Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XXIII, 440 p. 282 illus., 72 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Application software Computer communication systems Computer organization Software engineering Systems and Data Security Cryptology Information Systems Applications (incl. Internet) Computer Communication Networks Computer Systems Organization and Communication Networks Software Engineering |
ISBN | 3-030-42048-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019). |
Record Nr. | UNISA-996418206503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XXIII, 440 p. 282 illus., 72 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Application software Computer communication systems Computer organization Software engineering Systems and Data Security Cryptology Information Systems Applications (incl. Internet) Computer Communication Networks Computer Systems Organization and Communication Networks Software Engineering |
ISBN | 3-030-42048-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019). |
Record Nr. | UNINA-9910380747703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security [[electronic resource] ] : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 233 p. 108 illus., 78 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Delitos por ordenador Computers Law and legislation Computer organization Software engineering Application software Systems and Data Security Computer Crime Legal Aspects of Computing Computer Systems Organization and Communication Networks Software Engineering Information Systems Applications (incl. Internet) |
ISBN | 3-030-12786-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466343703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 233 p. 108 illus., 78 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Delitos por ordenador Computers Law and legislation Computer organization Software engineering Application software Systems and Data Security Computer Crime Legal Aspects of Computing Computer Systems Organization and Communication Networks Software Engineering Information Systems Applications (incl. Internet) |
ISBN | 3-030-12786-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910337578903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security [[electronic resource] ] : ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 281 p. 76 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Software engineering Computer organization Computers and civilization Microprogramming Systems and Data Security Cryptology Software Engineering Computer Systems Organization and Communication Networks Computers and Society Control Structures and Microprogramming |
ISBN | 3-319-72817-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Protecting Industrial Control and Cyber-Physical Systems -- Threats, Vulnerabilities and Risks -- Cyber Attacks in Industrial Control and Cyber-Physical Systems -- Detecting Attacks in Industrial Control and Cyber-Physical Systems -- Security and Privacy Requirements Assurance and Evaluation -- Security Requirements Elicitation and Modelling. |
Record Nr. | UNISA-996465495703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security : ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 281 p. 76 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Software engineering Computer organization Computers and civilization Microprogramming Systems and Data Security Cryptology Software Engineering Computer Systems Organization and Communication Networks Computers and Society Control Structures and Microprogramming |
ISBN | 3-319-72817-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Protecting Industrial Control and Cyber-Physical Systems -- Threats, Vulnerabilities and Risks -- Cyber Attacks in Industrial Control and Cyber-Physical Systems -- Detecting Attacks in Industrial Control and Cyber-Physical Systems -- Security and Privacy Requirements Assurance and Evaluation -- Security Requirements Elicitation and Modelling. |
Record Nr. | UNINA-9910349264103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security [[electronic resource] ] : 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings / / edited by Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Bart Preneel |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XIV, 548 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Algorithms Computer communication systems Special purpose computers Management information systems Computer science Cryptology Operating Systems Algorithm Analysis and Problem Complexity Computer Communication Networks Special Purpose and Application-Based Systems Management of Computing and Information Systems |
ISBN | 3-540-38343-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Software Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation -- Privacy and Anonymity -- Low Latency Anonymity with Mix Rings -- Breaking Four Mix-Related Schemes Based on Universal Re-encryption -- Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy -- Protecting Data Privacy Through Hard-to-Reverse Negative Databases -- Block Ciphers and Hash Functions -- Related-Key Rectangle Attack on 42-Round SHACAL-2 -- On the Collision Resistance of RIPEMD-160 -- Digital Signatures -- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption -- Multi-party Concurrent Signatures -- Formal Security Model of Multisignatures -- Cryptanalysis of Variants of UOV -- Stream Ciphers -- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles -- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s -- Encryption I -- A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice -- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search -- Collusion-Free Policy-Based Encryption -- Pervasive Computing -- Using Multiple Smart Cards for Signing Messages at Malicious Terminals -- Diverging Keys in Wireless Sensor Networks -- Encryption II -- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption -- Transparent Image Encryption Using Progressive JPEG -- Network Security -- Preserving TCP Connections Across Host Address Changes -- A Security Architecture for Protecting LAN Interactions -- Simulation of Internet DDoS Attacks and Defense -- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr -- Watermarking and DRM -- Rights Protection for Data Cubes -- An Efficient Probabilistic Packet Marking Scheme (NOD-PPM) -- Intrusion Detection and Worms -- Resistance Analysis to Intruders’ Evasion of Detecting Intrusion -- A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks -- Anomaly Intrusion Detection Based on Clustering a Data Stream -- Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation -- Key Exchange -- An Authentication and Key Exchange Protocol for Secure Credential Services -- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders -- Security Protocols and Formal Methods -- Formalising Receipt-Freeness -- Enhancing the Security and Efficiency of 3-D Secure -- Designing and Verifying Core Protocols for Location Privacy -- Information Systems Security -- Delegation in a Distributed Healthcare Context: A Survey of Current Approaches -- Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness. |
Record Nr. | UNISA-996466144403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Privacy and anonymity in the digital era [[electronic resource] /] / guest editor Stefanos Gritzalis |
Pubbl/distr/stampa | Bradford, England, : Emerald Group Publishing, c2006 |
Descrizione fisica | 1 online resource (112 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | GritzalisStefanos |
Collana | Internet research |
Soggetto topico |
Internet - Security measures
Privacy, Right of |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-54733-2
9786610547333 1-84544-965-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; CONTENTS; EDITORIAL ADVISORY BOARD; Guest editorial; Anonymous attribute certificates based on traceable signatures; Incorporating privacy requirements into the system design process; Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks; An incentive-based architecture to enable privacy in dynamic environments; Agyaat: mutual anonymity over structured P2P networks; Regroup-And-Go mixes to counter the (n-1) attack |
Record Nr. | UNINA-9910450756603321 |
Bradford, England, : Emerald Group Publishing, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy and anonymity in the digital era [[electronic resource] /] / guest editor Stefanos Gritzalis |
Pubbl/distr/stampa | Bradford, England, : Emerald Group Publishing, c2006 |
Descrizione fisica | 1 online resource (112 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | GritzalisStefanos |
Collana | Internet research |
Soggetto topico |
Internet - Security measures
Privacy, Right of |
ISBN |
1-280-54733-2
9786610547333 1-84544-965-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; CONTENTS; EDITORIAL ADVISORY BOARD; Guest editorial; Anonymous attribute certificates based on traceable signatures; Incorporating privacy requirements into the system design process; Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks; An incentive-based architecture to enable privacy in dynamic environments; Agyaat: mutual anonymity over structured P2P networks; Regroup-And-Go mixes to counter the (n-1) attack |
Record Nr. | UNINA-9910783552003321 |
Bradford, England, : Emerald Group Publishing, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy and anonymity in the digital era / / guest editor Stefanos Gritzalis |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Bradford, England, : Emerald Group Publishing, c2006 |
Descrizione fisica | 1 online resource (112 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | GritzalisStefanos |
Collana | Internet research |
Soggetto topico |
Internet - Security measures
Privacy, Right of |
ISBN |
1-280-54733-2
9786610547333 1-84544-965-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; CONTENTS; EDITORIAL ADVISORY BOARD; Guest editorial; Anonymous attribute certificates based on traceable signatures; Incorporating privacy requirements into the system design process; Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks; An incentive-based architecture to enable privacy in dynamic environments; Agyaat: mutual anonymity over structured P2P networks; Regroup-And-Go mixes to counter the (n-1) attack |
Record Nr. | UNINA-9910824913503321 |
Bradford, England, : Emerald Group Publishing, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|