Boolean Functions and Their Applications in Cryptography / / by Chuan-Kun Wu, Dengguo Feng |
Autore | Wu Chuan-Kun |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (267 p.) |
Disciplina | 004 |
Collana | Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF) |
Soggetto topico |
Data structures (Computer science)
Computer security Computer science—Mathematics Data Structures and Information Theory Systems and Data Security Mathematics of Computing |
ISBN | 3-662-48865-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Boolean Functions and Their Walsh Transforms -- 2. Independence of Boolean Functions of Their Variables -- 3. Nonlinearity and Linear Structures of Boolean Functions -- 4. Correlation Immunity of Boolean Functions -- 5. Algebraic Immunity of Boolean Functions -- 6. The Symmetric Property of Boolean Functions -- 7.Boolean Function Representation of S-boxes and Boolean Permutations -- 8. Cryptographic Applications of Boolean Functions. |
Record Nr. | UNINA-9910255002503321 |
Wu Chuan-Kun | ||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberspace Safety and Security [[electronic resource] ] : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XXVI, 480 p. 149 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Computers and civilization Systems and Data Security Computer Communication Networks Cryptology Computers and Society |
ISBN | 3-319-03584-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data. |
Record Nr. | UNISA-996465385903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyberspace Safety and Security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XXVI, 480 p. 149 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer networks Data encryption (Computer science) Computers and civilization Systems and Data Security Computer Communication Networks Cryptology Computers and Society |
ISBN | 3-319-03584-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data. |
Record Nr. | UNINA-9910483379903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security and Cryptology [[electronic resource] ] : First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings / / edited by Dengguo Feng, Dongdai Lin, Moti Yung |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XII, 428 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) Coding theory Information theory Computer networks Operating systems (Computers) Algorithms Computers and civilization Cryptology Coding and Information Theory Computer Communication Networks Operating Systems Computers and Society |
ISBN |
3-540-32424-0
3-540-30855-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling -- Specifying Authentication Using Signal Events in CSP -- Modeling RFID Security -- Systems Security -- Enforcing Email Addresses Privacy Using Tokens -- Efficient Authentication of Electronic Document Workflow -- Signature Schemes -- Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms -- Efficient Group Signatures from Bilinear Pairing -- Enhanced Aggregate Signatures from Pairings -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream Generator -- HCTR: A Variable-Input-Length Enciphering Mode -- The kth-Order Quasi-Generalized Bent Functions over Ring Z p -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP -- An Improved Secure Two-Party Computation Protocol -- Threshold Cryptography -- Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes -- ID-Based Threshold Unsigncryption Scheme from Pairings -- Intrusion Detection Systems -- Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach -- The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control -- Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection -- Protocol Cryptanalysis -- Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes -- An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption -- ECC Algorithms -- A Remark on Implementing the Weil Pairing -- Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC -- Applications -- Key Management for Secure Overlay Multicast -- Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN -- Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault -- Secret Sharing -- Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes -- New Methods to Construct Cheating Immune Multisecret Sharing Scheme -- Denial of Service Attacks -- Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation -- MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. |
Record Nr. | UNISA-996465562003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information security and cryptology : first SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005 : proceedings / / Dengguo Feng, Dongdai Lin, Moti Yung (eds.) |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2005 |
Descrizione fisica | 1 online resource (XII, 428 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
FengDengguo
LinDongdai YungMoti |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Cryptography |
ISBN |
3-540-32424-0
3-540-30855-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling -- Specifying Authentication Using Signal Events in CSP -- Modeling RFID Security -- Systems Security -- Enforcing Email Addresses Privacy Using Tokens -- Efficient Authentication of Electronic Document Workflow -- Signature Schemes -- Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms -- Efficient Group Signatures from Bilinear Pairing -- Enhanced Aggregate Signatures from Pairings -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream Generator -- HCTR: A Variable-Input-Length Enciphering Mode -- The kth-Order Quasi-Generalized Bent Functions over Ring Z p -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP -- An Improved Secure Two-Party Computation Protocol -- Threshold Cryptography -- Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes -- ID-Based Threshold Unsigncryption Scheme from Pairings -- Intrusion Detection Systems -- Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach -- The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control -- Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection -- Protocol Cryptanalysis -- Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes -- An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption -- ECC Algorithms -- A Remark on Implementing the Weil Pairing -- Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC -- Applications -- Key Management for Secure Overlay Multicast -- Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN -- Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault -- Secret Sharing -- Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes -- New Methods to Construct Cheating Immune Multisecret Sharing Scheme -- Denial of Service Attacks -- Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation -- MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. |
Altri titoli varianti | CISC 2005 |
Record Nr. | UNINA-9910484539803321 |
Berlin ; ; New York, : Springer, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 5th Acm Symposium on Information, Computer and Communications Security |
Autore | Feng Dengguo |
Pubbl/distr/stampa | [Place of publication not identified] : , : Association for Computing Machinery, , 2010 |
Descrizione fisica | 1 online resource (363 pages) |
Collana | ACM Conferences. |
Soggetto topico | Information Technology - Computer Science (Hardware & Networks) |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | ASIACCS '10 |
Record Nr. | UNINA-9910376070903321 |
Feng Dengguo | ||
[Place of publication not identified] : , : Association for Computing Machinery, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trusted computing : principles and applications / / Dengguo Feng [and three others] |
Autore | Feng Dengguo |
Pubbl/distr/stampa | Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter : , : Tsinghua University Press, , 2018 |
Descrizione fisica | 1 online resource (314 pages) : illustrations |
Disciplina | 005.8 |
Collana | Advances in Computer Science |
Soggetto topico |
Information technology - Security measures
Information technology - Management |
Soggetto genere / forma | Electronic books. |
ISBN | 3-11-047609-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index |
Record Nr. | UNINA-9910467398203321 |
Feng Dengguo | ||
Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter : , : Tsinghua University Press, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trusted computing : principles and applications / / Dengguo Feng [and three others] |
Autore | Feng Dengguo |
Pubbl/distr/stampa | Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter : , : Tsinghua University Press, , 2018 |
Descrizione fisica | 1 online resource (314 pages) : illustrations |
Disciplina | 005.8 |
Collana | Advances in Computer Science |
Soggetto topico |
Information technology - Security measures
Information technology - Management |
ISBN | 3-11-047609-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index |
Record Nr. | UNINA-9910796606503321 |
Feng Dengguo | ||
Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter : , : Tsinghua University Press, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trusted computing : principles and applications / / Dengguo Feng [and three others] |
Autore | Feng Dengguo |
Pubbl/distr/stampa | Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter : , : Tsinghua University Press, , 2018 |
Descrizione fisica | 1 online resource (314 pages) : illustrations |
Disciplina | 005.8 |
Collana | Advances in Computer Science |
Soggetto topico |
Information technology - Security measures
Information technology - Management |
ISBN | 3-11-047609-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index |
Record Nr. | UNINA-9910809345803321 |
Feng Dengguo | ||
Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter : , : Tsinghua University Press, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|