top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied Cryptography and Network Security [[electronic resource] ] : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings / / edited by Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung
Applied Cryptography and Network Security [[electronic resource] ] : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings / / edited by Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XI, 508 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Data protection
Application software
Computers and civilization
Electronic data processing—Management
Computer Communication Networks
Cryptology
Data and Information Security
Computer and Information Systems Applications
Computers and Society
IT Operations
ISBN 3-540-68914-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On the Effectiveness of Internal Patching Against File-Sharing Worms -- Peeking Through the Cloud: DNS-Based Estimation and Its Applications -- Pushback for Overlay Networks: Protecting Against Malicious Insiders -- PPAA: Peer-to-Peer Anonymous Authentication -- Generic Constructions of Stateful Public Key Encryption and Their Applications -- Traceable and Retrievable Identity-Based Encryption -- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures -- Attacking Reduced Round SHA-256 -- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography -- Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA? -- Replay Attack in a Fair Exchange Protocol -- Improved Conditional E-Payments -- Anonymity in Transferable E-cash -- Generic Security-Amplifying Methods of Ordinary Digital Signatures -- New Differential-Algebraic Attacks and Reparametrization of Rainbow -- Trapdoor Sanitizable Signatures and Their Application to Content Protection -- Multi-factor Authenticated Key Exchange -- Repelling Detour Attack Against Onions with Re-encryption -- Analysis of EAP-GPSK Authentication Protocol -- Efficient Device Pairing Using “Human-Comparable” Synchronized Audiovisual Patterns -- PUF-HB: A Tamper-Resilient HB Based Authentication Protocol -- An Authentication Scheme Based on the Twisted Conjugacy Problem -- Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance -- A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation -- On the Security of the CCM Encryption Mode and of a Slight Variant -- wNAF *, an Efficient Left-to-Right Signed Digit Recoding Algorithm -- A Very Compact “Perfectly Masked” S-Box for AES -- Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks -- Traceable Privacy of Recent Provably-Secure RFID Protocols -- The Security of EPC Gen2 Compliant RFID Protocols.
Record Nr. UNISA-996465617203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings / / edited by John Ioannidis, Angelos D. Keromytis, Moti Yung
Applied Cryptography and Network Security [[electronic resource] ] : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings / / edited by John Ioannidis, Angelos D. Keromytis, Moti Yung
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 530 p.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Operating systems (Computers)
Information storage and retrieval systems
Application software
Electronic data processing—Management
Computer Communication Networks
Cryptology
Operating Systems
Information Storage and Retrieval
Computer and Information Systems Applications
IT Operations
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Two-Server Password-Only Authenticated Key Exchange -- Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks -- Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution -- A Traitor Tracing Scheme Based on RSA for Fast Decryption -- N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords -- Messin’ with Texas Deriving Mother’s Maiden Names Using Public Records -- Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management -- Searching for High-Value Rare Events with Uncheatable Grid Computing -- Digital Signatures Do Not Guarantee Exclusive Ownership -- Thompson’s Group and Public Key Cryptography -- Rainbow, a New Multivariable Polynomial Signature Scheme -- Badger – A Fast and Provably Secure MAC -- IDS False Alarm Reduction Using Continuous and Discontinuous Patterns -- Indexing Information for Data Forensics -- Model Generalization and Its Implications on Intrusion Detection -- Intrusion-Resilient Secure Channels -- Optimal Asymmetric Encryption and Signature Paddings -- Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA -- Identity Based Encryption Without Redundancy -- OACerts: Oblivious Attribute Certificates -- Dynamic k-Times Anonymous Authentication -- Efficient Anonymous Roaming and Its Security Analysis -- Quantifying Security in Hybrid Cellular Networks -- Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications -- Building Reliable Mix Networks with Fair Exchange -- SCARE of the DES -- Robust Key Extraction from Physical Uncloneable Functions -- Efficient Constructions for One-Way Hash Chains -- Privacy Preserving Keyword Searches on Remote Encrypted Data -- An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption -- Non-interactive Zero-Knowledge Arguments for Voting -- Short Signature and Universal Designated Verifier Signature Without Random Oracles -- Efficient Identity Based Ring Signature -- New Signature Schemes with Coupons and Tight Reduction.
Record Nr. UNISA-996466127903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
CCS'10 : proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, Illinois, USA
CCS'10 : proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, Illinois, USA
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2010
Descrizione fisica 1 online resource (764 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the 17th ACM Conference on Computer and Communications Security
CCS '10 17th ACM Conference on Computer and Communications Security 2010, Chicago, IL, USA - October 04 - 08, 2010
Record Nr. UNINA-9910376013003321
[Place of publication not identified], : ACM, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Financial Cryptography and Data Security [[electronic resource] ] : 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers / / edited by Angelos D. Keromytis
Financial Cryptography and Data Security [[electronic resource] ] : 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers / / edited by Angelos D. Keromytis
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XI, 416 p. 78 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Computers and civilization
Application software
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Computers and Society
Computer Appl. in Administrative Data Processing
Soggetto genere / forma Conference papers and proceedings.
ISBN 3-642-32946-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466055903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Proceedings : New Security Paradigms Workshop 2007 : September 18-21, 2007, White Mountain Hotel and Resort, New Hampshire, USA
Proceedings : New Security Paradigms Workshop 2007 : September 18-21, 2007, White Mountain Hotel and Resort, New Hampshire, USA
Autore Beznosov Konstantin (Kosta)
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2007
Descrizione fisica 1 online resource (109 pages)
Collana ACM Other conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the 2007 Workshop on New Security Paradigms
NSPW '07
Proceedings of the 2007 New Security Paradigms Workshop, NH - September 18 - 21, 2007
Record Nr. UNINA-9910375806003321
Beznosov Konstantin (Kosta)  
[Place of publication not identified], : ACM, 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy in Communication Networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers / / edited by Angelos D. Keromytis, Roberto Di Pietro
Security and Privacy in Communication Networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers / / edited by Angelos D. Keromytis, Roberto Di Pietro
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 369 p. 111 illus.)
Disciplina 621.382/1
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer security
Management information systems
Computer science
Computers and civilization
Computer communication systems
Data encryption (Computer science)
Application software
Systems and Data Security
Management of Computing and Information Systems
Computers and Society
Computer Communication Networks
Cryptology
Information Systems Applications (incl. Internet)
Soggetto genere / forma Conference proceedings.
ISBN 3-642-36883-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Crypto and electronic money -- Wireless security -- Web security -- Intrusion detection and monitoring -- Anonymity and privacy.
Record Nr. UNINA-9910739401503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
WORM '05 : proceedings of the 2005 ACM Workshop on Rapid Malcode : November 11, 2005, Fairfax, Virginia, USA, co-located with CCS 2005
WORM '05 : proceedings of the 2005 ACM Workshop on Rapid Malcode : November 11, 2005, Fairfax, Virginia, USA, co-located with CCS 2005
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2005
Descrizione fisica 1 online resource (88 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Workshop on Rapid Malcode '05 : proceedings of the 2005 Association for Computing Machinery Workshop on Rapid Malcode : November 11, 2005, Fairfax, Virginia, United States of America, co-located with Computer and Communications Security 2005
Proceedings of the 2005 ACM Workshop on Rapid Malcode
Record Nr. UNINA-9910376477503321
[Place of publication not identified], : ACM, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui