top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cryptology and Network Security [[electronic resource] ] : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings / / edited by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis
Cryptology and Network Security [[electronic resource] ] : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings / / edited by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVI, 401 p. 52 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Coding theory
Information theory
Management information systems
Computer science
Cryptology
Systems and Data Security
Computer Communication Networks
Coding and Information Theory
Management of Computing and Information Systems
ISBN 3-319-12280-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Encryption -- Cryptanalysis -- Malware analysis -- Privacy and identification systems -- Types of network protocol design -- Analysis work.
Record Nr. UNISA-996213648203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings / / edited by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis
Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings / / edited by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVI, 401 p. 52 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer networks
Coding theory
Information theory
Management information systems
Computer science
Cryptology
Systems and Data Security
Computer Communication Networks
Coding and Information Theory
Management of Computing and Information Systems
ISBN 3-319-12280-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Encryption -- Cryptanalysis -- Malware analysis -- Privacy and identification systems -- Types of network protocol design -- Analysis work.
Record Nr. UNINA-9910483462803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
DRM '04 : proceedings of the fourth ACM Workshop on Digital Rights Management : Washington DC, USA, October 25, 2004 : co-located with CCS 2004
DRM '04 : proceedings of the fourth ACM Workshop on Digital Rights Management : Washington DC, USA, October 25, 2004 : co-located with CCS 2004
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2004
Descrizione fisica 1 online resource (112 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Digital Rights Management '04 : proceedings of the fourth Association for Computing Machinery Workshop on Digital Rights Management : Washington District of Columbia, United States of America, October 25, 2004 : co-located with Computer and Communications Security 2004
Proceedings of the 4th ACM Workshop on Digital Rights Management
Record Nr. UNINA-9910375913603321
[Place of publication not identified], : ACM, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Voting and Identity [[electronic resource] ] : Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers / / edited by Aggelos Kiayias, Helger Lipmaa
E-Voting and Identity [[electronic resource] ] : Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers / / edited by Aggelos Kiayias, Helger Lipmaa
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (X, 257 p. 26 illus.)
Disciplina 324.6/502854678
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Special purpose computers
Application software
Computers and civilization
Cryptology
Systems and Data Security
Computer Communication Networks
Special Purpose and Application-Based Systems
Computer Appl. in Administrative Data Processing
Computers and Society
ISBN 3-642-32747-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Norwegian Internet Voting Protocol -- Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting -- Internet Voting System with Cast as Intended Verification.- Linear Logical Voting Protocols.- Efficient Vote Authorization in Coercion-Resistant Internet Voting.- The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Voting -- An Efficient and Highly Sound Voter Verification Technique and Its Implementation.- Single Layer Optical-Scan Voting with Fully Distributed Trust.- Paperless Independently-Verifiable Voting.- Feasibility Analysis of Pret a Voter for German Federal Elections.- Pret a Voter with Write-Ins.- Trivitas: Voters Directly Verifying Votes.- The Application of I-Voting for Estonian Parliamentary Elections of 2011.- Towards Best Practice for E-election Systems: Lessons from Trial and Error in Australian Elections.- On the Side-Effects of Introducing E-Voting. Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting -- Internet Voting System with Cast as Intended Verification.- Linear Logical Voting Protocols.- Efficient Vote Authorization in Coercion-Resistant Internet Voting.- The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Voting -- An Efficient and Highly Sound Voter Verification Technique and Its Implementation.- Single Layer Optical-Scan Voting with Fully Distributed Trust.- Paperless Independently-Verifiable Voting.- Feasibility Analysis of Pret a Voter for German Federal Elections.- Pret a Voter with Write-Ins.- Trivitas: Voters Directly Verifying Votes.- The Application of I-Voting for Estonian Parliamentary Elections of 2011.- Towards Best Practice for E-election Systems: Lessons from Trial and Error in Australian Elections.- On the Side-Effects of Introducing E-Voting.
Record Nr. UNISA-996465499903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Financial Cryptography and Data Security [[electronic resource] ] : 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers / / edited by Aggelos Kiayias
Financial Cryptography and Data Security [[electronic resource] ] : 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers / / edited by Aggelos Kiayias
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIV, 650 p. 132 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computers
Law and legislation
Computers and civilization
Software engineering
Cryptology
Legal Aspects of Computing
Computers and Society
Software Engineering/Programming and Operating Systems
Information Systems and Communication Service
ISBN 3-319-70972-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy and Identity Management -- Privacy and Data Processing -- Cryptographic Primitives and API's.-Vulnerabilities and Exploits -- Blockchain Technology -- Security of Internet Protocols -- Blind signatures.-Searching and Processing Private Data -- Secure Channel Protocols -- Privacy in Data Storage and Retrieval.
Record Nr. UNISA-996465753003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Financial Cryptography and Data Security : 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers / / edited by Aggelos Kiayias
Financial Cryptography and Data Security : 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers / / edited by Aggelos Kiayias
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIV, 650 p. 132 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computers
Law and legislation
Computers and civilization
Software engineering
Cryptology
Legal Aspects of Computing
Computers and Society
Software Engineering/Programming and Operating Systems
Information Systems and Communication Service
ISBN 3-319-70972-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy and Identity Management -- Privacy and Data Processing -- Cryptographic Primitives and API's.-Vulnerabilities and Exploits -- Blockchain Technology -- Security of Internet Protocols -- Blind signatures.-Searching and Processing Private Data -- Secure Channel Protocols -- Privacy in Data Storage and Retrieval.
Record Nr. UNINA-9910484680903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Financial Cryptography and Data Security [[electronic resource] ] : FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé
Financial Cryptography and Data Security [[electronic resource] ] : FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XII, 256 p.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Computer engineering
E-commerce
Management information systems
Computer science
Computers and civilization
Computer Communication Networks
Cryptology
Computer Engineering
e-Commerce/e-business
Management of Computing and Information Systems
Computers and Society
Soggetto genere / forma Conference proceedings.
Kongress
ISBN 3-642-14992-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto WLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: “Be Reasonable”.
Record Nr. UNISA-996466280603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public Key Cryptography - PKC 2006 [[electronic resource] ] : 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings / / edited by Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin
Public Key Cryptography - PKC 2006 [[electronic resource] ] : 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings / / edited by Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 543 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Algorithms
Computer networks
Computers and civilization
Electronic data processing—Management
Cryptology
Computer Communication Networks
Computers and Society
IT Operations
ISBN 3-540-33852-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis and Protocol Weaknesses -- New Attacks on RSA with Small Secret CRT-Exponents -- An Attack on a Modified Niederreiter Encryption Scheme -- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm -- Distributed Crypto-computing -- Efficient Polynomial Operations in the Shared-Coefficients Setting -- Generic On-Line/Off-Line Threshold Signatures -- Linear Integer Secret Sharing and Distributed Exponentiation -- Encryption Methods -- Encoding-Free ElGamal Encryption Without Random Oracles -- Parallel Key-Insulated Public Key Encryption -- Provably Secure Steganography with Imperfect Sampling -- Cryptographic Hash and Applications -- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited -- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption -- Number Theory Algorithms -- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve -- Efficient Scalar Multiplication by Isogeny Decompositions -- Curve25519: New Diffie-Hellman Speed Records -- Pairing-Based Cryptography -- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman -- Generalization of the Selective-ID Security Model for HIBE Protocols -- Identity-Based Aggregate Signatures -- On the Limitations of the Spread of an IBE-to-PKE Transformation -- Cryptosystems Design and Analysis -- Inoculating Multivariate Schemes Against Differential Attacks -- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol -- High-Order Attacks Against the Exponent Splitting Protection -- Signature and Identification -- New Online/Offline Signature Schemes Without Random Oracles -- Anonymous Signature Schemes -- The Power of Identification Schemes -- Authentication and Key Establishment -- Security Analysis of KEA Authenticated Key Exchange Protocol -- SAS-Based Authenticated Key Agreement -- The Twist-AUgmented Technique for Key Exchange -- Password-Based Group Key Exchange in a Constant Number of Rounds -- Multi-party Computation -- Conditional Oblivious Cast -- Efficiency Tradeoffs for Malicious Two-Party Computation -- PKI Techniques -- On Constructing Certificateless Cryptosystems from Identity Based Encryption -- Building Better Signcryption Schemes with Tag-KEMs -- Security-Mediated Certificateless Cryptography -- k-Times Anonymous Authentication with a Constant Proving Cost.
Record Nr. UNISA-996465932503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-Key Cryptography – PKC 2020 [[electronic resource] ] : 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I / / edited by Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas
Public-Key Cryptography – PKC 2020 [[electronic resource] ] : 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I / / edited by Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (692 pages)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer networks - Security measures
Computer communication systems
Coding theory
Information theory
Computers
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Coding and Information Theory
Computing Milieux
ISBN 3-030-45374-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Functional encryption -- Identity-based encryption -- Obfuscation and applications -- Encryption schemes -- Secure channels -- Basic primitives with special properties -- Proofs and arguments -- Lattice-based cryptography -- Isogeny-based cryptography -- Multiparty protocols -- Secure computation and related primitives -- Post-quantum primitives -- Privacy-preserving schemes.
Record Nr. UNISA-996418213903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-Key Cryptography – PKC 2020 [[electronic resource] ] : 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II / / edited by Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas
Public-Key Cryptography – PKC 2020 [[electronic resource] ] : 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II / / edited by Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (666 pages) : illustrations
Disciplina 005.824
Collana Security and Cryptology
Soggetto topico Computer organization
Computer security
Computer networks - Security measures
Computers
Computer communication systems
Computer Systems Organization and Communication Networks
Security Services
Mobile and Network Security
Computing Milieux
Computer Communication Networks
ISBN 3-030-45388-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Functional encryption -- Identity-based encryption -- Obfuscation and applications -- Encryption schemes -- Secure channels -- Basic primitives with special properties -- Proofs and arguments -- Lattice-based cryptography -- Isogeny-based cryptography -- Multiparty protocols -- Secure computation and related primitives -- Post-quantum primitives -- Privacy-preserving schemes.
Record Nr. UNISA-996418213003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui