top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied Cryptography and Network Security [[electronic resource] ] : 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung
Applied Cryptography and Network Security [[electronic resource] ] : 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 614 p. 704 illus., 57 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Computers
Data structures (Computer science)
Software engineering
Systems and Data Security
Computer Systems Organization and Communication Networks
Computing Milieux
Data Structures and Information Theory
Information Systems and Communication Service
Software Engineering/Programming and Operating Systems
ISBN 3-030-21568-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Integrity and Cryptanalysis -- Digital Signature and MAC -- Software and Systems Security -- Blockchain and Cryptocurrency -- Post Quantum Cryptography -- Public Key and Commitment -- Theory of Cryptographic Implementations -- Privacy Preserving Techniques.
Record Nr. UNISA-996466329503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung
Applied Cryptography and Network Security : 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 614 p. 704 illus., 57 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Computers
Data structures (Computer science)
Software engineering
Systems and Data Security
Computer Systems Organization and Communication Networks
Computing Milieux
Data Structures and Information Theory
Information Systems and Communication Service
Software Engineering/Programming and Operating Systems
ISBN 3-030-21568-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Integrity and Cryptanalysis -- Digital Signature and MAC -- Software and Systems Security -- Blockchain and Cryptocurrency -- Post Quantum Cryptography -- Public Key and Commitment -- Theory of Cryptographic Implementations -- Privacy Preserving Techniques.
Record Nr. UNINA-9910337853103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptology and Network Security [[electronic resource] ] : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / / edited by Yi Mu, Robert H. Deng, Xinyi Huang
Cryptology and Network Security [[electronic resource] ] : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / / edited by Yi Mu, Robert H. Deng, Xinyi Huang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 540 p. 388 illus., 61 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Artificial intelligence
Data mining
Special purpose computers
Computer communication systems
Cryptology
Software Engineering/Programming and Operating Systems
Artificial Intelligence
Data Mining and Knowledge Discovery
Special Purpose and Application-Based Systems
Computer Communication Networks
ISBN 3-030-31578-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Homomorphic Encryption -- SIKE and Hash -- Lattice and Post-quantum Cryptography -- Searchable Encryption -- Blockchains, Cloud Security -- Secret Sharing and Interval Test -- LWE -- Encryption, Data Aggregation, and Revocation -- Signature, ML, Payment, and Factorization.
Record Nr. UNISA-996466447603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptology and Network Security : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / / edited by Yi Mu, Robert H. Deng, Xinyi Huang
Cryptology and Network Security : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / / edited by Yi Mu, Robert H. Deng, Xinyi Huang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 540 p. 388 illus., 61 illus. in color.)
Disciplina 005.82
005.824
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Artificial intelligence
Data mining
Special purpose computers
Computer communication systems
Cryptology
Software Engineering/Programming and Operating Systems
Artificial Intelligence
Data Mining and Knowledge Discovery
Special Purpose and Application-Based Systems
Computer Communication Networks
ISBN 3-030-31578-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Homomorphic Encryption -- SIKE and Hash -- Lattice and Post-quantum Cryptography -- Searchable Encryption -- Blockchains, Cloud Security -- Secret Sharing and Interval Test -- LWE -- Encryption, Data Aggregation, and Revocation -- Signature, ML, Payment, and Factorization.
Record Nr. UNINA-9910349274903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings / / edited by Robert H. Deng, Feng Bao, Jianying Zhou
Information and Communications Security [[electronic resource] ] : 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings / / edited by Robert H. Deng, Feng Bao, Jianying Zhou
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (XII, 500 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Computer science—Mathematics
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
ISBN 3-540-36159-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto System Security I -- Defenses against the Truncation of Computation Results of Free-Roaming Agents -- A Distributed Dynamic ?Firewall Architecture with Mobile Agents and KeyNote Trust Management System -- Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack -- An Evaluation of Different IP Traceback Approaches -- Security against Inference Attacks on Negative Information in Object-Oriented Databases -- Cryptosystem I -- Robust Key-Evolving Public Key Encryption Schemes -- A Group Signature Scheme Committing the Group -- Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions -- Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption -- Reducing the Memory Complexity of Type-Inference Algorithms -- Security Protocol I -- The Risks of Compromising Secret Information -- Password-Authenticated Key Exchange between Clients with Different Passwords -- Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction -- Attacking Predictable IPsec ESP Initialization Vectors -- Fingerprinting & Watermarking -- An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code -- A Robust Block Oriented Watermarking Scheme in Spatial Domain -- A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing -- Efficient Implementation of Algorithms -- Low Complexity Bit Serial Systolic Multipliers over GF(2m) for Three Classes of Finite Fields -- Fast Elliptic Curve Multiplications with SIMD Operations -- Further Results on Multiples of Primitive Polynomials and Their Products over GF(2) -- System Security II -- A Secure Object Sharing Scheme for Java Card -- IDS Interoperability and Correlation Using IDMEF and Commodity Systems -- A Synthetic Fraud Data Generation Methodology -- User Interaction Design for Secure Systems -- Using Independent Auditors as Intrusion Detection Systems -- Cryptosystem II -- Cellular Automata Based Cryptosystem (CAC) -- New Weak-Key Classes of IDEA -- Risks with Raw-Key Masking — The Security Evaluation of 2-Key XCBC -- A New Statistical Testing for Symmetric Ciphers and Hash Functions -- Message Authentication Codes with Error Correcting Capabilities -- Access Control -- The Consistency of an Access Control List -- Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies -- A Specification Language for Distributed Policy Control -- Access Control Infrastructure for Digital Objects -- Security Protocol II -- Distributed Key Generation as a Component of an Integrated Protocol -- A Secure Agent-Mediated Payment Protocol -- Cryptanalysis & Cryptographic Techniques -- Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties -- Related-Cipher Attacks -- A Chosen Plaintext Linear Attack on Block Cipher CIKS-1 -- Ideal Threshold Schemes from Orthogonal Arrays -- Cryptanalysis of the Reduced-Round RC6.
Record Nr. UNISA-996465555803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security : 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings / / edited by Robert H. Deng, Feng Bao, Jianying Zhou
Information and Communications Security : 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings / / edited by Robert H. Deng, Feng Bao, Jianying Zhou
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (XII, 500 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Computer science—Mathematics
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
ISBN 3-540-36159-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto System Security I -- Defenses against the Truncation of Computation Results of Free-Roaming Agents -- A Distributed Dynamic ?Firewall Architecture with Mobile Agents and KeyNote Trust Management System -- Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack -- An Evaluation of Different IP Traceback Approaches -- Security against Inference Attacks on Negative Information in Object-Oriented Databases -- Cryptosystem I -- Robust Key-Evolving Public Key Encryption Schemes -- A Group Signature Scheme Committing the Group -- Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions -- Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption -- Reducing the Memory Complexity of Type-Inference Algorithms -- Security Protocol I -- The Risks of Compromising Secret Information -- Password-Authenticated Key Exchange between Clients with Different Passwords -- Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction -- Attacking Predictable IPsec ESP Initialization Vectors -- Fingerprinting & Watermarking -- An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code -- A Robust Block Oriented Watermarking Scheme in Spatial Domain -- A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing -- Efficient Implementation of Algorithms -- Low Complexity Bit Serial Systolic Multipliers over GF(2m) for Three Classes of Finite Fields -- Fast Elliptic Curve Multiplications with SIMD Operations -- Further Results on Multiples of Primitive Polynomials and Their Products over GF(2) -- System Security II -- A Secure Object Sharing Scheme for Java Card -- IDS Interoperability and Correlation Using IDMEF and Commodity Systems -- A Synthetic Fraud Data Generation Methodology -- User Interaction Design for Secure Systems -- Using Independent Auditors as Intrusion Detection Systems -- Cryptosystem II -- Cellular Automata Based Cryptosystem (CAC) -- New Weak-Key Classes of IDEA -- Risks with Raw-Key Masking — The Security Evaluation of 2-Key XCBC -- A New Statistical Testing for Symmetric Ciphers and Hash Functions -- Message Authentication Codes with Error Correcting Capabilities -- Access Control -- The Consistency of an Access Control List -- Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies -- A Specification Language for Distributed Policy Control -- Access Control Infrastructure for Digital Objects -- Security Protocol II -- Distributed Key Generation as a Component of an Integrated Protocol -- A Secure Agent-Mediated Payment Protocol -- Cryptanalysis & Cryptographic Techniques -- Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties -- Related-Cipher Attacks -- A Chosen Plaintext Linear Attack on Block Cipher CIKS-1 -- Ideal Threshold Schemes from Orthogonal Arrays -- Cryptanalysis of the Reduced-Round RC6.
Record Nr. UNINA-9910143895903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings / / edited by Jianying Zhou, Robert H. Deng, Feng Bao
Information Security [[electronic resource] ] : 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings / / edited by Jianying Zhou, Robert H. Deng, Feng Bao
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 520 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computers and civilization
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Management of Computing and Information Systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings -- “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience -- A Privacy Preserving Rental System -- Key Management & Protocols -- Constant Round Dynamic Group Key Agreement -- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design -- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms -- On the Notion of Statistical Security in Simulatability Definitions -- Public Key Encryption & Signature -- Certificateless Public Key Encryption Without Pairing -- Tracing-by-Linking Group Signatures -- Chaum’s Designated Confirmer Signature Revisited -- Network Security II -- gore: Routing-Assisted Defense Against DDoS Attacks -- IPSec Support in NAT-PT Scenario for IPv6 Transition -- Signcryption -- Hybrid Signcryption Schemes with Outsider Security -- Analysis and Improvement of a Signcryption Scheme with Key Privacy -- Efficient and Proactive Threshold Signcryption -- Crypto Algorithm & Analysis -- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? -- Hardware Architecture and Cost Estimates for Breaking SHA-1 -- On the Security of Tweakable Modes of Operation: TBC and TAE -- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm -- Cryptography -- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing -- An Oblivious Transfer Protocol with Log-Squared Communication -- Applications -- Electronic Voting: Starting Over? -- Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System -- Universally Composable Time-Stamping Schemes with Audit -- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption -- Software Security -- Building a Cryptovirus Using Microsoft’s Cryptographic API -- On the Security of the WinRAR Encryption Method -- Towards Better Software Tamper Resistance -- Authorization & Access Control -- Device-Enabled Authorization in the Grey System -- Evaluating Access Control Policies Through Model Checking -- A Cryptographic Solution for General Access Control -- Student Papers -- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting -- A Formal Definition for Trust in Distributed Systems -- A Practical Voting Scheme with Receipts -- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation -- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.
Record Nr. UNISA-996465840403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang
Information Security Practice and Experience [[electronic resource] ] : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 380 p. 82 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Systems and Data Security
Cryptology
Management of Computing and Information Systems
ISBN 3-319-49151-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multiple topics in information security -- Information security in technologies -- Information security in systems -- Applications.
Record Nr. UNISA-996465771803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang
Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 380 p. 82 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Systems and Data Security
Cryptology
Management of Computing and Information Systems
ISBN 3-319-49151-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multiple topics in information security -- Information security in technologies -- Information security in systems -- Applications.
Record Nr. UNINA-9910484402903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings / / edited by Robert H. Deng, Tao Feng
Information Security Practice and Experience [[electronic resource] ] : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings / / edited by Robert H. Deng, Tao Feng
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 388 p. 72 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Systems and Data Security
Cryptology
Management of Computing and Information Systems
ISBN 3-642-38033-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection -- Trusted Identity Management for Overlay Networks -- Situational Awareness for Improving Network Resilience Management -- Optimal Defense Strategies for DDoS defender using Bayesian Game Model -- Identity-Based Cryptography -- Attribute Specified Identity-Based Encryption -- Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions -- Identity-based Multisignature with Message Recovery -- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme -- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures -- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release -- About Hash into Montgomery Form Elliptic Curves -- Secure RFID Ownership Transfer Protocols -- Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model -- Expressing User Access Authorization Exceptions in Conventional Role-based Access Control -- Cryptanalysis of the OKH Authenticated Encryption Scheme.
Record Nr. UNISA-996466177403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui