top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cryptology and Network Security [[electronic resource] ] : 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings / / edited by Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi
Cryptology and Network Security [[electronic resource] ] : 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings / / edited by Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 355 p. 66 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer programming
Computer science—Mathematics
Coding theory
Information theory
Data structures (Computer science)
Cryptology
Computer Communication Networks
Programming Techniques
Discrete Mathematics in Computer Science
Coding and Information Theory
Data Structures and Information Theory
ISBN 1-280-39072-7
9786613568649
3-642-17619-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Block Ciphers -- Cryptanalysis of Reduced-Round MIBS Block Cipher -- Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds -- An Algorithm Based Concurrent Error Detection Scheme for AES -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices -- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP -- User Tracking Based on Behavioral Fingerprints -- Hash Functions -- On the Collision and Preimage Resistance of Certain Two-Call Hash Functions -- Integral Distinguishers of Some SHA-3 Candidates -- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE -- Public Key Cryptography -- Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems -- Generating Parameters for Algebraic Torus-Based Cryptosystems -- Analysis of the MQQ Public Key Cryptosystem -- Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations -- Invited Talk II -- Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk) -- Secure Mechanisms -- Towards a Cryptographic Treatment of Publish/Subscribe Systems -- STE3D-CAP: Stereoscopic 3D CAPTCHA -- TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism -- Cryptographic Protocols -- Dynamic Group Key Exchange Revisited -- Towards Practical and Secure Coercion-Resistant Electronic Elections -- Anonymous Credentials -- Predicate Encryption with Partial Public Keys -- Anonymous Credential Schemes with Encrypted Attributes -- One Time Anonymous Certificate: X.509 Supporting Anonymity.
Record Nr. UNISA-996465681303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptology and Network Security : 9th International Conference, CANS 2010 ; Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings / / Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi (eds.)
Cryptology and Network Security : 9th International Conference, CANS 2010 ; Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings / / Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, 2010
Descrizione fisica 1 online resource (XIII, 355 p. 66 illus.)
Disciplina 005.8
Altri autori (Persone) HengSwee-Huay
GoiBok-Min
WrightRebecca N. <1967->
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer networks - Security measures
Cryptography
ISBN 1-280-39072-7
9786613568649
3-642-17619-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Block Ciphers -- Cryptanalysis of Reduced-Round MIBS Block Cipher -- Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds -- An Algorithm Based Concurrent Error Detection Scheme for AES -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices -- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP -- User Tracking Based on Behavioral Fingerprints -- Hash Functions -- On the Collision and Preimage Resistance of Certain Two-Call Hash Functions -- Integral Distinguishers of Some SHA-3 Candidates -- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE -- Public Key Cryptography -- Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems -- Generating Parameters for Algebraic Torus-Based Cryptosystems -- Analysis of the MQQ Public Key Cryptosystem -- Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations -- Invited Talk II -- Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk) -- Secure Mechanisms -- Towards a Cryptographic Treatment of Publish/Subscribe Systems -- STE3D-CAP: Stereoscopic 3D CAPTCHA -- TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism -- Cryptographic Protocols -- Dynamic Group Key Exchange Revisited -- Towards Practical and Secure Coercion-Resistant Electronic Elections -- Anonymous Credentials -- Predicate Encryption with Partial Public Keys -- Anonymous Credential Schemes with Encrypted Attributes -- One Time Anonymous Certificate: X.509 Supporting Anonymity.
Record Nr. UNINA-9910484660403321
Berlin ; ; New York, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings / / edited by Swee-Huay Heng, Javier Lopez
Information Security Practice and Experience [[electronic resource] ] : 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings / / edited by Swee-Huay Heng, Javier Lopez
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 490 p. 130 illus., 59 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Computer organization
Computers and civilization
Systems and Data Security
Security
Computer Systems Organization and Communication Networks
Computers and Society
ISBN 3-030-34339-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography I -- Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model -- A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme -- Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme -- Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE -- System and Network Security -- KMO : Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism -- Peel the onion: Recognition of Android apps behind the Tor Network -- JSLess: A Tale of a Fileless Javascript Memory-Resident Malware -- Security Protocol and Tool -- A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation -- Secure Best Arm Identification in Multi-Armed Bandits -- CATCHA: When Cats Track Your Movements Online -- Designing a Code Vulnerability Meta-Scanner -- Access Control and Authentication -- Using IFTTT to Express and Enforce UCON Obligations -- Evaluation of Software PUF Based on Gyroscope -- White-Box Implementation of the KMAC Message Authentication Code -- Cryptography II -- Improving Signature Schemes With Tight Security Reductions -- Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings -- Identity-based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios -- Recovering Internal States of Grain-v1 -- Data and User Privacy -- GDPR-Compliant Reputation System Based on Self-Certifying Domain Signatures -- Defining a new composite cybersecurity rating scheme for SMEs in the U.K. -- Privacy Preserving Approach in Dynamic Social Network Data Publishing -- Short Paper I -- Using Freivalds’ algorithm to accelerate Lattice-Based Signature Verifications -- Group-based Key Exchange Protocol based on Complete Decomposition Search Problem -- Development Activities, Tools and Techniques of Secure Microservices Compositions -- Generating Phishing Emails Using Graph Database -- Short Paper II -- Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection -- The (Persistent) Threat of Weak Passwords: Implementation of a Semi-Automatic Password-Cracking Algorithm -- A Novel and Comprehensive Evaluation Methodology for SIEM.
Record Nr. UNISA-996466447003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience : 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings / / edited by Swee-Huay Heng, Javier Lopez
Information Security Practice and Experience : 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings / / edited by Swee-Huay Heng, Javier Lopez
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 490 p. 130 illus., 59 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Computer organization
Computers and civilization
Systems and Data Security
Security
Computer Systems Organization and Communication Networks
Computers and Society
ISBN 3-030-34339-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography I -- Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model -- A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme -- Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme -- Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE -- System and Network Security -- KMO : Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism -- Peel the onion: Recognition of Android apps behind the Tor Network -- JSLess: A Tale of a Fileless Javascript Memory-Resident Malware -- Security Protocol and Tool -- A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation -- Secure Best Arm Identification in Multi-Armed Bandits -- CATCHA: When Cats Track Your Movements Online -- Designing a Code Vulnerability Meta-Scanner -- Access Control and Authentication -- Using IFTTT to Express and Enforce UCON Obligations -- Evaluation of Software PUF Based on Gyroscope -- White-Box Implementation of the KMAC Message Authentication Code -- Cryptography II -- Improving Signature Schemes With Tight Security Reductions -- Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings -- Identity-based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios -- Recovering Internal States of Grain-v1 -- Data and User Privacy -- GDPR-Compliant Reputation System Based on Self-Certifying Domain Signatures -- Defining a new composite cybersecurity rating scheme for SMEs in the U.K. -- Privacy Preserving Approach in Dynamic Social Network Data Publishing -- Short Paper I -- Using Freivalds’ algorithm to accelerate Lattice-Based Signature Verifications -- Group-based Key Exchange Protocol based on Complete Decomposition Search Problem -- Development Activities, Tools and Techniques of Secure Microservices Compositions -- Generating Phishing Emails Using Graph Database -- Short Paper II -- Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection -- The (Persistent) Threat of Weak Passwords: Implementation of a Semi-Automatic Password-Cracking Algorithm -- A Novel and Comprehensive Evaluation Methodology for SIEM.
Record Nr. UNINA-9910357847903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui