top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data Privacy Management, Cryptocurrencies and Blockchain Technology [[electronic resource] ] : ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomartí
Data Privacy Management, Cryptocurrencies and Blockchain Technology [[electronic resource] ] : ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomartí
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 446 p. 68 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Application software
Algorithms
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
ISBN 3-319-67816-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Proof Calculus for Attack Trees in Isabelle -- Confidentiality of Interactions in Concurrent Object-Oriented Systems -- Using Oblivious RAM in Genomic Studies -- Towards Efficient and Secure Encrypted Databases: Extending -- Message-Locked Encryption in Three-Party Model -- Searchable Encrypted Relational Databases: Risks and Countermeasures -- Private verification of access on medical data: an initial study -- Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences -- Bounding Privacy Leaks in Privacy Preserving Data Mining -- Threshold Single Password Authentication -- Towards A Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization -- Enforcement of External Anonymization -- DLoc: Distributed Auditing for Data Location Compliance in Cloud -- Inonymous: Anonymous Invitation-Based System -- Order-Preserving Encryption Using Approximate Integer Common Divisors -- Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks -- Securing Proof-of-Stake Blockchain Protocols -- Merged Mining: Curse or Cure? -- Atomically Trading with Roger: Gambling on the success of a hardfork -- Smart Contracts and Blockchain Identity -- In Code We Trust? Measuring the Control Flow Immutability of All -- Smart Contracts Deployed on Ethereum -- Who Am I? Secure Identity Registration on Distributed Ledgers -- User-centric System for Verified Identities on the Bitcoin Blockchain -- Towards a Concurrent and Distributed Route Selection for Payment Channel Networks -- Graphene: A New Protocol for Block Propagation Using Set Reconciliation -- Revisiting Difficulty Control for Blockchain Systems -- Secure Event Tickets on a Blockchain.
Record Nr. UNINA-9910483434003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Privacy Management, Cryptocurrencies and Blockchain Technology [[electronic resource] ] : ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomartí
Data Privacy Management, Cryptocurrencies and Blockchain Technology [[electronic resource] ] : ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomartí
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 446 p. 68 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Application software
Algorithms
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
ISBN 3-319-67816-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Proof Calculus for Attack Trees in Isabelle -- Confidentiality of Interactions in Concurrent Object-Oriented Systems -- Using Oblivious RAM in Genomic Studies -- Towards Efficient and Secure Encrypted Databases: Extending -- Message-Locked Encryption in Three-Party Model -- Searchable Encrypted Relational Databases: Risks and Countermeasures -- Private verification of access on medical data: an initial study -- Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences -- Bounding Privacy Leaks in Privacy Preserving Data Mining -- Threshold Single Password Authentication -- Towards A Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization -- Enforcement of External Anonymization -- DLoc: Distributed Auditing for Data Location Compliance in Cloud -- Inonymous: Anonymous Invitation-Based System -- Order-Preserving Encryption Using Approximate Integer Common Divisors -- Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks -- Securing Proof-of-Stake Blockchain Protocols -- Merged Mining: Curse or Cure? -- Atomically Trading with Roger: Gambling on the success of a hardfork -- Smart Contracts and Blockchain Identity -- In Code We Trust? Measuring the Control Flow Immutability of All -- Smart Contracts Deployed on Ethereum -- Who Am I? Secure Identity Registration on Distributed Ledgers -- User-centric System for Verified Identities on the Bitcoin Blockchain -- Towards a Concurrent and Distributed Route Selection for Payment Channel Networks -- Graphene: A New Protocol for Block Propagation Using Set Reconciliation -- Revisiting Difficulty Control for Blockchain Systems -- Secure Event Tickets on a Blockchain.
Record Nr. UNISA-996465549703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Inter-Vehicle-Communications - Based on Ad Hoc Networking Principles : The FleetNet Project / / Martin Mauve, Hannes Hartenstein, Walter Franz, editor
Inter-Vehicle-Communications - Based on Ad Hoc Networking Principles : The FleetNet Project / / Martin Mauve, Hannes Hartenstein, Walter Franz, editor
Pubbl/distr/stampa [Place of publication not identified] : , : KIT Scientific Publishing, , 2005
Descrizione fisica 1 online resource (302 pages)
Disciplina 388.312
Soggetto topico Vehicular ad hoc networks (Computer networks)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Inter-Vehicle-Communications - Based on Ad Hoc Networking Principles
Record Nr. UNINA-9910688316103321
[Place of publication not identified] : , : KIT Scientific Publishing, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in Ad-hoc and Sensor Networks [[electronic resource] ] : First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers / / edited by Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff
Security in Ad-hoc and Sensor Networks [[electronic resource] ] : First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers / / edited by Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (VIII, 231 p.)
Disciplina 005.82
Collana Computer Communication Networks and Telecommunications
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Application software
Electrical engineering
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Communications Engineering, Networks
ISBN 3-540-30496-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto New Research Challenges for the Security of Ad Hoc and Sensor Networks -- Public Key Cryptography in Sensor Networks—Revisited -- Exploring Message Authentication in Sensor Networks -- Secure Initialization in Single-Hop Radio Networks -- Some Methods for Privacy in RFID Communication -- Ring Signature Schemes for General Ad-Hoc Access Structures -- Linking Ad Hoc Charging Schemes to AAAC Architectures -- Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups -- Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems -- Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH -- Secure Overlay for Service Centric Wireless Sensor Networks -- IKE in Ad-Hoc IP Networking -- Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks -- A Security Architecture for Mobile Wireless Sensor Networks -- Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on -- Key Management in Wireless Sensor Networks -- SDD: Secure Directed Diffusion Protocol for Sensor Networks -- Secure AES Hardware Module for Resource Constrained Devices.
Record Nr. UNISA-996466018403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security in Ad-hoc and Sensor Networks [[electronic resource] ] : First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers / / edited by Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff
Security in Ad-hoc and Sensor Networks [[electronic resource] ] : First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers / / edited by Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (VIII, 231 p.)
Disciplina 005.82
Collana Computer Communication Networks and Telecommunications
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Application software
Electrical engineering
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Communications Engineering, Networks
ISBN 3-540-30496-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto New Research Challenges for the Security of Ad Hoc and Sensor Networks -- Public Key Cryptography in Sensor Networks—Revisited -- Exploring Message Authentication in Sensor Networks -- Secure Initialization in Single-Hop Radio Networks -- Some Methods for Privacy in RFID Communication -- Ring Signature Schemes for General Ad-Hoc Access Structures -- Linking Ad Hoc Charging Schemes to AAAC Architectures -- Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups -- Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems -- Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH -- Secure Overlay for Service Centric Wireless Sensor Networks -- IKE in Ad-Hoc IP Networking -- Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks -- A Security Architecture for Mobile Wireless Sensor Networks -- Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on -- Key Management in Wireless Sensor Networks -- SDD: Secure Directed Diffusion Protocol for Sensor Networks -- Secure AES Hardware Module for Resource Constrained Devices.
Record Nr. UNINA-9910484960403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
VANET : vehicular applications and inter-networking technologies / / Hannes Hartenstein, Kenneth P. Laberteaux [editors]
VANET : vehicular applications and inter-networking technologies / / Hannes Hartenstein, Kenneth P. Laberteaux [editors]
Pubbl/distr/stampa Chichester, U.K. : , : Wiley, , 2010
Descrizione fisica 1 online resource (467 p.)
Disciplina 388.3/12
Altri autori (Persone) HartensteinHannes
LaberteauxKenneth
Collana Intelligent transport systems
Intelligent transportation systems
Soggetto topico Vehicular ad hoc networks (Computer networks)
Computer networks
ISBN 1-282-38045-1
9786612380457
0-470-74063-9
0-470-74062-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- About the Editors -- Preface -- Acknowledgements -- List of Contributors -- 1 Introduction (Hannes Hartenstein and Kenneth P. Laberteaux). -- 1.1 Basic Principles and Challenges -- 1.2 Past and Ongoing VANET Activities -- 1.3 Chapter Outlines -- 1.4 References -- 2 Cooperative Vehicular Safety Applications (Derek Caveney) -- 2.1 Introduction -- 2.2 Enabling Technologies -- 2.3 Cooperative System Architecture -- 2.4 Mapping for Safety Applications -- 2.5 VANET-enabled Active Safety Applications -- 2.6 References -- 3 Information Dissemination in VANETs (Christian Lochert, Bjorn Scheuermann and Martin Mauve) -- 3.1 Introduction -- 3.2 Obtaining Local Measurements -- 3.3 Information Transport -- 3.4 Summarizing Measurements -- 3.5 Geographical Data Aggregation -- 3.6 Conclusion -- 3.7 References -- 4 VANET Convenience and Efficiency Applications (Martin Mauve and Bjorn Scheruermann) -- 4.1 Introduction -- 4.2 Limitations -- 4.3 Applications -- 4.4 Communication Paradigms -- 4.5 Probabilistic, Area-based Aggregation -- 4.6 Travel Time Aggregation -- 4.7 Conclusion -- 4.8 References -- 5 Vehicular Mobility Modeling for VANETs (Jřm̥e Hr̃ri) -- 5.1 Introduction -- 5.2 Notation Description -- 5.3 Random Models -- 5.4 Flow Models -- 5.5 Traffic Models -- 5.6 Behavioral Models -- 5.7 Trace or Survey-based Models -- 5.8 Integration with Network Simulators -- 5.9 A Design Framework for Realistic Vehicular Mobility Models -- 5.10 Discussion and Outlook -- 5.11 Conclusion -- 5.12 References -- 6 Physical Layer Considerations for Vehicular Communications (Ian Tan and Ahmad Bahai) -- 6.1 Standards Overview -- 6.2 Previous Work -- 6.3 Wireless Propagation Theory -- 6.4 Channel Metrics -- 6.5 Measurement Theory -- 6.6 Emperical Channel Characterization at 5.9 GHz -- 6.7 Future Directions -- 6.8 Conclusion -- 6.9 Appendix: Deterministic Multipath Channel Derivations -- 6.10 Appendix: LTV Channel Response -- 6.11 Appendix: Measurement Theory Details -- 6.12 References.
7 MAC Layer and Scalability Aspects of Vehicular Communication Networks (Jens Mittag, Felix Schmidt-Eisenlohr, Moritz Killat, Marc Torrent-Moreno and Hannes Hartenstein) -- 7.1 Introduction: Challenges and Requirements -- 7.2 A Survey on Proposed MAC Approaches for VANETs -- 7.3 Communication Based on IEEE 802.11p -- 7.4 Performance Evaluation and Modeling -- 7.5 Aspects of Congestion Control -- 7.6 Open Issues and Outlook -- 7.7 References -- 8 Efficient Application Level Message Coding and Composition (Craig L Robinson) -- 8.1 Introduction to the Application Environment -- 8.2 Message Dispatcher -- 8.3 Example Applications -- 8.4 Data Sets -- 8.5 Predictive Coding -- 8.6 Architecture Analysis -- 8.7 Conclusion -- 8.8 References -- 9 Data Security in Vehicular Communication Networks (AndrW̌eimerskirch, Jason J Haas, Yih-Chun Hu and Kenneth P Laberteaux) -- 9.1 Introduction -- 9.2 Challenges of Data Security in Vehicular Networks -- 9.3 Network, Applications, and Adversarial Model -- 9.4 Security Infrastructure -- 9.5 Cryptographic Protocols -- 9.6 Privacy Protection Mechanisms -- 9.7 Implementation Aspects -- 9.8 Outlook and Conclusions -- 9.9 References -- 10 Standards and Regulations (John B Kenney) -- 10.1 Introduction -- 10.2 Layered Architecture for VANETs -- 10.3 DSRC Regulations -- 10.4 DSRC Physical Layer Standard -- 10.5 DSRC Data Link Layer Standard (MAC and LLC) -- 10.6 DSRC Middle Layers -- 10.7 DSRC Message Sublayer -- 10.8 Summary -- 10.9 Abbreviations and Acronyms -- 10.10 References -- Index.
Record Nr. UNINA-9910139539403321
Chichester, U.K. : , : Wiley, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
VANET : vehicular applications and inter-networking technologies / / Hannes Hartenstein, Kenneth P. Laberteaux [editors]
VANET : vehicular applications and inter-networking technologies / / Hannes Hartenstein, Kenneth P. Laberteaux [editors]
Pubbl/distr/stampa Chichester, U.K. : , : Wiley, , 2010
Descrizione fisica 1 online resource (467 p.)
Disciplina 388.3/12
Altri autori (Persone) HartensteinHannes
LaberteauxKenneth
Collana Intelligent transport systems
Intelligent transportation systems
Soggetto topico Vehicular ad hoc networks (Computer networks)
Computer networks
ISBN 1-282-38045-1
9786612380457
0-470-74063-9
0-470-74062-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- About the Editors -- Preface -- Acknowledgements -- List of Contributors -- 1 Introduction (Hannes Hartenstein and Kenneth P. Laberteaux). -- 1.1 Basic Principles and Challenges -- 1.2 Past and Ongoing VANET Activities -- 1.3 Chapter Outlines -- 1.4 References -- 2 Cooperative Vehicular Safety Applications (Derek Caveney) -- 2.1 Introduction -- 2.2 Enabling Technologies -- 2.3 Cooperative System Architecture -- 2.4 Mapping for Safety Applications -- 2.5 VANET-enabled Active Safety Applications -- 2.6 References -- 3 Information Dissemination in VANETs (Christian Lochert, Bjorn Scheuermann and Martin Mauve) -- 3.1 Introduction -- 3.2 Obtaining Local Measurements -- 3.3 Information Transport -- 3.4 Summarizing Measurements -- 3.5 Geographical Data Aggregation -- 3.6 Conclusion -- 3.7 References -- 4 VANET Convenience and Efficiency Applications (Martin Mauve and Bjorn Scheruermann) -- 4.1 Introduction -- 4.2 Limitations -- 4.3 Applications -- 4.4 Communication Paradigms -- 4.5 Probabilistic, Area-based Aggregation -- 4.6 Travel Time Aggregation -- 4.7 Conclusion -- 4.8 References -- 5 Vehicular Mobility Modeling for VANETs (Jřm̥e Hr̃ri) -- 5.1 Introduction -- 5.2 Notation Description -- 5.3 Random Models -- 5.4 Flow Models -- 5.5 Traffic Models -- 5.6 Behavioral Models -- 5.7 Trace or Survey-based Models -- 5.8 Integration with Network Simulators -- 5.9 A Design Framework for Realistic Vehicular Mobility Models -- 5.10 Discussion and Outlook -- 5.11 Conclusion -- 5.12 References -- 6 Physical Layer Considerations for Vehicular Communications (Ian Tan and Ahmad Bahai) -- 6.1 Standards Overview -- 6.2 Previous Work -- 6.3 Wireless Propagation Theory -- 6.4 Channel Metrics -- 6.5 Measurement Theory -- 6.6 Emperical Channel Characterization at 5.9 GHz -- 6.7 Future Directions -- 6.8 Conclusion -- 6.9 Appendix: Deterministic Multipath Channel Derivations -- 6.10 Appendix: LTV Channel Response -- 6.11 Appendix: Measurement Theory Details -- 6.12 References.
7 MAC Layer and Scalability Aspects of Vehicular Communication Networks (Jens Mittag, Felix Schmidt-Eisenlohr, Moritz Killat, Marc Torrent-Moreno and Hannes Hartenstein) -- 7.1 Introduction: Challenges and Requirements -- 7.2 A Survey on Proposed MAC Approaches for VANETs -- 7.3 Communication Based on IEEE 802.11p -- 7.4 Performance Evaluation and Modeling -- 7.5 Aspects of Congestion Control -- 7.6 Open Issues and Outlook -- 7.7 References -- 8 Efficient Application Level Message Coding and Composition (Craig L Robinson) -- 8.1 Introduction to the Application Environment -- 8.2 Message Dispatcher -- 8.3 Example Applications -- 8.4 Data Sets -- 8.5 Predictive Coding -- 8.6 Architecture Analysis -- 8.7 Conclusion -- 8.8 References -- 9 Data Security in Vehicular Communication Networks (AndrW̌eimerskirch, Jason J Haas, Yih-Chun Hu and Kenneth P Laberteaux) -- 9.1 Introduction -- 9.2 Challenges of Data Security in Vehicular Networks -- 9.3 Network, Applications, and Adversarial Model -- 9.4 Security Infrastructure -- 9.5 Cryptographic Protocols -- 9.6 Privacy Protection Mechanisms -- 9.7 Implementation Aspects -- 9.8 Outlook and Conclusions -- 9.9 References -- 10 Standards and Regulations (John B Kenney) -- 10.1 Introduction -- 10.2 Layered Architecture for VANETs -- 10.3 DSRC Regulations -- 10.4 DSRC Physical Layer Standard -- 10.5 DSRC Data Link Layer Standard (MAC and LLC) -- 10.6 DSRC Middle Layers -- 10.7 DSRC Message Sublayer -- 10.8 Summary -- 10.9 Abbreviations and Acronyms -- 10.10 References -- Index.
Record Nr. UNINA-9910826431203321
Chichester, U.K. : , : Wiley, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui