top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Boolean Functions and Their Applications in Cryptography / / by Chuan-Kun Wu, Dengguo Feng
Boolean Functions and Their Applications in Cryptography / / by Chuan-Kun Wu, Dengguo Feng
Autore Wu Chuan-Kun
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (267 p.)
Disciplina 004
Collana Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF)
Soggetto topico Data structures (Computer science)
Computer security
Computer science—Mathematics
Data Structures and Information Theory
Systems and Data Security
Mathematics of Computing
ISBN 3-662-48865-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Boolean Functions and Their Walsh Transforms -- 2. Independence of Boolean Functions of Their Variables -- 3. Nonlinearity and Linear Structures of Boolean Functions -- 4. Correlation Immunity of Boolean Functions -- 5. Algebraic Immunity of Boolean Functions -- 6. The Symmetric Property of Boolean Functions -- 7.Boolean Function Representation of S-boxes and Boolean Permutations -- 8. Cryptographic Applications of Boolean Functions.
Record Nr. UNINA-9910255002503321
Wu Chuan-Kun  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberspace Safety and Security [[electronic resource] ] : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
Cyberspace Safety and Security [[electronic resource] ] : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XXVI, 480 p. 149 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers and civilization
Systems and Data Security
Computer Communication Networks
Cryptology
Computers and Society
ISBN 3-319-03584-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data.
Record Nr. UNISA-996465385903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyberspace Safety and Security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
Cyberspace Safety and Security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XXVI, 480 p. 149 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer networks
Data encryption (Computer science)
Computers and civilization
Systems and Data Security
Computer Communication Networks
Cryptology
Computers and Society
ISBN 3-319-03584-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data.
Record Nr. UNINA-9910483379903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Cryptology [[electronic resource] ] : First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings / / edited by Dengguo Feng, Dongdai Lin, Moti Yung
Information Security and Cryptology [[electronic resource] ] : First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings / / edited by Dengguo Feng, Dongdai Lin, Moti Yung
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 428 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Coding theory
Information theory
Computer networks
Operating systems (Computers)
Algorithms
Computers and civilization
Cryptology
Coding and Information Theory
Computer Communication Networks
Operating Systems
Computers and Society
ISBN 3-540-32424-0
3-540-30855-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling -- Specifying Authentication Using Signal Events in CSP -- Modeling RFID Security -- Systems Security -- Enforcing Email Addresses Privacy Using Tokens -- Efficient Authentication of Electronic Document Workflow -- Signature Schemes -- Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms -- Efficient Group Signatures from Bilinear Pairing -- Enhanced Aggregate Signatures from Pairings -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream Generator -- HCTR: A Variable-Input-Length Enciphering Mode -- The kth-Order Quasi-Generalized Bent Functions over Ring Z p -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP -- An Improved Secure Two-Party Computation Protocol -- Threshold Cryptography -- Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes -- ID-Based Threshold Unsigncryption Scheme from Pairings -- Intrusion Detection Systems -- Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach -- The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control -- Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection -- Protocol Cryptanalysis -- Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes -- An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption -- ECC Algorithms -- A Remark on Implementing the Weil Pairing -- Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC -- Applications -- Key Management for Secure Overlay Multicast -- Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN -- Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault -- Secret Sharing -- Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes -- New Methods to Construct Cheating Immune Multisecret Sharing Scheme -- Denial of Service Attacks -- Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation -- MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks.
Record Nr. UNISA-996465562003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information security and cryptology : first SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005 : proceedings / / Dengguo Feng, Dongdai Lin, Moti Yung (eds.)
Information security and cryptology : first SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005 : proceedings / / Dengguo Feng, Dongdai Lin, Moti Yung (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, 2005
Descrizione fisica 1 online resource (XII, 428 p.)
Disciplina 005.8
Altri autori (Persone) FengDengguo
LinDongdai
YungMoti
Collana Lecture notes in computer science
Soggetto topico Computer security
Cryptography
ISBN 3-540-32424-0
3-540-30855-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling -- Specifying Authentication Using Signal Events in CSP -- Modeling RFID Security -- Systems Security -- Enforcing Email Addresses Privacy Using Tokens -- Efficient Authentication of Electronic Document Workflow -- Signature Schemes -- Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms -- Efficient Group Signatures from Bilinear Pairing -- Enhanced Aggregate Signatures from Pairings -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream Generator -- HCTR: A Variable-Input-Length Enciphering Mode -- The kth-Order Quasi-Generalized Bent Functions over Ring Z p -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP -- An Improved Secure Two-Party Computation Protocol -- Threshold Cryptography -- Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes -- ID-Based Threshold Unsigncryption Scheme from Pairings -- Intrusion Detection Systems -- Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach -- The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control -- Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection -- Protocol Cryptanalysis -- Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes -- An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption -- ECC Algorithms -- A Remark on Implementing the Weil Pairing -- Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC -- Applications -- Key Management for Secure Overlay Multicast -- Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN -- Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault -- Secret Sharing -- Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes -- New Methods to Construct Cheating Immune Multisecret Sharing Scheme -- Denial of Service Attacks -- Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation -- MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks.
Altri titoli varianti CISC 2005
Record Nr. UNINA-9910484539803321
Berlin ; ; New York, : Springer, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 5th Acm Symposium on Information, Computer and Communications Security
Proceedings of the 5th Acm Symposium on Information, Computer and Communications Security
Autore Feng Dengguo
Pubbl/distr/stampa [Place of publication not identified] : , : Association for Computing Machinery, , 2010
Descrizione fisica 1 online resource (363 pages)
Collana ACM Conferences.
Soggetto topico Information Technology - Computer Science (Hardware & Networks)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti ASIACCS '10
Record Nr. UNINA-9910376070903321
Feng Dengguo  
[Place of publication not identified] : , : Association for Computing Machinery, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trusted computing : principles and applications / / Dengguo Feng [and three others]
Trusted computing : principles and applications / / Dengguo Feng [and three others]
Autore Feng Dengguo
Pubbl/distr/stampa Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter : , : Tsinghua University Press, , 2018
Descrizione fisica 1 online resource (314 pages) : illustrations
Disciplina 005.8
Collana Advances in Computer Science
Soggetto topico Information technology - Security measures
Information technology - Management
Soggetto genere / forma Electronic books.
ISBN 3-11-047609-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index
Record Nr. UNINA-9910467398203321
Feng Dengguo  
Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter : , : Tsinghua University Press, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trusted computing : principles and applications / / Dengguo Feng [and three others]
Trusted computing : principles and applications / / Dengguo Feng [and three others]
Autore Feng Dengguo
Pubbl/distr/stampa Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter : , : Tsinghua University Press, , 2018
Descrizione fisica 1 online resource (314 pages) : illustrations
Disciplina 005.8
Collana Advances in Computer Science
Soggetto topico Information technology - Security measures
Information technology - Management
ISBN 3-11-047609-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index
Record Nr. UNINA-9910796606503321
Feng Dengguo  
Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter : , : Tsinghua University Press, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trusted computing : principles and applications / / Dengguo Feng [and three others]
Trusted computing : principles and applications / / Dengguo Feng [and three others]
Autore Feng Dengguo
Pubbl/distr/stampa Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter : , : Tsinghua University Press, , 2018
Descrizione fisica 1 online resource (314 pages) : illustrations
Disciplina 005.8
Collana Advances in Computer Science
Soggetto topico Information technology - Security measures
Information technology - Management
ISBN 3-11-047609-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index
Record Nr. UNINA-9910809345803321
Feng Dengguo  
Berlin, [Germany] ; ; Boston, [Massachusetts] : , : De Gruyter : , : Tsinghua University Press, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui