Applied Cryptography and Network Security [[electronic resource] ] : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings / / edited by Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (XI, 508 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Data protection Application software Computers and civilization Electronic data processing—Management Computer Communication Networks Cryptology Data and Information Security Computer and Information Systems Applications Computers and Society IT Operations |
ISBN | 3-540-68914-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On the Effectiveness of Internal Patching Against File-Sharing Worms -- Peeking Through the Cloud: DNS-Based Estimation and Its Applications -- Pushback for Overlay Networks: Protecting Against Malicious Insiders -- PPAA: Peer-to-Peer Anonymous Authentication -- Generic Constructions of Stateful Public Key Encryption and Their Applications -- Traceable and Retrievable Identity-Based Encryption -- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures -- Attacking Reduced Round SHA-256 -- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography -- Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA? -- Replay Attack in a Fair Exchange Protocol -- Improved Conditional E-Payments -- Anonymity in Transferable E-cash -- Generic Security-Amplifying Methods of Ordinary Digital Signatures -- New Differential-Algebraic Attacks and Reparametrization of Rainbow -- Trapdoor Sanitizable Signatures and Their Application to Content Protection -- Multi-factor Authenticated Key Exchange -- Repelling Detour Attack Against Onions with Re-encryption -- Analysis of EAP-GPSK Authentication Protocol -- Efficient Device Pairing Using “Human-Comparable” Synchronized Audiovisual Patterns -- PUF-HB: A Tamper-Resilient HB Based Authentication Protocol -- An Authentication Scheme Based on the Twisted Conjugacy Problem -- Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance -- A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation -- On the Security of the CCM Encryption Mode and of a Slight Variant -- wNAF *, an Efficient Left-to-Right Signed Digit Recoding Algorithm -- A Very Compact “Perfectly Masked” S-Box for AES -- Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks -- Traceable Privacy of Recent Provably-Secure RFID Protocols -- The Security of EPC Gen2 Compliant RFID Protocols. |
Record Nr. | UNISA-996465617203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Cryptography and Network Security [[electronic resource] ] : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings / / edited by John Ioannidis, Angelos D. Keromytis, Moti Yung |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XII, 530 p.) |
Disciplina | 005.8/2 |
Collana | Security and Cryptology |
Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Operating systems (Computers) Information storage and retrieval systems Application software Electronic data processing—Management Computer Communication Networks Cryptology Operating Systems Information Storage and Retrieval Computer and Information Systems Applications IT Operations |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Two-Server Password-Only Authenticated Key Exchange -- Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks -- Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution -- A Traitor Tracing Scheme Based on RSA for Fast Decryption -- N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords -- Messin’ with Texas Deriving Mother’s Maiden Names Using Public Records -- Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management -- Searching for High-Value Rare Events with Uncheatable Grid Computing -- Digital Signatures Do Not Guarantee Exclusive Ownership -- Thompson’s Group and Public Key Cryptography -- Rainbow, a New Multivariable Polynomial Signature Scheme -- Badger – A Fast and Provably Secure MAC -- IDS False Alarm Reduction Using Continuous and Discontinuous Patterns -- Indexing Information for Data Forensics -- Model Generalization and Its Implications on Intrusion Detection -- Intrusion-Resilient Secure Channels -- Optimal Asymmetric Encryption and Signature Paddings -- Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA -- Identity Based Encryption Without Redundancy -- OACerts: Oblivious Attribute Certificates -- Dynamic k-Times Anonymous Authentication -- Efficient Anonymous Roaming and Its Security Analysis -- Quantifying Security in Hybrid Cellular Networks -- Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications -- Building Reliable Mix Networks with Fair Exchange -- SCARE of the DES -- Robust Key Extraction from Physical Uncloneable Functions -- Efficient Constructions for One-Way Hash Chains -- Privacy Preserving Keyword Searches on Remote Encrypted Data -- An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption -- Non-interactive Zero-Knowledge Arguments for Voting -- Short Signature and Universal Designated Verifier Signature Without Random Oracles -- Efficient Identity Based Ring Signature -- New Signature Schemes with Coupons and Tight Reduction. |
Record Nr. | UNISA-996466127903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
CCS'10 : proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, Illinois, USA |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2010 |
Descrizione fisica | 1 online resource (764 pages) |
Collana | ACM Conferences |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Proceedings of the 17th ACM Conference on Computer and Communications Security
CCS '10 17th ACM Conference on Computer and Communications Security 2010, Chicago, IL, USA - October 04 - 08, 2010 |
Record Nr. | UNINA-9910376013003321 |
[Place of publication not identified], : ACM, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Financial Cryptography and Data Security [[electronic resource] ] : 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers / / edited by Angelos D. Keromytis |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XI, 416 p. 78 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Computers and civilization Application software Cryptology Systems and Data Security Management of Computing and Information Systems Computers and Society Computer Appl. in Administrative Data Processing |
Soggetto genere / forma | Conference papers and proceedings. |
ISBN | 3-642-32946-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466055903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Proceedings : New Security Paradigms Workshop 2007 : September 18-21, 2007, White Mountain Hotel and Resort, New Hampshire, USA |
Autore | Beznosov Konstantin (Kosta) |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2007 |
Descrizione fisica | 1 online resource (109 pages) |
Collana | ACM Other conferences |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Proceedings of the 2007 Workshop on New Security Paradigms
NSPW '07 Proceedings of the 2007 New Security Paradigms Workshop, NH - September 18 - 21, 2007 |
Record Nr. | UNINA-9910375806003321 |
Beznosov Konstantin (Kosta) | ||
[Place of publication not identified], : ACM, 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Privacy in Communication Networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers / / edited by Angelos D. Keromytis, Roberto Di Pietro |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 369 p. 111 illus.) |
Disciplina | 621.382/1 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer security
Management information systems Computer science Computers and civilization Computer communication systems Data encryption (Computer science) Application software Systems and Data Security Management of Computing and Information Systems Computers and Society Computer Communication Networks Cryptology Information Systems Applications (incl. Internet) |
Soggetto genere / forma | Conference proceedings. |
ISBN | 3-642-36883-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Crypto and electronic money -- Wireless security -- Web security -- Intrusion detection and monitoring -- Anonymity and privacy. |
Record Nr. | UNINA-9910739401503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
WORM '05 : proceedings of the 2005 ACM Workshop on Rapid Malcode : November 11, 2005, Fairfax, Virginia, USA, co-located with CCS 2005 |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2005 |
Descrizione fisica | 1 online resource (88 pages) |
Collana | ACM Conferences |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Workshop on Rapid Malcode '05 : proceedings of the 2005 Association for Computing Machinery Workshop on Rapid Malcode : November 11, 2005, Fairfax, Virginia, United States of America, co-located with Computer and Communications Security 2005
Proceedings of the 2005 ACM Workshop on Rapid Malcode |
Record Nr. | UNINA-9910376477503321 |
[Place of publication not identified], : ACM, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|