top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security Theory and Practice [[electronic resource] ] : 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings / / edited by Maryline Laurent, Thanassis Giannetsos
Information Security Theory and Practice [[electronic resource] ] : 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings / / edited by Maryline Laurent, Thanassis Giannetsos
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 253 p. 91 illus., 29 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer networks - Security measures
Computer communication systems
Application software
Systems and Data Security
Cryptology
Mobile and Network Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-030-41702-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Paper -- How to Compartment Secrets - Trust Everybody, but Cut the Cards (Invited Talk) -- Authentication -- A Lattice-based Enhanced Privacy ID -- A Generic View on the Unified Zero-Knowledge Protocol and its Applications -- Cryptography -- Verifiable and Private Oblivious Polynomial Evaluation -- Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations – With an Illustration on AES -- Strong Designated Verifier Signature Based on the Rank Metric -- A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things -- Threats -- Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture -- Threat Analysis of Poisoning Attack against Ethereum Blockchain -- A Template-based Method for the Generation of Attack Trees (short paper) -- Cybersecurity -- Analysis of QUIC Session Establishment and its Implementations -- CompactFlow: A Hybrid Binary Format for Network Flow Data -- SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities -- Internet of Things -- Automated Security Analysis of IoT Software Updates -- Towards a Context-Aware Security and Privacy as a Service in the Internet of Things (short paper).
Record Nr. UNISA-996418297003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Theory and Practice : 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings / / edited by Maryline Laurent, Thanassis Giannetsos
Information Security Theory and Practice : 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings / / edited by Maryline Laurent, Thanassis Giannetsos
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 253 p. 91 illus., 29 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer networks - Security measures
Computer communication systems
Application software
Systems and Data Security
Cryptology
Mobile and Network Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-030-41702-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Paper -- How to Compartment Secrets - Trust Everybody, but Cut the Cards (Invited Talk) -- Authentication -- A Lattice-based Enhanced Privacy ID -- A Generic View on the Unified Zero-Knowledge Protocol and its Applications -- Cryptography -- Verifiable and Private Oblivious Polynomial Evaluation -- Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations – With an Illustration on AES -- Strong Designated Verifier Signature Based on the Rank Metric -- A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things -- Threats -- Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture -- Threat Analysis of Poisoning Attack against Ethereum Blockchain -- A Template-based Method for the Generation of Attack Trees (short paper) -- Cybersecurity -- Analysis of QUIC Session Establishment and its Implementations -- CompactFlow: A Hybrid Binary Format for Network Flow Data -- SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities -- Internet of Things -- Automated Security Analysis of IoT Software Updates -- Towards a Context-Aware Security and Privacy as a Service in the Internet of Things (short paper).
Record Nr. UNINA-9910410057003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui