top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security -- ESORICS 2002 [[electronic resource] ] : 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings / / edited by Dieter Gollmann, Günter Karjoth, Michael Waidner
Computer Security -- ESORICS 2002 [[electronic resource] ] : 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings / / edited by Dieter Gollmann, Günter Karjoth, Michael Waidner
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (CCCVIII, 298 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Computer communication systems
Database management
Cryptology
Operating Systems
Computer Communication Networks
Database Management
ISBN 3-540-45853-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computational Probabilistic Non-interference -- Bit-Slice Auction Circuit -- Confidentiality Policies and Their Enforcement for Controlled Query Evaluation -- Cardinality-Based Inference Control in Sum-Only Data Cubes -- Outbound Authentication for Programmable Secure Coprocessors -- Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense -- A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations -- Authentication for Distributed Web Caches -- Analysing a Stream Authentication Protocol Using Model Checking -- Equal To The Task? -- TINMAN: A Resource Bound Security Checking System for Mobile Code -- Confidentiality-Preserving Refinement is Compositional — Sometimes -- Formal Security Analysis with Interacting State Machines -- Decidability of Safety in Graph-Based Models for Access Control -- Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones -- Learning Fingerprints for a Database Intrusion Detection System.
Record Nr. UNISA-996465392703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security -- ESORICS 2002 : 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings / / edited by Dieter Gollmann, Günter Karjoth, Michael Waidner
Computer Security -- ESORICS 2002 : 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings / / edited by Dieter Gollmann, Günter Karjoth, Michael Waidner
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (CCCVIII, 298 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Computer communication systems
Database management
Cryptology
Operating Systems
Computer Communication Networks
Database Management
ISBN 3-540-45853-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computational Probabilistic Non-interference -- Bit-Slice Auction Circuit -- Confidentiality Policies and Their Enforcement for Controlled Query Evaluation -- Cardinality-Based Inference Control in Sum-Only Data Cubes -- Outbound Authentication for Programmable Secure Coprocessors -- Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense -- A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations -- Authentication for Distributed Web Caches -- Analysing a Stream Authentication Protocol Using Model Checking -- Equal To The Task? -- TINMAN: A Resource Bound Security Checking System for Mobile Code -- Confidentiality-Preserving Refinement is Compositional — Sometimes -- Formal Security Analysis with Interacting State Machines -- Decidability of Safety in Graph-Based Models for Access Control -- Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones -- Learning Fingerprints for a Database Intrusion Detection System.
Record Nr. UNINA-9910143897003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui