2022 4th International Electronics Communication Conference (IECC) / / Qun Jin, Isao Echizen, Chin-Chen Chang, editors |
Pubbl/distr/stampa | New York, NY : , : Association for Computing Machinery, , 2022 |
Descrizione fisica | 1 online resource (106 pages) |
Disciplina | 338.9 |
Collana | ACM Other Conferences |
Soggetto topico |
Economic development
Electronics - Congresses |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | 2022 4th International Electronics Communication Conference |
Record Nr. | UNINA-9910595455103321 |
New York, NY : , : Association for Computing Machinery, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Information and Computer Security [[electronic resource] ] : 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings / / edited by Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIII, 371 p. 83 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
User interfaces (Computer systems)
Computers and civilization Computer programming Computer security Management information systems Computer science Data encryption (Computer science) User Interfaces and Human Computer Interaction Computers and Society Programming Techniques Systems and Data Security Management of Computing and Information Systems Cryptology |
Soggetto genere / forma | Kongress. |
ISBN | 3-642-16825-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Automating Security Configuration and Administration: An Access Control Perspective -- Security Metrics and Security Investment Models -- Encryption -- Publishing Upper Half of RSA Decryption Exponent -- PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples -- A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model -- An Improvement of Key Generation Algorithm for Gentry’s Homomorphic Encryption Scheme -- Data and Web Security -- Practical Universal Random Sampling -- Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints -- Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel -- Validating Security Policy Conformance with WS-Security Requirements -- Protocols -- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption -- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage -- Group Signature Implies PKE with Non-interactive Opening and Threshold PKE -- Network Security -- A Generic Binary Analysis Method for Malware -- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs -- Securing MANET Multicast Using DIPLOMA -- Block Cipher -- Preimage Attacks against Variants of Very Smooth Hash -- Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification -- Mutual Information Analysis under the View of Higher-Order Statistics -- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter -- Implementation and Real Life Security -- Differential Addition in Generalized Edwards Coordinates -- Efficient Implementation of Pairing on BREW Mobile Phones -- Introducing Mitigation Use Cases to Enhance the Scope of Test Cases -- Optimal Adversary Behavior for the Serial Model of Financial Attack Trees. |
Record Nr. | UNISA-996466266603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in information and computer security : 5th International Workshop on Security, IWSEC 2010 : Kobe, Japan, November 22-24, 2010 : proceedings / / Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, : Springer, 2010 |
Descrizione fisica | 1 online resource (XIII, 371 p. 83 illus.) |
Disciplina | 005.8 |
Altri autori (Persone) |
EchizenIsao
KunihiroNoboru SasakiRyoichi |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Computer security
Computers - Access control |
ISBN | 3-642-16825-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited talks -- Encryption -- Data and Web security -- Protocols -- Network security -- Block cipher -- Implementation and real life security. |
Record Nr. | UNINA-9910483784003321 |
Berlin, : Springer, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital-Forensics and Watermarking [[electronic resource] ] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XVI, 448 p. 224 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Algorithms Computers and civilization Coding theory Information theory Cryptology Systems and Data Security Algorithm Analysis and Problem Complexity Computers and Society Coding and Information Theory |
ISBN | 3-319-31960-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Digital Forensics -- Image Noise and Digital Image Forensics -- Camera Source Identification with Limited Labeled Training Set -- Detecting Video Forgery By Estimating Extrinsic Camera Parameters -- Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An Advanced Texture Analysis Method for Image Sharpening Detection -- Source Camera Model Identification Using Features from contaminated Sensor Noise -- Inter-frame Forgery Detection for Static-Background Video Based on MVP Consistency -- An Effective Detection Method Based On Physical Traits of Recaptured Images On LCD Screens -- Steganography and Steganalysis -- Video Steganalysis Based on Intra Prediction Mode Calibration -- Feature Selection for High Dimensional Steganalysis -- Synthetic speech detection and audio steganography in VoIP scenarios -- Digital Watermarking -- Fingerprinting for Broadcast Content Distribution System -- Image Watermarking Based on Reflectance Modification -- Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes -- An Authentication and Recovery Scheme for Digital Speech Signal based on DWT -- Enrichment of Visual Appearance of Aesthetic QR Code -- Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D Printers -- Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation -- Self-embedding Watermarking Scheme Based on MDS Codes -- Watermarking Method using Concatenated Code for Scaling and Rotation Attacks -- DCT-OFDM Based Watermarking Scheme Robust against Clipping, Rotation, and Scaling Attacks -- Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking -- Detection of frequency-scale modification using robust audio watermarking based on amplitude modulation -- Audio Watermarking Using Different Wavelet Filters -- Reversible Data Hiding -- A Commutative Encryption and Reversible Watermarking for Fingerprint Image -- Distortion-Free Robust Reversible Watermarking By Modifying and Recording IWT Means of Image Blocks -- Reversible Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography -- Authenticated Secret Sharing Scheme Based on GMEMD -- Robust Content-Based Image Hash Functions Using Nested Lattice Codes -- An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion -- A New Construction of Tagged Visual Cryptography Scheme. |
Record Nr. | UNISA-996466043203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Digital-Forensics and Watermarking : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers / / edited by Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González, Isao Echizen |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XVI, 448 p. 224 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Algorithms Computers and civilization Coding theory Information theory Cryptology Systems and Data Security Algorithm Analysis and Problem Complexity Computers and Society Coding and Information Theory |
ISBN | 3-319-31960-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Digital Forensics -- Image Noise and Digital Image Forensics -- Camera Source Identification with Limited Labeled Training Set -- Detecting Video Forgery By Estimating Extrinsic Camera Parameters -- Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients.-An Advanced Texture Analysis Method for Image Sharpening Detection -- Source Camera Model Identification Using Features from contaminated Sensor Noise -- Inter-frame Forgery Detection for Static-Background Video Based on MVP Consistency -- An Effective Detection Method Based On Physical Traits of Recaptured Images On LCD Screens -- Steganography and Steganalysis -- Video Steganalysis Based on Intra Prediction Mode Calibration -- Feature Selection for High Dimensional Steganalysis -- Synthetic speech detection and audio steganography in VoIP scenarios -- Digital Watermarking -- Fingerprinting for Broadcast Content Distribution System -- Image Watermarking Based on Reflectance Modification -- Digital Video Watermark Optimization for Detecting Replicated Two-Dimensional Barcodes -- An Authentication and Recovery Scheme for Digital Speech Signal based on DWT -- Enrichment of Visual Appearance of Aesthetic QR Code -- Nondestructive Readout of Copyright Information Embedded in Objects Fabricated with 3-D Printers -- Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation -- Self-embedding Watermarking Scheme Based on MDS Codes -- Watermarking Method using Concatenated Code for Scaling and Rotation Attacks -- DCT-OFDM Based Watermarking Scheme Robust against Clipping, Rotation, and Scaling Attacks -- Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking -- Detection of frequency-scale modification using robust audio watermarking based on amplitude modulation -- Audio Watermarking Using Different Wavelet Filters -- Reversible Data Hiding -- A Commutative Encryption and Reversible Watermarking for Fingerprint Image -- Distortion-Free Robust Reversible Watermarking By Modifying and Recording IWT Means of Image Blocks -- Reversible Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography -- Authenticated Secret Sharing Scheme Based on GMEMD -- Robust Content-Based Image Hash Functions Using Nested Lattice Codes -- An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion -- A New Construction of Tagged Visual Cryptography Scheme. |
Record Nr. | UNINA-9910484517203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Frontiers in fake media generation and detection / / edited by Mahdi Khosravy, Isao Echizen, Noboru Babaguchi |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (278 pages) |
Disciplina | 303.375 |
Collana | Studies in Autonomic, Data-Driven and Industrial Computing |
Soggetto topico | Fake news |
ISBN | 981-19-1524-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910574062003321 |
Singapore : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|