top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security [[electronic resource] ] : 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings / / edited by Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
Information Security [[electronic resource] ] : 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings / / edited by Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 570 p. 95 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Special purpose computers
Computers and civilization
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
Math Applications in Computer Science
Special Purpose and Application-Based Systems
Computers and Society
ISBN 3-319-13257-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs and Arguments -- Outsourced and Multi-party Computations -- Implementation -- Information Leakage -- Firewall and Forensics -- Web Security -- Android Security.
Record Nr. UNISA-996210526603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security : 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings / / edited by Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
Information Security : 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings / / edited by Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 570 p. 95 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Special purpose computers
Computers and civilization
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
Math Applications in Computer Science
Special Purpose and Application-Based Systems
Computers and Society
ISBN 3-319-13257-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs and Arguments -- Outsourced and Multi-party Computations -- Implementation -- Information Leakage -- Firewall and Forensics -- Web Security -- Android Security.
Record Nr. UNINA-9910483890103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Provable Security [[electronic resource] ] : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings / / edited by Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu
Provable Security [[electronic resource] ] : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings / / edited by Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 351 p. 41 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Application software
Management information systems
Computer science
Cryptology
Systems and Data Security
Computers and Society
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
ISBN 3-319-12475-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Paper -- Password-Based Authenticated Key Exchange: An Overview -- Practical and Provably Secure Attribute Based Encryption -- Fundamental -- Adaptive versus Static Security in the UC Model -- Impossibility of Surjective Icart-Like Encodings -- Symmetric Key Encryption -- On the practical security bound of GF-NLFSR structure with SPN round function -- Misuse-Resistant Variants of the OMD Authenticated Encryption Mode -- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function -- Authentication.-Forward-Secure Sequential Aggregate Message Authentication Revisited: Formalization and a Provably Secure Scheme -- A Provable Secure Batch Authentication Scheme for EPCGen2 Tags -- Signatures -- Generic Transformation to Strongly Existentially Unforgettable Signature Schemes with Leakage Resiliency -- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures -- Protocol -- Verifiable Computation in Multiparty Protocols with Honest Majority -- Public Key Encryption -- Lossy Trapdoor Relation and Its Application to Lossy Encryption and Adaptive Trapdoor Relation.-Compact Public Key Encryption with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security -- Fine-grained Conditional Proxy Re-encryption and Application -- Predicate Encryption -- Constructing Subspace Membership Encryption through Inner Product Encryption -- Efficient (Anonymous) Compact HIBE From Standard Assumptions -- Attribute-based Cryptosystem -- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts -- Attribute-Based Signcryption : Signer Privacy, Strong Unforgetability and IND-CCA2 Security in Adaptive-Predicates Attack -- Short Papers -- How to Use Pseudorandom Generators in Unconditional Security Settings -- Equivalence between MAC and PRF for Blockcipher based Constructions -- A Short Fail-Stop Signature Scheme from Factoring -- Computational Soundness of Asymmetric Bilinear Pairing-based Protocols -- Timed-Release Computational Secret Sharing Scheme and Its Applications -- Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage -- Complete Robustness in Identity-Based Encryption.
Record Nr. UNISA-996213647703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Provable Security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings / / edited by Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu
Provable Security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings / / edited by Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 351 p. 41 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Application software
Management information systems
Computer science
Cryptology
Systems and Data Security
Computers and Society
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
ISBN 3-319-12475-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Paper -- Password-Based Authenticated Key Exchange: An Overview -- Practical and Provably Secure Attribute Based Encryption -- Fundamental -- Adaptive versus Static Security in the UC Model -- Impossibility of Surjective Icart-Like Encodings -- Symmetric Key Encryption -- On the practical security bound of GF-NLFSR structure with SPN round function -- Misuse-Resistant Variants of the OMD Authenticated Encryption Mode -- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function -- Authentication.-Forward-Secure Sequential Aggregate Message Authentication Revisited: Formalization and a Provably Secure Scheme -- A Provable Secure Batch Authentication Scheme for EPCGen2 Tags -- Signatures -- Generic Transformation to Strongly Existentially Unforgettable Signature Schemes with Leakage Resiliency -- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures -- Protocol -- Verifiable Computation in Multiparty Protocols with Honest Majority -- Public Key Encryption -- Lossy Trapdoor Relation and Its Application to Lossy Encryption and Adaptive Trapdoor Relation.-Compact Public Key Encryption with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security -- Fine-grained Conditional Proxy Re-encryption and Application -- Predicate Encryption -- Constructing Subspace Membership Encryption through Inner Product Encryption -- Efficient (Anonymous) Compact HIBE From Standard Assumptions -- Attribute-based Cryptosystem -- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts -- Attribute-Based Signcryption : Signer Privacy, Strong Unforgetability and IND-CCA2 Security in Adaptive-Predicates Attack -- Short Papers -- How to Use Pseudorandom Generators in Unconditional Security Settings -- Equivalence between MAC and PRF for Blockcipher based Constructions -- A Short Fail-Stop Signature Scheme from Factoring -- Computational Soundness of Asymmetric Bilinear Pairing-based Protocols -- Timed-Release Computational Secret Sharing Scheme and Its Applications -- Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage -- Complete Robustness in Identity-Based Encryption.
Record Nr. UNINA-9910484835503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui