top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2022 4th International Electronics Communication Conference (IECC) / / Qun Jin, Isao Echizen, Chin-Chen Chang, editors
2022 4th International Electronics Communication Conference (IECC) / / Qun Jin, Isao Echizen, Chin-Chen Chang, editors
Pubbl/distr/stampa New York, NY : , : Association for Computing Machinery, , 2022
Descrizione fisica 1 online resource (106 pages)
Disciplina 338.9
Collana ACM Other Conferences
Soggetto topico Economic development
Electronics - Congresses
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2022 4th International Electronics Communication Conference
Record Nr. UNINA-9910595455103321
New York, NY : , : Association for Computing Machinery, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Information and Computer Security [[electronic resource] ] : 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings / / edited by Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki
Advances in Information and Computer Security [[electronic resource] ] : 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings / / edited by Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 371 p. 83 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico User interfaces (Computer systems)
Computers and civilization
Computer programming
Computer security
Management information systems
Computer science
Data encryption (Computer science)
User Interfaces and Human Computer Interaction
Computers and Society
Programming Techniques
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Soggetto genere / forma Kongress.
ISBN 3-642-16825-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Automating Security Configuration and Administration: An Access Control Perspective -- Security Metrics and Security Investment Models -- Encryption -- Publishing Upper Half of RSA Decryption Exponent -- PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples -- A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model -- An Improvement of Key Generation Algorithm for Gentry’s Homomorphic Encryption Scheme -- Data and Web Security -- Practical Universal Random Sampling -- Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints -- Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel -- Validating Security Policy Conformance with WS-Security Requirements -- Protocols -- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption -- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage -- Group Signature Implies PKE with Non-interactive Opening and Threshold PKE -- Network Security -- A Generic Binary Analysis Method for Malware -- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs -- Securing MANET Multicast Using DIPLOMA -- Block Cipher -- Preimage Attacks against Variants of Very Smooth Hash -- Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification -- Mutual Information Analysis under the View of Higher-Order Statistics -- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter -- Implementation and Real Life Security -- Differential Addition in Generalized Edwards Coordinates -- Efficient Implementation of Pairing on BREW Mobile Phones -- Introducing Mitigation Use Cases to Enhance the Scope of Test Cases -- Optimal Adversary Behavior for the Serial Model of Financial Attack Trees.
Record Nr. UNISA-996466266603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in information and computer security : 5th International Workshop on Security, IWSEC 2010 : Kobe, Japan, November 22-24, 2010 : proceedings / / Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.)
Advances in information and computer security : 5th International Workshop on Security, IWSEC 2010 : Kobe, Japan, November 22-24, 2010 : proceedings / / Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, : Springer, 2010
Descrizione fisica 1 online resource (XIII, 371 p. 83 illus.)
Disciplina 005.8
Altri autori (Persone) EchizenIsao
KunihiroNoboru
SasakiRyoichi
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Computers - Access control
ISBN 3-642-16825-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited talks -- Encryption -- Data and Web security -- Protocols -- Network security -- Block cipher -- Implementation and real life security.
Record Nr. UNINA-9910483784003321
Berlin, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVI, 448 p. 224 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computers and civilization
Coding theory
Information theory
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computers and Society
Coding and Information Theory
ISBN 3-319-31960-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Digital Forensics -- Image Noise and Digital Image Forensics -- Camera Source Identification with Limited Labeled Training Set -- Detecting Video Forgery By Estimating Extrinsic Camera Parameters -- Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An Advanced Texture Analysis Method for Image Sharpening Detection -- Source Camera Model Identification Using Features from contaminated Sensor Noise -- Inter-frame Forgery Detection for Static-Background Video Based on MVP Consistency -- An Effective Detection Method Based On Physical Traits of Recaptured Images On LCD Screens -- Steganography and Steganalysis -- Video Steganalysis Based on Intra Prediction Mode Calibration -- Feature Selection for High Dimensional Steganalysis -- Synthetic speech detection and audio steganography in VoIP scenarios -- Digital Watermarking -- Fingerprinting for Broadcast Content Distribution System -- Image Watermarking Based on Reflectance Modification -- Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes -- An Authentication and Recovery Scheme for Digital Speech Signal based on DWT -- Enrichment of Visual Appearance of Aesthetic QR Code -- Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D Printers -- Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation -- Self-embedding Watermarking Scheme Based on MDS Codes -- Watermarking Method using Concatenated Code for Scaling and Rotation Attacks -- DCT-OFDM Based Watermarking Scheme Robust against Clipping, Rotation, and Scaling Attacks -- Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking -- Detection of frequency-scale modification using robust audio watermarking based on amplitude modulation -- Audio Watermarking Using Different Wavelet Filters -- Reversible Data Hiding -- A Commutative Encryption and Reversible Watermarking for Fingerprint Image -- Distortion-Free Robust Reversible Watermarking By Modifying and Recording IWT Means of Image Blocks -- Reversible Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography -- Authenticated Secret Sharing Scheme Based on GMEMD -- Robust Content-Based Image Hash Functions Using Nested Lattice Codes -- An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion -- A New Construction of Tagged Visual Cryptography Scheme.
Record Nr. UNISA-996466043203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital-Forensics and Watermarking : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
Digital-Forensics and Watermarking : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVI, 448 p. 224 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computers and civilization
Coding theory
Information theory
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computers and Society
Coding and Information Theory
ISBN 3-319-31960-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Digital Forensics -- Image Noise and Digital Image Forensics -- Camera Source Identification with Limited Labeled Training Set -- Detecting Video Forgery By Estimating Extrinsic Camera Parameters -- Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An Advanced Texture Analysis Method for Image Sharpening Detection -- Source Camera Model Identification Using Features from contaminated Sensor Noise -- Inter-frame Forgery Detection for Static-Background Video Based on MVP Consistency -- An Effective Detection Method Based On Physical Traits of Recaptured Images On LCD Screens -- Steganography and Steganalysis -- Video Steganalysis Based on Intra Prediction Mode Calibration -- Feature Selection for High Dimensional Steganalysis -- Synthetic speech detection and audio steganography in VoIP scenarios -- Digital Watermarking -- Fingerprinting for Broadcast Content Distribution System -- Image Watermarking Based on Reflectance Modification -- Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes -- An Authentication and Recovery Scheme for Digital Speech Signal based on DWT -- Enrichment of Visual Appearance of Aesthetic QR Code -- Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D Printers -- Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation -- Self-embedding Watermarking Scheme Based on MDS Codes -- Watermarking Method using Concatenated Code for Scaling and Rotation Attacks -- DCT-OFDM Based Watermarking Scheme Robust against Clipping, Rotation, and Scaling Attacks -- Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking -- Detection of frequency-scale modification using robust audio watermarking based on amplitude modulation -- Audio Watermarking Using Different Wavelet Filters -- Reversible Data Hiding -- A Commutative Encryption and Reversible Watermarking for Fingerprint Image -- Distortion-Free Robust Reversible Watermarking By Modifying and Recording IWT Means of Image Blocks -- Reversible Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography -- Authenticated Secret Sharing Scheme Based on GMEMD -- Robust Content-Based Image Hash Functions Using Nested Lattice Codes -- An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion -- A New Construction of Tagged Visual Cryptography Scheme.
Record Nr. UNINA-9910484517203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Frontiers in fake media generation and detection / / edited by Mahdi Khosravy, Isao Echizen, Noboru Babaguchi
Frontiers in fake media generation and detection / / edited by Mahdi Khosravy, Isao Echizen, Noboru Babaguchi
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (278 pages)
Disciplina 303.375
Collana Studies in Autonomic, Data-Driven and Industrial Computing
Soggetto topico Fake news
ISBN 981-19-1524-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910574062003321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui