top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security Practice and Experience [[electronic resource] ] : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings / / edited by Robert H. Deng, Tao Feng
Information Security Practice and Experience [[electronic resource] ] : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings / / edited by Robert H. Deng, Tao Feng
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 388 p. 72 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Systems and Data Security
Cryptology
Management of Computing and Information Systems
ISBN 3-642-38033-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection -- Trusted Identity Management for Overlay Networks -- Situational Awareness for Improving Network Resilience Management -- Optimal Defense Strategies for DDoS defender using Bayesian Game Model -- Identity-Based Cryptography -- Attribute Specified Identity-Based Encryption -- Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions -- Identity-based Multisignature with Message Recovery -- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme -- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures -- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release -- About Hash into Montgomery Form Elliptic Curves -- Secure RFID Ownership Transfer Protocols -- Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model -- Expressing User Access Authorization Exceptions in Conventional Role-based Access Control -- Cryptanalysis of the OKH Authenticated Encryption Scheme.
Record Nr. UNISA-996466177403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings / / edited by Robert H. Deng, Tao Feng
Information Security Practice and Experience : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings / / edited by Robert H. Deng, Tao Feng
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 388 p. 72 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Systems and Data Security
Cryptology
Management of Computing and Information Systems
ISBN 3-642-38033-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection -- Trusted Identity Management for Overlay Networks -- Situational Awareness for Improving Network Resilience Management -- Optimal Defense Strategies for DDoS defender using Bayesian Game Model -- Identity-Based Cryptography -- Attribute Specified Identity-Based Encryption -- Leakage-resilient Attribute-based Encryption with Fast Decryption: Models, Analysis and Constructions -- Identity-based Multisignature with Message Recovery -- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme -- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures -- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release -- About Hash into Montgomery Form Elliptic Curves -- Secure RFID Ownership Transfer Protocols -- Leakage Resilient Authenticated Key Exchange Secure in The Auxiliary Input Model -- Expressing User Access Authorization Exceptions in Conventional Role-based Access Control -- Cryptanalysis of the OKH Authenticated Encryption Scheme.
Record Nr. UNINA-9910741159403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secondary metabolites from fungi : in honour of Prof. Dr. Ji-Kai Liu's 60th birthday / / edited by Frank Surup, Tao Feng
Secondary metabolites from fungi : in honour of Prof. Dr. Ji-Kai Liu's 60th birthday / / edited by Frank Surup, Tao Feng
Pubbl/distr/stampa Basel, Switzerland : , : MDPI - Multidisciplinary Digital Publishing Institute, , [2023]
Descrizione fisica 1 online resource (480 pages)
Disciplina 660.62
Soggetto topico Fungi - Biotechnology
ISBN 3-0365-6143-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Conflicts of Interest -- References.
Record Nr. UNINA-9910647214903321
Basel, Switzerland : , : MDPI - Multidisciplinary Digital Publishing Institute, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui