top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied Cryptography and Network Security [[electronic resource] ] : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han
Applied Cryptography and Network Security [[electronic resource] ] : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 440 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Operating systems (Computers)
Computers and civilization
Electronic data processing—Management
Computer Communication Networks
Cryptology
Operating Systems
Computers and Society
IT Operations
ISBN 3-540-45203-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Applications -- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case -- Optimized ? 2-Attack against RC6 -- Anonymity-Enhanced Pseudonym System -- Intrusion Detection -- Using Feedback to Improve Masquerade Detection -- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services -- An IP Traceback Scheme Integrating DPM and PPM -- Cryptographic Algorithms -- Improved Scalable Hash Chain Traversal -- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem -- On the Security of Two Threshold Signature Schemes with Traceable Signers -- Digital Signature -- Proxy and Threshold One-Time Signatures -- A Threshold GQ Signature Scheme -- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary -- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme -- Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems -- An Authorization Model for E-consent Requirement in a Health Care Application -- PLI: A New Framework to Protect Digital Content for P2P Networks -- Web Security -- Improved Algebraic Traitor Tracing Scheme -- Common Vulnerability Markup Language -- Trust on Web Browser: Attack vs. Defense -- Security Protocols -- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards -- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party -- Using OCSP to Secure Certificate-Using Transactions in M-commerce -- Cryptanalysis -- Differential Fault Analysis on A.E.S -- Side-Channel Attack on Substitution Blocks -- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation -- A Fast Correlation Attack for LFSR-Based Stream Ciphers -- Key Management -- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient -- An Efficient Tree-Based Group Key Agreement Using Bilinear Map -- A Key Recovery Mechanism for Reliable Group Key Management -- Efficient Implementations -- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model -- Efficient Distributed Signcryption Scheme as Group Signcryption -- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.
Record Nr. UNISA-996465773503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han
Applied Cryptography and Network Security : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 440 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Operating systems (Computers)
Computers and civilization
Electronic data processing—Management
Computer Communication Networks
Cryptology
Operating Systems
Computers and Society
IT Operations
ISBN 3-540-45203-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Applications -- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case -- Optimized ? 2-Attack against RC6 -- Anonymity-Enhanced Pseudonym System -- Intrusion Detection -- Using Feedback to Improve Masquerade Detection -- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services -- An IP Traceback Scheme Integrating DPM and PPM -- Cryptographic Algorithms -- Improved Scalable Hash Chain Traversal -- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem -- On the Security of Two Threshold Signature Schemes with Traceable Signers -- Digital Signature -- Proxy and Threshold One-Time Signatures -- A Threshold GQ Signature Scheme -- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary -- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme -- Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems -- An Authorization Model for E-consent Requirement in a Health Care Application -- PLI: A New Framework to Protect Digital Content for P2P Networks -- Web Security -- Improved Algebraic Traitor Tracing Scheme -- Common Vulnerability Markup Language -- Trust on Web Browser: Attack vs. Defense -- Security Protocols -- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards -- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party -- Using OCSP to Secure Certificate-Using Transactions in M-commerce -- Cryptanalysis -- Differential Fault Analysis on A.E.S -- Side-Channel Attack on Substitution Blocks -- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation -- A Fast Correlation Attack for LFSR-Based Stream Ciphers -- Key Management -- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient -- An Efficient Tree-Based Group Key Agreement Using Bilinear Map -- A Key Recovery Mechanism for Reliable Group Key Management -- Efficient Implementations -- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model -- Efficient Distributed Signcryption Scheme as Group Signcryption -- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.
Record Nr. UNINA-9910144033103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings
Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings
Pubbl/distr/stampa [Place of publication not identified], : Springer, 1997
Disciplina 005.8
Collana Lecture notes in computer science Information and communications security
Soggetto topico Computer security - Congresses
Telecommunication systems - Security measures - Congresses
Computer Science
Engineering & Applied Sciences
ISBN 978-3-540-69628-5
3-540-63696-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465740203316
[Place of publication not identified], : Springer, 1997
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings
Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings
Pubbl/distr/stampa [Place of publication not identified], : Springer, 1997
Disciplina 005.8
Collana Lecture notes in computer science Information and communications security
Soggetto topico Computer security
Telecommunication systems - Security measures - Congresses
Computer Science
Engineering & Applied Sciences
ISBN 978-3-540-69628-5
3-540-63696-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484736903321
[Place of publication not identified], : Springer, 1997
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui