top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Privacy and Identity Management. Sharing in a Digital World : 18th IFIP WG 9. 2, 9. 6/11. 7, 11. 6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers
Privacy and Identity Management. Sharing in a Digital World : 18th IFIP WG 9. 2, 9. 6/11. 7, 11. 6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers
Autore Bieker Felix
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (350 pages)
Altri autori (Persone) de ConcaSilvia
GruschkaNils
JensenMeiko
SchieringIna
Collana IFIP Advances in Information and Communication Technology Series
ISBN 9783031579783
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910851998003321
Bieker Felix  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy technologies and policy : 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17-18, 2021, Proceedings. / / Nils Gruschka [and three others], editors
Privacy technologies and policy : 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17-18, 2021, Proceedings. / / Nils Gruschka [and three others], editors
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (IX, 169 p. 33 illus., 22 illus. in color.)
Disciplina 303.4834
Collana Security and Cryptology
Soggetto topico Computers and civilization
ISBN 3-030-76663-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementing Personal Data Processing Principles -- The Right to Customization: Conceptualizing the Right to Repair for Informational Privacy -- A case study on the implementation of the right of access in privacy dashboards -- Consent Management Platforms under the GDPR: processors and/or controllers? -- Improving the Transparency of Privacy Terms Updates -- Privacy Enhancing Technologies -- User-generated pseudonyms through Merkle trees -- Towards Improving Privacy of Synthetic DataSets -- Promoting Compliance with the GDPR -- Protection of Personal Data in High Performance Computing Platform for Scientific Research Purposes -- Representing Data Protection Aspects in Process Models by Coloring -- Trackers in Your Inbox: Criticizing Current Email Tracking Practices.
Record Nr. UNISA-996464419903316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Privacy technologies and policy : 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17-18, 2021, Proceedings. / / Nils Gruschka [and three others], editors
Privacy technologies and policy : 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17-18, 2021, Proceedings. / / Nils Gruschka [and three others], editors
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (IX, 169 p. 33 illus., 22 illus. in color.)
Disciplina 303.4834
Collana Security and Cryptology
Soggetto topico Computers and civilization
ISBN 3-030-76663-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Implementing Personal Data Processing Principles -- The Right to Customization: Conceptualizing the Right to Repair for Informational Privacy -- A case study on the implementation of the right of access in privacy dashboards -- Consent Management Platforms under the GDPR: processors and/or controllers? -- Improving the Transparency of Privacy Terms Updates -- Privacy Enhancing Technologies -- User-generated pseudonyms through Merkle trees -- Towards Improving Privacy of Synthetic DataSets -- Promoting Compliance with the GDPR -- Protection of Personal Data in High Performance Computing Platform for Scientific Research Purposes -- Representing Data Protection Aspects in Process Models by Coloring -- Trackers in Your Inbox: Criticizing Current Email Tracking Practices.
Record Nr. UNINA-9910484431503321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure IT Systems [[electronic resource] ] : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings / / edited by Nils Gruschka
Secure IT Systems [[electronic resource] ] : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings / / edited by Nils Gruschka
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIII, 486 p. 165 illus., 68 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computers
Law and legislation
Computers and civilization
Application software
Computer communication systems
Systems and Data Security
Cryptology
Legal Aspects of Computing
Computers and Society
Information Systems Applications (incl. Internet)
Computer Communication Networks
ISBN 3-030-03638-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy -- Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid -- Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps -- MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix-Zones -- AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications -- Cryptography -- Unifying Kleptographic Attacks -- Steady: A Simple End-to-End Secure Logging System -- Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation -- On Security Analysis of Generic Dynamic Authenticated Group Key Exchange -- A Blockchain-Assisted Hash-Based Signature Scheme -- The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants -- Verifiable Light-Weight Monitoring for Certificate Transparency Logs -- Network and Cloud Security -- CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs -- Detection of covert channels in TCP retransmissions -- What you can change and what you can’t: human experience in computer network defenses -- Attack simulation for a realistic evaluation and comparison of network security techniques -- Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots using Virtual Machine Introspection -- Authorization Policies Specification and Consistency Management within Multi-Cloud Environments -- Cyber Security and Malware -- Cyber Hygiene: The Big Picture -- Estimating the Risk of Fraud against E-services -- PESTEL Analysis of Hacktivism Campaign Motivations -- Data Modelling for Predicting Exploits -- UpDroid : Updated Android Malware and Its Familial Classification -- Evaluation of Cyber Security Management of Critical Infrastructures: A Literature Review Guided by the NIST Cybersecurity Framework -- Next Generation Ransomware -- Security for Software and Software Development -- Hardware-Assisted Program Execution Integrity: HAPEI -- Protecting Instruction Set Randomization from Code Reuse Attacks -- A Uniform Information-Flow-Security Benchmark Suite for Source Code and Bytecode -- When Harry met Tinder: Security analysis of dating apps on Android -- Threat Poker: Solving Security and Privacy Threats in Agile Software Development. .
Record Nr. UNISA-996466197503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Secure IT Systems : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings / / edited by Nils Gruschka
Secure IT Systems : 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings / / edited by Nils Gruschka
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIII, 486 p. 165 illus., 68 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computers
Law and legislation
Computers and civilization
Application software
Computer communication systems
Systems and Data Security
Cryptology
Legal Aspects of Computing
Computers and Society
Information Systems Applications (incl. Internet)
Computer Communication Networks
ISBN 3-030-03638-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy -- Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid -- Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps -- MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix-Zones -- AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications -- Cryptography -- Unifying Kleptographic Attacks -- Steady: A Simple End-to-End Secure Logging System -- Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation -- On Security Analysis of Generic Dynamic Authenticated Group Key Exchange -- A Blockchain-Assisted Hash-Based Signature Scheme -- The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants -- Verifiable Light-Weight Monitoring for Certificate Transparency Logs -- Network and Cloud Security -- CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs -- Detection of covert channels in TCP retransmissions -- What you can change and what you can’t: human experience in computer network defenses -- Attack simulation for a realistic evaluation and comparison of network security techniques -- Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots using Virtual Machine Introspection -- Authorization Policies Specification and Consistency Management within Multi-Cloud Environments -- Cyber Security and Malware -- Cyber Hygiene: The Big Picture -- Estimating the Risk of Fraud against E-services -- PESTEL Analysis of Hacktivism Campaign Motivations -- Data Modelling for Predicting Exploits -- UpDroid : Updated Android Malware and Its Familial Classification -- Evaluation of Cyber Security Management of Critical Infrastructures: A Literature Review Guided by the NIST Cybersecurity Framework -- Next Generation Ransomware -- Security for Software and Software Development -- Hardware-Assisted Program Execution Integrity: HAPEI -- Protecting Instruction Set Randomization from Code Reuse Attacks -- A Uniform Information-Flow-Security Benchmark Suite for Source Code and Bytecode -- When Harry met Tinder: Security analysis of dating apps on Android -- Threat Poker: Solving Security and Privacy Threats in Agile Software Development. .
Record Nr. UNINA-9910349390403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Sicherheit in kommunikationsnetzen / / von Jun.-Prof. Dr. Christoph Sorge, Prof. Dr. Nils Gruschka, Prof. Dr. Luigi Lo Iacono ; Johannes Breimeier, lektorat ; Tina Bonertz, herstellung
Sicherheit in kommunikationsnetzen / / von Jun.-Prof. Dr. Christoph Sorge, Prof. Dr. Nils Gruschka, Prof. Dr. Luigi Lo Iacono ; Johannes Breimeier, lektorat ; Tina Bonertz, herstellung
Autore Sorge Christoph
Pubbl/distr/stampa Munich, Germany : , : Oldenbourg Wissenschaftsverlag, , 2013
Descrizione fisica 1 online resource (273 p.)
Disciplina 004.6
Altri autori (Persone) GruschkaNils
IaconoLuigi Lo
BreimeierJohannes
BonertzTina
Soggetto topico Network performance (Telecommunication)
Computer security
Soggetto genere / forma Electronic books.
ISBN 3-486-72017-1
Classificazione ST 276
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Nota di contenuto Frontmatter -- Inhaltsverzeichnis -- 1 Einleitung -- Teil I: Grundlagen -- 2 Kommunikation in Netzen -- 3 Informations- und Kommunikationssicherheit -- 4 Kryptographie -- 5 Public-Key-Infrastrukturen -- Teil II: Absicherung lokaler Netze -- 6 Netzwerkinfrastrukturen -- 7 Authentifizierung im Netzwerk -- 8 WLAN-Sicherheit -- 9 Kerberos -- Teil III: Internet-Sicherheit -- 10 IPsec -- 11 Sicherheit der Transportschicht -- 12 DNS-Sicherheit -- Teil IV: Mobilfunk- und Web-Sicherheit -- 13 GSM und UMTS -- 14 Web-Sicherheit -- Teil V: Szenarien -- 15 Der Blickwinkel des Penetrationstesters -- 16 Der Blickwinkel des Sicherheitsbeauftragten -- Abkürzungsverzeichnis -- Literaturverzeichnis -- Index
Record Nr. UNINA-9910453801703321
Sorge Christoph  
Munich, Germany : , : Oldenbourg Wissenschaftsverlag, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Sicherheit in kommunikationsnetzen / / von Jun.-Prof. Dr. Christoph Sorge, Prof. Dr. Nils Gruschka, Prof. Dr. Luigi Lo Iacono ; Johannes Breimeier, lektorat ; Tina Bonertz, herstellung
Sicherheit in kommunikationsnetzen / / von Jun.-Prof. Dr. Christoph Sorge, Prof. Dr. Nils Gruschka, Prof. Dr. Luigi Lo Iacono ; Johannes Breimeier, lektorat ; Tina Bonertz, herstellung
Autore Sorge Christoph
Pubbl/distr/stampa Munich, Germany : , : Oldenbourg Wissenschaftsverlag, , 2013
Descrizione fisica 1 online resource (273 p.)
Disciplina 004.6
Altri autori (Persone) GruschkaNils
IaconoLuigi Lo
BreimeierJohannes
BonertzTina
Soggetto topico Network performance (Telecommunication)
Computer security
ISBN 3-486-72017-1
Classificazione ST 276
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Nota di contenuto Frontmatter -- Inhaltsverzeichnis -- 1 Einleitung -- Teil I: Grundlagen -- 2 Kommunikation in Netzen -- 3 Informations- und Kommunikationssicherheit -- 4 Kryptographie -- 5 Public-Key-Infrastrukturen -- Teil II: Absicherung lokaler Netze -- 6 Netzwerkinfrastrukturen -- 7 Authentifizierung im Netzwerk -- 8 WLAN-Sicherheit -- 9 Kerberos -- Teil III: Internet-Sicherheit -- 10 IPsec -- 11 Sicherheit der Transportschicht -- 12 DNS-Sicherheit -- Teil IV: Mobilfunk- und Web-Sicherheit -- 13 GSM und UMTS -- 14 Web-Sicherheit -- Teil V: Szenarien -- 15 Der Blickwinkel des Penetrationstesters -- 16 Der Blickwinkel des Sicherheitsbeauftragten -- Abkürzungsverzeichnis -- Literaturverzeichnis -- Index
Record Nr. UNINA-9910790820503321
Sorge Christoph  
Munich, Germany : , : Oldenbourg Wissenschaftsverlag, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Sicherheit in kommunikationsnetzen / / von Jun.-Prof. Dr. Christoph Sorge, Prof. Dr. Nils Gruschka, Prof. Dr. Luigi Lo Iacono ; Johannes Breimeier, lektorat ; Tina Bonertz, herstellung
Sicherheit in kommunikationsnetzen / / von Jun.-Prof. Dr. Christoph Sorge, Prof. Dr. Nils Gruschka, Prof. Dr. Luigi Lo Iacono ; Johannes Breimeier, lektorat ; Tina Bonertz, herstellung
Autore Sorge Christoph
Pubbl/distr/stampa Munich, Germany : , : Oldenbourg Wissenschaftsverlag, , 2013
Descrizione fisica 1 online resource (273 p.)
Disciplina 004.6
Altri autori (Persone) GruschkaNils
IaconoLuigi Lo
BreimeierJohannes
BonertzTina
Soggetto topico Network performance (Telecommunication)
Computer security
ISBN 3-486-72017-1
Classificazione ST 276
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Nota di contenuto Frontmatter -- Inhaltsverzeichnis -- 1 Einleitung -- Teil I: Grundlagen -- 2 Kommunikation in Netzen -- 3 Informations- und Kommunikationssicherheit -- 4 Kryptographie -- 5 Public-Key-Infrastrukturen -- Teil II: Absicherung lokaler Netze -- 6 Netzwerkinfrastrukturen -- 7 Authentifizierung im Netzwerk -- 8 WLAN-Sicherheit -- 9 Kerberos -- Teil III: Internet-Sicherheit -- 10 IPsec -- 11 Sicherheit der Transportschicht -- 12 DNS-Sicherheit -- Teil IV: Mobilfunk- und Web-Sicherheit -- 13 GSM und UMTS -- 14 Web-Sicherheit -- Teil V: Szenarien -- 15 Der Blickwinkel des Penetrationstesters -- 16 Der Blickwinkel des Sicherheitsbeauftragten -- Abkürzungsverzeichnis -- Literaturverzeichnis -- Index
Record Nr. UNINA-9910810457003321
Sorge Christoph  
Munich, Germany : , : Oldenbourg Wissenschaftsverlag, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui