Data Privacy Management, Cryptocurrencies and Blockchain Technology [[electronic resource] ] : ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomartí |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 446 p. 68 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Application software Algorithms Systems and Data Security Management of Computing and Information Systems Cryptology Information Systems Applications (incl. Internet) Algorithm Analysis and Problem Complexity |
ISBN | 3-319-67816-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Proof Calculus for Attack Trees in Isabelle -- Confidentiality of Interactions in Concurrent Object-Oriented Systems -- Using Oblivious RAM in Genomic Studies -- Towards Efficient and Secure Encrypted Databases: Extending -- Message-Locked Encryption in Three-Party Model -- Searchable Encrypted Relational Databases: Risks and Countermeasures -- Private verification of access on medical data: an initial study -- Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences -- Bounding Privacy Leaks in Privacy Preserving Data Mining -- Threshold Single Password Authentication -- Towards A Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization -- Enforcement of External Anonymization -- DLoc: Distributed Auditing for Data Location Compliance in Cloud -- Inonymous: Anonymous Invitation-Based System -- Order-Preserving Encryption Using Approximate Integer Common Divisors -- Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks -- Securing Proof-of-Stake Blockchain Protocols -- Merged Mining: Curse or Cure? -- Atomically Trading with Roger: Gambling on the success of a hardfork -- Smart Contracts and Blockchain Identity -- In Code We Trust? Measuring the Control Flow Immutability of All -- Smart Contracts Deployed on Ethereum -- Who Am I? Secure Identity Registration on Distributed Ledgers -- User-centric System for Verified Identities on the Bitcoin Blockchain -- Towards a Concurrent and Distributed Route Selection for Payment Channel Networks -- Graphene: A New Protocol for Block Propagation Using Set Reconciliation -- Revisiting Difficulty Control for Blockchain Systems -- Secure Event Tickets on a Blockchain. |
Record Nr. | UNINA-9910483434003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Privacy Management, Cryptocurrencies and Blockchain Technology [[electronic resource] ] : ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomartí |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 446 p. 68 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Application software Algorithms Systems and Data Security Management of Computing and Information Systems Cryptology Information Systems Applications (incl. Internet) Algorithm Analysis and Problem Complexity |
ISBN | 3-319-67816-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Proof Calculus for Attack Trees in Isabelle -- Confidentiality of Interactions in Concurrent Object-Oriented Systems -- Using Oblivious RAM in Genomic Studies -- Towards Efficient and Secure Encrypted Databases: Extending -- Message-Locked Encryption in Three-Party Model -- Searchable Encrypted Relational Databases: Risks and Countermeasures -- Private verification of access on medical data: an initial study -- Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences -- Bounding Privacy Leaks in Privacy Preserving Data Mining -- Threshold Single Password Authentication -- Towards A Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization -- Enforcement of External Anonymization -- DLoc: Distributed Auditing for Data Location Compliance in Cloud -- Inonymous: Anonymous Invitation-Based System -- Order-Preserving Encryption Using Approximate Integer Common Divisors -- Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks -- Securing Proof-of-Stake Blockchain Protocols -- Merged Mining: Curse or Cure? -- Atomically Trading with Roger: Gambling on the success of a hardfork -- Smart Contracts and Blockchain Identity -- In Code We Trust? Measuring the Control Flow Immutability of All -- Smart Contracts Deployed on Ethereum -- Who Am I? Secure Identity Registration on Distributed Ledgers -- User-centric System for Verified Identities on the Bitcoin Blockchain -- Towards a Concurrent and Distributed Route Selection for Payment Channel Networks -- Graphene: A New Protocol for Block Propagation Using Set Reconciliation -- Revisiting Difficulty Control for Blockchain Systems -- Secure Event Tickets on a Blockchain. |
Record Nr. | UNISA-996465549703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Inter-Vehicle-Communications - Based on Ad Hoc Networking Principles : The FleetNet Project / / Martin Mauve, Hannes Hartenstein, Walter Franz, editor |
Pubbl/distr/stampa | [Place of publication not identified] : , : KIT Scientific Publishing, , 2005 |
Descrizione fisica | 1 online resource (302 pages) |
Disciplina | 388.312 |
Soggetto topico | Vehicular ad hoc networks (Computer networks) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Inter-Vehicle-Communications - Based on Ad Hoc Networking Principles |
Record Nr. | UNINA-9910688316103321 |
[Place of publication not identified] : , : KIT Scientific Publishing, , 2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in Ad-hoc and Sensor Networks [[electronic resource] ] : First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers / / edited by Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (VIII, 231 p.) |
Disciplina | 005.82 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Algorithms Management information systems Computer science Application software Electrical engineering Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Information Systems Applications (incl. Internet) Communications Engineering, Networks |
ISBN | 3-540-30496-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | New Research Challenges for the Security of Ad Hoc and Sensor Networks -- Public Key Cryptography in Sensor Networks—Revisited -- Exploring Message Authentication in Sensor Networks -- Secure Initialization in Single-Hop Radio Networks -- Some Methods for Privacy in RFID Communication -- Ring Signature Schemes for General Ad-Hoc Access Structures -- Linking Ad Hoc Charging Schemes to AAAC Architectures -- Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups -- Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems -- Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH -- Secure Overlay for Service Centric Wireless Sensor Networks -- IKE in Ad-Hoc IP Networking -- Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks -- A Security Architecture for Mobile Wireless Sensor Networks -- Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on -- Key Management in Wireless Sensor Networks -- SDD: Secure Directed Diffusion Protocol for Sensor Networks -- Secure AES Hardware Module for Resource Constrained Devices. |
Record Nr. | UNISA-996466018403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security in Ad-hoc and Sensor Networks [[electronic resource] ] : First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers / / edited by Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (VIII, 231 p.) |
Disciplina | 005.82 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Algorithms Management information systems Computer science Application software Electrical engineering Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Information Systems Applications (incl. Internet) Communications Engineering, Networks |
ISBN | 3-540-30496-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | New Research Challenges for the Security of Ad Hoc and Sensor Networks -- Public Key Cryptography in Sensor Networks—Revisited -- Exploring Message Authentication in Sensor Networks -- Secure Initialization in Single-Hop Radio Networks -- Some Methods for Privacy in RFID Communication -- Ring Signature Schemes for General Ad-Hoc Access Structures -- Linking Ad Hoc Charging Schemes to AAAC Architectures -- Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups -- Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems -- Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH -- Secure Overlay for Service Centric Wireless Sensor Networks -- IKE in Ad-Hoc IP Networking -- Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks -- A Security Architecture for Mobile Wireless Sensor Networks -- Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on -- Key Management in Wireless Sensor Networks -- SDD: Secure Directed Diffusion Protocol for Sensor Networks -- Secure AES Hardware Module for Resource Constrained Devices. |
Record Nr. | UNINA-9910484960403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
VANET : vehicular applications and inter-networking technologies / / Hannes Hartenstein, Kenneth P. Laberteaux [editors] |
Pubbl/distr/stampa | Chichester, U.K. : , : Wiley, , 2010 |
Descrizione fisica | 1 online resource (467 p.) |
Disciplina | 388.3/12 |
Altri autori (Persone) |
HartensteinHannes
LaberteauxKenneth |
Collana |
Intelligent transport systems
Intelligent transportation systems |
Soggetto topico |
Vehicular ad hoc networks (Computer networks)
Computer networks |
ISBN |
1-282-38045-1
9786612380457 0-470-74063-9 0-470-74062-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Foreword -- About the Editors -- Preface -- Acknowledgements -- List of Contributors -- 1 Introduction (Hannes Hartenstein and Kenneth P. Laberteaux). -- 1.1 Basic Principles and Challenges -- 1.2 Past and Ongoing VANET Activities -- 1.3 Chapter Outlines -- 1.4 References -- 2 Cooperative Vehicular Safety Applications (Derek Caveney) -- 2.1 Introduction -- 2.2 Enabling Technologies -- 2.3 Cooperative System Architecture -- 2.4 Mapping for Safety Applications -- 2.5 VANET-enabled Active Safety Applications -- 2.6 References -- 3 Information Dissemination in VANETs (Christian Lochert, Bjorn Scheuermann and Martin Mauve) -- 3.1 Introduction -- 3.2 Obtaining Local Measurements -- 3.3 Information Transport -- 3.4 Summarizing Measurements -- 3.5 Geographical Data Aggregation -- 3.6 Conclusion -- 3.7 References -- 4 VANET Convenience and Efficiency Applications (Martin Mauve and Bjorn Scheruermann) -- 4.1 Introduction -- 4.2 Limitations -- 4.3 Applications -- 4.4 Communication Paradigms -- 4.5 Probabilistic, Area-based Aggregation -- 4.6 Travel Time Aggregation -- 4.7 Conclusion -- 4.8 References -- 5 Vehicular Mobility Modeling for VANETs (Jřm̥e Hr̃ri) -- 5.1 Introduction -- 5.2 Notation Description -- 5.3 Random Models -- 5.4 Flow Models -- 5.5 Traffic Models -- 5.6 Behavioral Models -- 5.7 Trace or Survey-based Models -- 5.8 Integration with Network Simulators -- 5.9 A Design Framework for Realistic Vehicular Mobility Models -- 5.10 Discussion and Outlook -- 5.11 Conclusion -- 5.12 References -- 6 Physical Layer Considerations for Vehicular Communications (Ian Tan and Ahmad Bahai) -- 6.1 Standards Overview -- 6.2 Previous Work -- 6.3 Wireless Propagation Theory -- 6.4 Channel Metrics -- 6.5 Measurement Theory -- 6.6 Emperical Channel Characterization at 5.9 GHz -- 6.7 Future Directions -- 6.8 Conclusion -- 6.9 Appendix: Deterministic Multipath Channel Derivations -- 6.10 Appendix: LTV Channel Response -- 6.11 Appendix: Measurement Theory Details -- 6.12 References.
7 MAC Layer and Scalability Aspects of Vehicular Communication Networks (Jens Mittag, Felix Schmidt-Eisenlohr, Moritz Killat, Marc Torrent-Moreno and Hannes Hartenstein) -- 7.1 Introduction: Challenges and Requirements -- 7.2 A Survey on Proposed MAC Approaches for VANETs -- 7.3 Communication Based on IEEE 802.11p -- 7.4 Performance Evaluation and Modeling -- 7.5 Aspects of Congestion Control -- 7.6 Open Issues and Outlook -- 7.7 References -- 8 Efficient Application Level Message Coding and Composition (Craig L Robinson) -- 8.1 Introduction to the Application Environment -- 8.2 Message Dispatcher -- 8.3 Example Applications -- 8.4 Data Sets -- 8.5 Predictive Coding -- 8.6 Architecture Analysis -- 8.7 Conclusion -- 8.8 References -- 9 Data Security in Vehicular Communication Networks (AndrW̌eimerskirch, Jason J Haas, Yih-Chun Hu and Kenneth P Laberteaux) -- 9.1 Introduction -- 9.2 Challenges of Data Security in Vehicular Networks -- 9.3 Network, Applications, and Adversarial Model -- 9.4 Security Infrastructure -- 9.5 Cryptographic Protocols -- 9.6 Privacy Protection Mechanisms -- 9.7 Implementation Aspects -- 9.8 Outlook and Conclusions -- 9.9 References -- 10 Standards and Regulations (John B Kenney) -- 10.1 Introduction -- 10.2 Layered Architecture for VANETs -- 10.3 DSRC Regulations -- 10.4 DSRC Physical Layer Standard -- 10.5 DSRC Data Link Layer Standard (MAC and LLC) -- 10.6 DSRC Middle Layers -- 10.7 DSRC Message Sublayer -- 10.8 Summary -- 10.9 Abbreviations and Acronyms -- 10.10 References -- Index. |
Record Nr. | UNINA-9910139539403321 |
Chichester, U.K. : , : Wiley, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
VANET : vehicular applications and inter-networking technologies / / Hannes Hartenstein, Kenneth P. Laberteaux [editors] |
Pubbl/distr/stampa | Chichester, U.K. : , : Wiley, , 2010 |
Descrizione fisica | 1 online resource (467 p.) |
Disciplina | 388.3/12 |
Altri autori (Persone) |
HartensteinHannes
LaberteauxKenneth |
Collana |
Intelligent transport systems
Intelligent transportation systems |
Soggetto topico |
Vehicular ad hoc networks (Computer networks)
Computer networks |
ISBN |
1-282-38045-1
9786612380457 0-470-74063-9 0-470-74062-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Foreword -- About the Editors -- Preface -- Acknowledgements -- List of Contributors -- 1 Introduction (Hannes Hartenstein and Kenneth P. Laberteaux). -- 1.1 Basic Principles and Challenges -- 1.2 Past and Ongoing VANET Activities -- 1.3 Chapter Outlines -- 1.4 References -- 2 Cooperative Vehicular Safety Applications (Derek Caveney) -- 2.1 Introduction -- 2.2 Enabling Technologies -- 2.3 Cooperative System Architecture -- 2.4 Mapping for Safety Applications -- 2.5 VANET-enabled Active Safety Applications -- 2.6 References -- 3 Information Dissemination in VANETs (Christian Lochert, Bjorn Scheuermann and Martin Mauve) -- 3.1 Introduction -- 3.2 Obtaining Local Measurements -- 3.3 Information Transport -- 3.4 Summarizing Measurements -- 3.5 Geographical Data Aggregation -- 3.6 Conclusion -- 3.7 References -- 4 VANET Convenience and Efficiency Applications (Martin Mauve and Bjorn Scheruermann) -- 4.1 Introduction -- 4.2 Limitations -- 4.3 Applications -- 4.4 Communication Paradigms -- 4.5 Probabilistic, Area-based Aggregation -- 4.6 Travel Time Aggregation -- 4.7 Conclusion -- 4.8 References -- 5 Vehicular Mobility Modeling for VANETs (Jřm̥e Hr̃ri) -- 5.1 Introduction -- 5.2 Notation Description -- 5.3 Random Models -- 5.4 Flow Models -- 5.5 Traffic Models -- 5.6 Behavioral Models -- 5.7 Trace or Survey-based Models -- 5.8 Integration with Network Simulators -- 5.9 A Design Framework for Realistic Vehicular Mobility Models -- 5.10 Discussion and Outlook -- 5.11 Conclusion -- 5.12 References -- 6 Physical Layer Considerations for Vehicular Communications (Ian Tan and Ahmad Bahai) -- 6.1 Standards Overview -- 6.2 Previous Work -- 6.3 Wireless Propagation Theory -- 6.4 Channel Metrics -- 6.5 Measurement Theory -- 6.6 Emperical Channel Characterization at 5.9 GHz -- 6.7 Future Directions -- 6.8 Conclusion -- 6.9 Appendix: Deterministic Multipath Channel Derivations -- 6.10 Appendix: LTV Channel Response -- 6.11 Appendix: Measurement Theory Details -- 6.12 References.
7 MAC Layer and Scalability Aspects of Vehicular Communication Networks (Jens Mittag, Felix Schmidt-Eisenlohr, Moritz Killat, Marc Torrent-Moreno and Hannes Hartenstein) -- 7.1 Introduction: Challenges and Requirements -- 7.2 A Survey on Proposed MAC Approaches for VANETs -- 7.3 Communication Based on IEEE 802.11p -- 7.4 Performance Evaluation and Modeling -- 7.5 Aspects of Congestion Control -- 7.6 Open Issues and Outlook -- 7.7 References -- 8 Efficient Application Level Message Coding and Composition (Craig L Robinson) -- 8.1 Introduction to the Application Environment -- 8.2 Message Dispatcher -- 8.3 Example Applications -- 8.4 Data Sets -- 8.5 Predictive Coding -- 8.6 Architecture Analysis -- 8.7 Conclusion -- 8.8 References -- 9 Data Security in Vehicular Communication Networks (AndrW̌eimerskirch, Jason J Haas, Yih-Chun Hu and Kenneth P Laberteaux) -- 9.1 Introduction -- 9.2 Challenges of Data Security in Vehicular Networks -- 9.3 Network, Applications, and Adversarial Model -- 9.4 Security Infrastructure -- 9.5 Cryptographic Protocols -- 9.6 Privacy Protection Mechanisms -- 9.7 Implementation Aspects -- 9.8 Outlook and Conclusions -- 9.9 References -- 10 Standards and Regulations (John B Kenney) -- 10.1 Introduction -- 10.2 Layered Architecture for VANETs -- 10.3 DSRC Regulations -- 10.4 DSRC Physical Layer Standard -- 10.5 DSRC Data Link Layer Standard (MAC and LLC) -- 10.6 DSRC Middle Layers -- 10.7 DSRC Message Sublayer -- 10.8 Summary -- 10.9 Abbreviations and Acronyms -- 10.10 References -- Index. |
Record Nr. | UNINA-9910826431203321 |
Chichester, U.K. : , : Wiley, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|