Feng
Pubbl/distr/stampa [Place of publication not identified], : Association for Computing Machinery, 2007
Descrizione fisica 1 online resource (323 p.;)
Collana ACM Conferences
Soggetto topico Computer security - Security measures
Computer networks
Data protection
Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti ASIACCS '07
Record Nr. UNINA-9910376493603321
Bao Feng  
[Place of publication not identified], : Association for Computing Machinery, 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public Key Cryptography -- PKC 2004 [[electronic resource] ] : 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 / / edited by Feng Bao, Robert Deng, Jianying Zhou
Public Key Cryptography -- PKC 2004 [[electronic resource] ] : 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 / / edited by Feng Bao, Robert Deng, Jianying Zhou
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XIII, 459 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Computers and civilization
Management information systems
Computer science
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Computers and Society
Management of Computing and Information Systems
ISBN 1-280-30691-2
9786610306916
3-540-24632-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Generalized Wiener Attack on RSA -- Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem -- Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism -- Application of Montgomery’s Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point -- Fast Arithmetic on Jacobians of Picard Curves -- Undeniable Signatures Based on Characters: How to Sign with One Bit -- Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures -- Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model -- Constant Round Authenticated Group Key Agreement via Distributed Computation -- Efficient ID-based Group Key Agreement with Bilinear Maps -- New Security Results on Encrypted Key Exchange -- New Results on the Hardness of Diffie-Hellman Bits -- Short Exponent Diffie-Hellman Problems -- Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups -- Algebraic Attacks over GF(2 k ), Application to HFE Challenge 2 and Sflash-v2 -- Secret Exponent Attacks on RSA-type Schemes with Moduli N=p r q -- General Group Authentication Codes and Their Relation to “Unconditionally-Secure Signatures” -- From Digital Signature to ID-based Identification/Signature -- Identity-Based Threshold Decryption -- An Efficient Signature Scheme from Bilinear Pairings and Its Applications -- An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications -- A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation -- Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability -- A Point Compression Method for Elliptic Curves Defined over GF(2 n ) -- On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny -- On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? -- QuasiModo: Efficient Certificate Validation and Revocation -- A Distributed Online Certificate Status Protocol with a Single Public Key -- A First Approach to Provide Anonymity in Attribute Certificates -- A Nonuniform Algorithm for the Hidden Number Problem in Subgroups -- Cryptographic Randomized Response Techniques -- A Correct, Private, and Efficient Mix Network.
Record Nr. UNINA-9910144206703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public Key Cryptography -- PKC 2004 [[electronic resource] ] : 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 / / edited by Feng Bao, Robert Deng, Jianying Zhou
Public Key Cryptography -- PKC 2004 [[electronic resource] ] : 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 / / edited by Feng Bao, Robert Deng, Jianying Zhou
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XIII, 459 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Computers and civilization
Management information systems
Computer science
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Computers and Society
Management of Computing and Information Systems
ISBN 1-280-30691-2
9786610306916
3-540-24632-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Generalized Wiener Attack on RSA -- Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem -- Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism -- Application of Montgomery’s Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point -- Fast Arithmetic on Jacobians of Picard Curves -- Undeniable Signatures Based on Characters: How to Sign with One Bit -- Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures -- Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model -- Constant Round Authenticated Group Key Agreement via Distributed Computation -- Efficient ID-based Group Key Agreement with Bilinear Maps -- New Security Results on Encrypted Key Exchange -- New Results on the Hardness of Diffie-Hellman Bits -- Short Exponent Diffie-Hellman Problems -- Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups -- Algebraic Attacks over GF(2 k ), Application to HFE Challenge 2 and Sflash-v2 -- Secret Exponent Attacks on RSA-type Schemes with Moduli N=p r q -- General Group Authentication Codes and Their Relation to “Unconditionally-Secure Signatures” -- From Digital Signature to ID-based Identification/Signature -- Identity-Based Threshold Decryption -- An Efficient Signature Scheme from Bilinear Pairings and Its Applications -- An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications -- A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation -- Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability -- A Point Compression Method for Elliptic Curves Defined over GF(2 n ) -- On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny -- On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? -- QuasiModo: Efficient Certificate Validation and Revocation -- A Distributed Online Certificate Status Protocol with a Single Public Key -- A First Approach to Provide Anonymity in Attribute Certificates -- A Nonuniform Algorithm for the Hidden Number Problem in Subgroups -- Cryptographic Randomized Response Techniques -- A Correct, Private, and Efficient Mix Network.
Record Nr. UNISA-996465414403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Privacy in Communication Networks [[electronic resource] ] : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings / / edited by Robert Deng, Jian Weng, Kui Ren, Vinod Yegneswaran
Security and Privacy in Communication Networks [[electronic resource] ] : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings / / edited by Robert Deng, Jian Weng, Kui Ren, Vinod Yegneswaran
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XV, 781 p. 256 illus.)
Disciplina 005.8
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Computer communication systems
Computers and civilization
Artificial intelligence
Systems and Data Security
Security
Cryptology
Computer Communication Networks
Computers and Society
Artificial Intelligence
ISBN 3-319-59608-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910254812703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui