top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security [[electronic resource] ] : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis
Computer Security [[electronic resource] ] : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 233 p. 108 illus., 78 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Seguridad informática
Delitos por ordenador
Computers
Law and legislation
Computer organization
Software engineering
Application software
Systems and Data Security
Computer Crime
Legal Aspects of Computing
Computer Systems Organization and Communication Networks
Software Engineering
Information Systems Applications (incl. Internet)
ISBN 3-030-12786-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910337578903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security [[electronic resource] ] : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis
Computer Security [[electronic resource] ] : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 233 p. 108 illus., 78 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Seguridad informática
Delitos por ordenador
Computers
Law and legislation
Computer organization
Software engineering
Application software
Systems and Data Security
Computer Crime
Legal Aspects of Computing
Computer Systems Organization and Communication Networks
Software Engineering
Information Systems Applications (incl. Internet)
ISBN 3-030-12786-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466343703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security [[electronic resource] ] : ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis
Computer Security [[electronic resource] ] : ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 281 p. 76 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Software engineering
Computer organization
Computers and civilization
Microprogramming 
Systems and Data Security
Cryptology
Software Engineering
Computer Systems Organization and Communication Networks
Computers and Society
Control Structures and Microprogramming
ISBN 3-319-72817-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Protecting Industrial Control and Cyber-Physical Systems -- Threats, Vulnerabilities and Risks -- Cyber Attacks in Industrial Control and Cyber-Physical Systems -- Detecting Attacks in Industrial Control and Cyber-Physical Systems -- Security and Privacy Requirements Assurance and Evaluation -- Security Requirements Elicitation and Modelling.
Record Nr. UNISA-996465495703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security [[electronic resource] ] : ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis
Computer Security [[electronic resource] ] : ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 281 p. 76 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Software engineering
Computer organization
Computers and civilization
Microprogramming 
Systems and Data Security
Cryptology
Software Engineering
Computer Systems Organization and Communication Networks
Computers and Society
Control Structures and Microprogramming
ISBN 3-319-72817-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Protecting Industrial Control and Cyber-Physical Systems -- Threats, Vulnerabilities and Risks -- Cyber Attacks in Industrial Control and Cyber-Physical Systems -- Detecting Attacks in Industrial Control and Cyber-Physical Systems -- Security and Privacy Requirements Assurance and Evaluation -- Security Requirements Elicitation and Modelling.
Record Nr. UNINA-9910349264103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Democracy – Privacy-Preserving, Secure, Intelligent E-Government Services [[electronic resource] ] : 7th International Conference, E-Democracy 2017, Athens, Greece, December 14-15, 2017, Proceedings / / edited by Sokratis K. Katsikas, Vasilios Zorkadis
E-Democracy – Privacy-Preserving, Secure, Intelligent E-Government Services [[electronic resource] ] : 7th International Conference, E-Democracy 2017, Athens, Greece, December 14-15, 2017, Proceedings / / edited by Sokratis K. Katsikas, Vasilios Zorkadis
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XII, 273 p. 58 illus.)
Disciplina 352.3802854678
Collana Communications in Computer and Information Science
Soggetto topico Computers and civilization
Data protection
Application software
Education—Data processing
Computers and Society
Security
Information Systems Applications (incl. Internet)
Computer Appl. in Social and Behavioral Sciences
Computers and Education
ISBN 3-319-71117-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto E-democracy -- Privacy -- Information dissemination and freedom of expression -- Social networks -- Electronic identity authentication -- ICT in government and in the economy.
Record Nr. UNINA-9910254829903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Democracy: Citizen Rights in the World of the New Computing Paradigms [[electronic resource] ] : 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings / / edited by Sokratis K. Katsikas, Alexander B. Sideridis
E-Democracy: Citizen Rights in the World of the New Computing Paradigms [[electronic resource] ] : 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings / / edited by Sokratis K. Katsikas, Alexander B. Sideridis
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 234 p. 40 illus. in color.)
Disciplina 352.3802854678
Collana Communications in Computer and Information Science
Soggetto topico Computers and civilization
Computer security
Management information systems
Computer science
Application software
Computers and Society
Systems and Data Security
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
ISBN 3-319-27164-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910299258003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging Information Security and Applications : 4th International Conference, EISA 2023, Hangzhou, China, December 6–7, 2023, Proceedings / / edited by Jun Shao, Sokratis K. Katsikas, Weizhi Meng
Emerging Information Security and Applications : 4th International Conference, EISA 2023, Hangzhou, China, December 6–7, 2023, Proceedings / / edited by Jun Shao, Sokratis K. Katsikas, Weizhi Meng
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (XII, 185 p. 48 illus., 35 illus. in color.)
Disciplina 621.39
004.6
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Cryptography
Data encryption (Computer science)
Artificial intelligence
Data protection
Computer networks - Security measures
Computer Engineering and Networks
Cryptology
Artificial Intelligence
Data and Information Security
Mobile and Network Security
ISBN 981-9996-14-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples -- Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-step Method -- Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System -- A Systematic Method for Constructing ICT Supply Chain Security Requirements -- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography -- Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge -- Deep Neural Network Model over Encrypted Data -- Privacy Protection Mechanism for Fair Federated Learning -- Chinese Named Entity Recognition within the Electric Power Domain -- Adversarial Sampling Attacks and Defense in DNS Data Exfiltration -- CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN.
Record Nr. UNINA-9910799212903321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings / / edited by Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Bart Preneel
Information Security [[electronic resource] ] : 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings / / edited by Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Bart Preneel
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 548 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Algorithms
Computer communication systems
Special purpose computers
Management information systems
Computer science
Cryptology
Operating Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Special Purpose and Application-Based Systems
Management of Computing and Information Systems
ISBN 3-540-38343-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation -- Privacy and Anonymity -- Low Latency Anonymity with Mix Rings -- Breaking Four Mix-Related Schemes Based on Universal Re-encryption -- Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy -- Protecting Data Privacy Through Hard-to-Reverse Negative Databases -- Block Ciphers and Hash Functions -- Related-Key Rectangle Attack on 42-Round SHACAL-2 -- On the Collision Resistance of RIPEMD-160 -- Digital Signatures -- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption -- Multi-party Concurrent Signatures -- Formal Security Model of Multisignatures -- Cryptanalysis of Variants of UOV -- Stream Ciphers -- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles -- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s -- Encryption I -- A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice -- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search -- Collusion-Free Policy-Based Encryption -- Pervasive Computing -- Using Multiple Smart Cards for Signing Messages at Malicious Terminals -- Diverging Keys in Wireless Sensor Networks -- Encryption II -- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption -- Transparent Image Encryption Using Progressive JPEG -- Network Security -- Preserving TCP Connections Across Host Address Changes -- A Security Architecture for Protecting LAN Interactions -- Simulation of Internet DDoS Attacks and Defense -- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr -- Watermarking and DRM -- Rights Protection for Data Cubes -- An Efficient Probabilistic Packet Marking Scheme (NOD-PPM) -- Intrusion Detection and Worms -- Resistance Analysis to Intruders’ Evasion of Detecting Intrusion -- A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks -- Anomaly Intrusion Detection Based on Clustering a Data Stream -- Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation -- Key Exchange -- An Authentication and Key Exchange Protocol for Secure Credential Services -- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders -- Security Protocols and Formal Methods -- Formalising Receipt-Freeness -- Enhancing the Security and Efficiency of 3-D Secure -- Designing and Verifying Core Protocols for Location Privacy -- Information Systems Security -- Delegation in a Distributed Healthcare Context: A Survey of Current Approaches -- Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness.
Record Nr. UNISA-996466144403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings / / edited by Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Bart Preneel
Information Security [[electronic resource] ] : 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings / / edited by Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Bart Preneel
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 548 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Algorithms
Computer communication systems
Special purpose computers
Management information systems
Computer science
Cryptology
Operating Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Special Purpose and Application-Based Systems
Management of Computing and Information Systems
ISBN 3-540-38343-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation -- Privacy and Anonymity -- Low Latency Anonymity with Mix Rings -- Breaking Four Mix-Related Schemes Based on Universal Re-encryption -- Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy -- Protecting Data Privacy Through Hard-to-Reverse Negative Databases -- Block Ciphers and Hash Functions -- Related-Key Rectangle Attack on 42-Round SHACAL-2 -- On the Collision Resistance of RIPEMD-160 -- Digital Signatures -- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption -- Multi-party Concurrent Signatures -- Formal Security Model of Multisignatures -- Cryptanalysis of Variants of UOV -- Stream Ciphers -- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles -- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s -- Encryption I -- A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice -- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search -- Collusion-Free Policy-Based Encryption -- Pervasive Computing -- Using Multiple Smart Cards for Signing Messages at Malicious Terminals -- Diverging Keys in Wireless Sensor Networks -- Encryption II -- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption -- Transparent Image Encryption Using Progressive JPEG -- Network Security -- Preserving TCP Connections Across Host Address Changes -- A Security Architecture for Protecting LAN Interactions -- Simulation of Internet DDoS Attacks and Defense -- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr -- Watermarking and DRM -- Rights Protection for Data Cubes -- An Efficient Probabilistic Packet Marking Scheme (NOD-PPM) -- Intrusion Detection and Worms -- Resistance Analysis to Intruders’ Evasion of Detecting Intrusion -- A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks -- Anomaly Intrusion Detection Based on Clustering a Data Stream -- Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation -- Key Exchange -- An Authentication and Key Exchange Protocol for Secure Credential Services -- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders -- Security Protocols and Formal Methods -- Formalising Receipt-Freeness -- Enhancing the Security and Efficiency of 3-D Secure -- Designing and Verifying Core Protocols for Location Privacy -- Information Systems Security -- Delegation in a Distributed Healthcare Context: A Survey of Current Approaches -- Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness.
Record Nr. UNINA-9910483667703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings : third International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2008 : Malaga, Spain, 9 October 2008
Proceedings : third International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2008 : Malaga, Spain, 9 October 2008
Pubbl/distr/stampa [Place of publication not identified], : CPS Conference Pub Services, 2008
Disciplina 005.8
Soggetto topico Digital forensic science
Engineering & Applied Sciences
Computer Science
ISBN 1-5090-7895-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996216504503316
[Place of publication not identified], : CPS Conference Pub Services, 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui