Applied Cryptography and Network Security Workshops [[electronic resource] ] : ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIV, 193 p. 41 illus., 28 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computer networks - Security measures Data encryption (Computer science) Machine learning Application software Systems and Data Security Computer Communication Networks Mobile and Network Security Cryptology Machine Learning Information Systems Applications (incl. Internet) |
ISBN | 3-030-29729-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | SiMLA - Security in Machine Learning and its Applications -- Risk-based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics -- Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks -- Cloud S&P - Cloud Security and Privacy -- Graphene: A Secure Cloud Communication Architecture -- A Survey on Machine Learning applications for Software Defined Network Security -- AIBlock - Application Intelligence and Blockchain Security -- A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations -- BSIEM-IoT: A Blockchain-based and Distributed SIEM for the Internet of Things -- Towards Blockchained Challenge-based Collaborative Intrusion Detection -- AIoTS - Artificial Intelligence and Industrial Internet-of-Things Security -- Enhancement to the Privacy-aware Authentication for Wi-Fi based Indoor Positioning Systems -- Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set -- Strong Leakage Resilient Encryption by Hiding Partial Ciphertext. |
Record Nr. | UNISA-996466435403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Cryptography and Network Security Workshops [[electronic resource] ] : ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIV, 193 p. 41 illus., 28 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computer networks - Security measures Data encryption (Computer science) Machine learning Application software Systems and Data Security Computer Communication Networks Mobile and Network Security Cryptology Machine Learning Information Systems Applications (incl. Internet) |
ISBN | 3-030-29729-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | SiMLA - Security in Machine Learning and its Applications -- Risk-based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics -- Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks -- Cloud S&P - Cloud Security and Privacy -- Graphene: A Secure Cloud Communication Architecture -- A Survey on Machine Learning applications for Software Defined Network Security -- AIBlock - Application Intelligence and Blockchain Security -- A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations -- BSIEM-IoT: A Blockchain-based and Distributed SIEM for the Internet of Things -- Towards Blockchained Challenge-based Collaborative Intrusion Detection -- AIoTS - Artificial Intelligence and Industrial Internet-of-Things Security -- Enhancement to the Privacy-aware Authentication for Wi-Fi based Indoor Positioning Systems -- Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set -- Strong Leakage Resilient Encryption by Hiding Partial Ciphertext. |
Record Nr. | UNINA-9910349306203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security Practice and Experience [[electronic resource] ] : Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings / / edited by Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XIV, 392 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Computers and civilization Management information systems Computer science Information retrieval Cryptology Computer Communication Networks Operating Systems Computers and Society Management of Computing and Information Systems Information Storage and Retrieval |
ISBN | 3-540-33058-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptoanalysis -- DPA-Resistant Finite Field Multipliers and Secure AES Design -- Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication -- Diophantine Approximation Attack on a Fast Public Key Cryptosystem -- Further Security Analysis of XTR -- Network Security I -- A Counting-Based Method for Massive Spam Mail Classification -- Model and Estimation of Worm Propagation Under Network Partition -- Tackling Worm Detection Speed and False Alarm in Virus Throttling -- Network Security II -- Using Data Field to Analyze Network Intrusions -- Adversarial Organization Modeling for Network Attack/Defense -- A Novel Dynamic Immunization Strategy for Computer Network Epidemics -- Preventing Web-Spoofing with Automatic Detecting Security Indicator -- Security Protocol -- Security Protocol Analysis with Improved Authentication Tests -- A Protocol of Member-Join in a Secret Sharing Scheme -- More on Shared-Scalar-Product Protocols -- Communication Security -- Efficient Public Key Broadcast Encryption Using Identifier of Receivers -- A Practical Clumped-Tree Multicast Encryption Scheme -- Trojan Horse Attack Strategy on Quantum Private Communication -- Signature and Key Agreement -- Linkable Democratic Group Signatures -- Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings -- Short (Identity-Based) Strong Designated Verifier Signature Schemes -- Identity Based Key Insulated Signature -- Application I -- Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems -- A Design and Implementation of Profile Based Web Application Securing Proxy -- An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards -- Application II -- Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments -- Using ?-Calculus to Formalize Domain Administration of RBAC -- An Efficient Way to Build Secure Disk -- Practical Forensic Analysis in Advanced Access Content System -- Cryptographic Techniques -- Security Analysis of a Server-Aided RSA Key Generation Protocol -- Integrating Grid with Cryptographic Computing -- Three-Round Secret Handshakes Based on ElGamal and DSA -- System Security -- Securing C Programs by Dynamic Type Checking -- A Chaos-Based Robust Software Watermarking -- Privately Retrieve Data from Large Databases -- An Empirical Study of Quality and Cost Based Security Engineering. |
Record Nr. | UNINA-9910483262903321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security Practice and Experience [[electronic resource] ] : Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings / / edited by Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XIV, 392 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Computers and civilization Management information systems Computer science Information retrieval Cryptology Computer Communication Networks Operating Systems Computers and Society Management of Computing and Information Systems Information Storage and Retrieval |
ISBN | 3-540-33058-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptoanalysis -- DPA-Resistant Finite Field Multipliers and Secure AES Design -- Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication -- Diophantine Approximation Attack on a Fast Public Key Cryptosystem -- Further Security Analysis of XTR -- Network Security I -- A Counting-Based Method for Massive Spam Mail Classification -- Model and Estimation of Worm Propagation Under Network Partition -- Tackling Worm Detection Speed and False Alarm in Virus Throttling -- Network Security II -- Using Data Field to Analyze Network Intrusions -- Adversarial Organization Modeling for Network Attack/Defense -- A Novel Dynamic Immunization Strategy for Computer Network Epidemics -- Preventing Web-Spoofing with Automatic Detecting Security Indicator -- Security Protocol -- Security Protocol Analysis with Improved Authentication Tests -- A Protocol of Member-Join in a Secret Sharing Scheme -- More on Shared-Scalar-Product Protocols -- Communication Security -- Efficient Public Key Broadcast Encryption Using Identifier of Receivers -- A Practical Clumped-Tree Multicast Encryption Scheme -- Trojan Horse Attack Strategy on Quantum Private Communication -- Signature and Key Agreement -- Linkable Democratic Group Signatures -- Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings -- Short (Identity-Based) Strong Designated Verifier Signature Schemes -- Identity Based Key Insulated Signature -- Application I -- Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems -- A Design and Implementation of Profile Based Web Application Securing Proxy -- An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards -- Application II -- Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments -- Using ?-Calculus to Formalize Domain Administration of RBAC -- An Efficient Way to Build Secure Disk -- Practical Forensic Analysis in Advanced Access Content System -- Cryptographic Techniques -- Security Analysis of a Server-Aided RSA Key Generation Protocol -- Integrating Grid with Cryptographic Computing -- Three-Round Secret Handshakes Based on ElGamal and DSA -- System Security -- Securing C Programs by Dynamic Type Checking -- A Chaos-Based Robust Software Watermarking -- Privately Retrieve Data from Large Databases -- An Empirical Study of Quality and Cost Based Security Engineering. |
Record Nr. | UNISA-996465794203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Proceedings of the ACM Symposium on Information, Computer, and Communications Security : ASIACCS'07, Singapore, March 20-22, 2007 |
Autore | Bao Feng |
Pubbl/distr/stampa | [Place of publication not identified], : Association for Computing Machinery, 2007 |
Descrizione fisica | 1 online resource (323 p.;) |
Collana | ACM Conferences |
Soggetto topico |
Computer security - Security measures
Computer networks Data protection Engineering & Applied Sciences Computer Science |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | ASIACCS '07 |
Record Nr. | UNINA-9910376493603321 |
Bao Feng
![]() |
||
[Place of publication not identified], : Association for Computing Machinery, 2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Public Key Cryptography -- PKC 2004 [[electronic resource] ] : 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 / / edited by Feng Bao, Robert Deng, Jianying Zhou |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XIII, 459 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Algorithms Computers and civilization Management information systems Computer science Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Computers and Society Management of Computing and Information Systems |
ISBN |
1-280-30691-2
9786610306916 3-540-24632-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Generalized Wiener Attack on RSA -- Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem -- Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism -- Application of Montgomery’s Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point -- Fast Arithmetic on Jacobians of Picard Curves -- Undeniable Signatures Based on Characters: How to Sign with One Bit -- Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures -- Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model -- Constant Round Authenticated Group Key Agreement via Distributed Computation -- Efficient ID-based Group Key Agreement with Bilinear Maps -- New Security Results on Encrypted Key Exchange -- New Results on the Hardness of Diffie-Hellman Bits -- Short Exponent Diffie-Hellman Problems -- Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups -- Algebraic Attacks over GF(2 k ), Application to HFE Challenge 2 and Sflash-v2 -- Secret Exponent Attacks on RSA-type Schemes with Moduli N=p r q -- General Group Authentication Codes and Their Relation to “Unconditionally-Secure Signatures” -- From Digital Signature to ID-based Identification/Signature -- Identity-Based Threshold Decryption -- An Efficient Signature Scheme from Bilinear Pairings and Its Applications -- An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications -- A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation -- Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability -- A Point Compression Method for Elliptic Curves Defined over GF(2 n ) -- On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny -- On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? -- QuasiModo: Efficient Certificate Validation and Revocation -- A Distributed Online Certificate Status Protocol with a Single Public Key -- A First Approach to Provide Anonymity in Attribute Certificates -- A Nonuniform Algorithm for the Hidden Number Problem in Subgroups -- Cryptographic Randomized Response Techniques -- A Correct, Private, and Efficient Mix Network. |
Record Nr. | UNINA-9910144206703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Public Key Cryptography -- PKC 2004 [[electronic resource] ] : 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 / / edited by Feng Bao, Robert Deng, Jianying Zhou |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XIII, 459 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Algorithms Computers and civilization Management information systems Computer science Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Computers and Society Management of Computing and Information Systems |
ISBN |
1-280-30691-2
9786610306916 3-540-24632-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Generalized Wiener Attack on RSA -- Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem -- Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism -- Application of Montgomery’s Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point -- Fast Arithmetic on Jacobians of Picard Curves -- Undeniable Signatures Based on Characters: How to Sign with One Bit -- Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures -- Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model -- Constant Round Authenticated Group Key Agreement via Distributed Computation -- Efficient ID-based Group Key Agreement with Bilinear Maps -- New Security Results on Encrypted Key Exchange -- New Results on the Hardness of Diffie-Hellman Bits -- Short Exponent Diffie-Hellman Problems -- Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups -- Algebraic Attacks over GF(2 k ), Application to HFE Challenge 2 and Sflash-v2 -- Secret Exponent Attacks on RSA-type Schemes with Moduli N=p r q -- General Group Authentication Codes and Their Relation to “Unconditionally-Secure Signatures” -- From Digital Signature to ID-based Identification/Signature -- Identity-Based Threshold Decryption -- An Efficient Signature Scheme from Bilinear Pairings and Its Applications -- An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications -- A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation -- Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability -- A Point Compression Method for Elliptic Curves Defined over GF(2 n ) -- On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny -- On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? -- QuasiModo: Efficient Certificate Validation and Revocation -- A Distributed Online Certificate Status Protocol with a Single Public Key -- A First Approach to Provide Anonymity in Attribute Certificates -- A Nonuniform Algorithm for the Hidden Number Problem in Subgroups -- Cryptographic Randomized Response Techniques -- A Correct, Private, and Efficient Mix Network. |
Record Nr. | UNISA-996465414403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Privacy in Communication Networks [[electronic resource] ] : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings / / edited by Robert Deng, Jian Weng, Kui Ren, Vinod Yegneswaran |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XV, 781 p. 256 illus.) |
Disciplina | 005.8 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer security
Data protection Data encryption (Computer science) Computer communication systems Computers and civilization Artificial intelligence Systems and Data Security Security Cryptology Computer Communication Networks Computers and Society Artificial Intelligence |
ISBN | 3-319-59608-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910254812703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|