top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Foundations and Practice of Security [[electronic resource] ] : 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers / / edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro
Foundations and Practice of Security [[electronic resource] ] : 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers / / edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (415 pages) : illustrations
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer communication systems
Artificial intelligence
Systems and Data Security
Information Systems and Communication Service
Computer Communication Networks
Artificial Intelligence
ISBN 3-030-45371-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance.
Record Nr. UNISA-996418214603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Foundations and Practice of Security : 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers / / edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro
Foundations and Practice of Security : 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers / / edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (415 pages) : illustrations
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer communication systems
Artificial intelligence
Systems and Data Security
Information Systems and Communication Service
Computer Communication Networks
Artificial Intelligence
ISBN 3-030-45371-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance.
Record Nr. UNINA-9910409672503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Progress in Cryptology - INDOCRYPT 2010 [[electronic resource] ] : 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings / / edited by Guang Gong, Kishan Chand Gupta
Progress in Cryptology - INDOCRYPT 2010 [[electronic resource] ] : 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings / / edited by Guang Gong, Kishan Chand Gupta
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XVI, 366 p. 63 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Computer security
Computer science—Mathematics
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Systems and Data Security
Discrete Mathematics in Computer Science
ISBN 1-280-39054-9
9786613568465
3-642-17401-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Getting a Few Things Right and Many Things Wrong -- Security of RSA and Multivariate Schemes -- Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions -- Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks -- CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key -- Security Analysis, Pseudorandom Permutations and Applications -- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols -- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations -- The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants -- Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface -- Invited Talk -- Cryptographic Hash Functions: Theory and Practice -- Hash Functions -- Cryptanalysis of Tav-128 Hash Function -- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing -- Speeding Up the Wide-Pipe: Secure and Fast Hashing -- Attacks on Block Ciphers and Stream Ciphers -- New Boomerang Attacks on ARIA -- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers -- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA -- Greedy Distinguishers and Nonrandomness Detectors -- Fast Cryptographic Computation -- Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity -- Random Euclidean Addition Chain Generation and Its Application to Point Multiplication -- Cryptanalysis of AES -- Attack on a Higher-Order Masking of the AES Based on Homographic Functions -- Improved Impossible Differential Cryptanalysis of 7-Round AES-128 -- Cryptanalysis of a Perturbated White-Box AES Implementation -- Efficient Implementation -- A Program Generator for Intel AES-NI Instructions -- ECC2K-130 on NVIDIA GPUs -- One Byte per Clock: A Novel RC4 Hardware.
Record Nr. UNISA-996466007603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Selected Areas in Cryptography [[electronic resource] ] : 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers / / edited by Alex Biryukov, Guang Gong, Douglas R. Stinson
Selected Areas in Cryptography [[electronic resource] ] : 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers / / edited by Alex Biryukov, Guang Gong, Douglas R. Stinson
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIII, 411 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Algorithms
Computer communication systems
Application software
Cryptology
Operating Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-642-19574-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465909403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Sequences and Their Applications – SETA 2006 [[electronic resource] ] : 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings / / edited by Guang Gong, Tor Helleseth, Hong-Yeop Song, Kyeongcheol Yang
Sequences and Their Applications – SETA 2006 [[electronic resource] ] : 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings / / edited by Guang Gong, Tor Helleseth, Hong-Yeop Song, Kyeongcheol Yang
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 436 p.)
Disciplina 515/.24
Collana Theoretical Computer Science and General Issues
Soggetto topico Coding theory
Information theory
Cryptography
Data encryption (Computer science)
Computer science
Algorithms
Numerical analysis
Computer science—Mathematics
Coding and Information Theory
Cryptology
Theory of Computation
Numerical Analysis
Symbolic and Algebraic Manipulation
ISBN 3-540-44524-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Shift Register Sequences – A Retrospective Account -- The Probabilistic Theory of the Joint Linear Complexity of Multisequences -- Multi-Continued Fraction Algorithms and Their Applications to Sequences -- Codes for Optical CDMA -- Linear Complexity of Sequences -- On the Linear Complexity of Sidel’nikov Sequences over -- Linear Complexity over F p of Ternary Sidel’nikov Sequences -- Bounds on the Linear Complexity and the 1-Error Linear Complexity over F p of M-ary Sidel’nikov Sequences -- The Characterization of 2 n -Periodic Binary Sequences with Fixed 1-Error Linear Complexity -- Correlation of Sequences -- Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation -- Extended Hadamard Equivalence -- Analysis of Designing Interleaved ZCZ Sequence Families -- Stream Ciphers and Transforms -- Security of Jump Controlled Sequence Generators for Stream Ciphers -- Improved Rijndael-Like S-Box and Its Transform Domain Analysis -- Topics in Complexities of Sequences -- Nonlinear Complexity of Binary Sequences and Connections with Lempel-Ziv Compression -- On Lempel-Ziv Complexity of Sequences -- Computing the k-Error N-Adic Complexity of a Sequence of Period p n -- On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences -- Linear/Nonlinear Feedback Shift Register Sequences -- On the Classification of Periodic Binary Sequences into Nonlinear Complexity Classes -- Sequences of Period 2 N –2 -- A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences -- Multi-sequence Synthesis -- Implementation of Multi-continued Fraction Algorithm and Application to Multi-sequence Linear Synthesis -- The Hausdorff Dimension of the Set of r-Perfect M-Multisequences -- Filtering Sequences and Pseudorandom Sequence Generators -- Lower Bounds on Sequence Complexity Via Generalised Vandermonde Determinants -- Construction of Pseudo-random Binary Sequences from Elliptic Curves by Using Discrete Logarithm -- On the Discrepancy and Linear Complexity of Some Counter-Dependent Recurrence Sequences -- Sequences and Combinatorics -- Nonexistence of a Kind of Generalized Perfect Binary Array -- FCSR Sequences -- On the Distinctness of Decimations of Generalized l-Sequences -- On FCSR Memory Sequences -- Periodicity and Distribution Properties of Combined FCSR Sequences -- Aperiodic Correlation and Applications -- Generalized Bounds on Partial Aperiodic Correlation of Complex Roots of Unity Sequences -- Chip-Asynchronous Version of Welch Bound: Gaussian Pulse Improves BER Performance -- Boolean Functions -- On Immunity Profile of Boolean Functions -- Reducing the Number of Homogeneous Linear Equations in Finding Annihilators -- The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function -- Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions -- Construction of 1-Resilient Boolean Functions with Very Good Nonlinearity.
Record Nr. UNISA-996466097103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui