Cryptology and Network Security [[electronic resource] ] : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings / / edited by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVI, 401 p. 52 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Coding theory Information theory Management information systems Computer science Cryptology Systems and Data Security Computer Communication Networks Coding and Information Theory Management of Computing and Information Systems |
ISBN | 3-319-12280-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Encryption -- Cryptanalysis -- Malware analysis -- Privacy and identification systems -- Types of network protocol design -- Analysis work. |
Record Nr. | UNISA-996213648203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings / / edited by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVI, 401 p. 52 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer networks Coding theory Information theory Management information systems Computer science Cryptology Systems and Data Security Computer Communication Networks Coding and Information Theory Management of Computing and Information Systems |
ISBN | 3-319-12280-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Encryption -- Cryptanalysis -- Malware analysis -- Privacy and identification systems -- Types of network protocol design -- Analysis work. |
Record Nr. | UNINA-9910483462803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
DRM '04 : proceedings of the fourth ACM Workshop on Digital Rights Management : Washington DC, USA, October 25, 2004 : co-located with CCS 2004 |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2004 |
Descrizione fisica | 1 online resource (112 pages) |
Collana | ACM Conferences |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Digital Rights Management '04 : proceedings of the fourth Association for Computing Machinery Workshop on Digital Rights Management : Washington District of Columbia, United States of America, October 25, 2004 : co-located with Computer and Communications Security 2004
Proceedings of the 4th ACM Workshop on Digital Rights Management |
Record Nr. | UNINA-9910375913603321 |
[Place of publication not identified], : ACM, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
E-Voting and Identity [[electronic resource] ] : Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers / / edited by Aggelos Kiayias, Helger Lipmaa |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (X, 257 p. 26 illus.) |
Disciplina | 324.6/502854678 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Special purpose computers Application software Computers and civilization Cryptology Systems and Data Security Computer Communication Networks Special Purpose and Application-Based Systems Computer Appl. in Administrative Data Processing Computers and Society |
ISBN | 3-642-32747-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Norwegian Internet Voting Protocol -- Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting -- Internet Voting System with Cast as Intended Verification.- Linear Logical Voting Protocols.- Efficient Vote Authorization in Coercion-Resistant Internet Voting.- The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Voting -- An Efficient and Highly Sound Voter Verification Technique and Its Implementation.- Single Layer Optical-Scan Voting with Fully Distributed Trust.- Paperless Independently-Verifiable Voting.- Feasibility Analysis of Pret a Voter for German Federal Elections.- Pret a Voter with Write-Ins.- Trivitas: Voters Directly Verifying Votes.- The Application of I-Voting for Estonian Parliamentary Elections of 2011.- Towards Best Practice for E-election Systems: Lessons from Trial and Error in Australian Elections.- On the Side-Effects of Introducing E-Voting. Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting -- Internet Voting System with Cast as Intended Verification.- Linear Logical Voting Protocols.- Efficient Vote Authorization in Coercion-Resistant Internet Voting.- The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Voting -- An Efficient and Highly Sound Voter Verification Technique and Its Implementation.- Single Layer Optical-Scan Voting with Fully Distributed Trust.- Paperless Independently-Verifiable Voting.- Feasibility Analysis of Pret a Voter for German Federal Elections.- Pret a Voter with Write-Ins.- Trivitas: Voters Directly Verifying Votes.- The Application of I-Voting for Estonian Parliamentary Elections of 2011.- Towards Best Practice for E-election Systems: Lessons from Trial and Error in Australian Elections.- On the Side-Effects of Introducing E-Voting. |
Record Nr. | UNISA-996465499903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Financial Cryptography and Data Security [[electronic resource] ] : 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers / / edited by Aggelos Kiayias |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIV, 650 p. 132 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computers Law and legislation Computers and civilization Software engineering Cryptology Legal Aspects of Computing Computers and Society Software Engineering/Programming and Operating Systems Information Systems and Communication Service |
ISBN | 3-319-70972-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy and Identity Management -- Privacy and Data Processing -- Cryptographic Primitives and API's.-Vulnerabilities and Exploits -- Blockchain Technology -- Security of Internet Protocols -- Blind signatures.-Searching and Processing Private Data -- Secure Channel Protocols -- Privacy in Data Storage and Retrieval. |
Record Nr. | UNISA-996465753003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Financial Cryptography and Data Security : 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers / / edited by Aggelos Kiayias |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIV, 650 p. 132 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computers Law and legislation Computers and civilization Software engineering Cryptology Legal Aspects of Computing Computers and Society Software Engineering/Programming and Operating Systems Information Systems and Communication Service |
ISBN | 3-319-70972-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy and Identity Management -- Privacy and Data Processing -- Cryptographic Primitives and API's.-Vulnerabilities and Exploits -- Blockchain Technology -- Security of Internet Protocols -- Blind signatures.-Searching and Processing Private Data -- Secure Channel Protocols -- Privacy in Data Storage and Retrieval. |
Record Nr. | UNINA-9910484680903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Financial Cryptography and Data Security [[electronic resource] ] : FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 256 p.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Computer engineering E-commerce Management information systems Computer science Computers and civilization Computer Communication Networks Cryptology Computer Engineering e-Commerce/e-business Management of Computing and Information Systems Computers and Society |
Soggetto genere / forma |
Conference proceedings.
Kongress |
ISBN | 3-642-14992-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | WLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: “Be Reasonable”. |
Record Nr. | UNISA-996466280603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Public Key Cryptography - PKC 2006 [[electronic resource] ] : 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings / / edited by Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XIV, 543 p.) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Data encryption (Computer science) Algorithms Computer networks Computers and civilization Electronic data processing—Management Cryptology Computer Communication Networks Computers and Society IT Operations |
ISBN | 3-540-33852-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis and Protocol Weaknesses -- New Attacks on RSA with Small Secret CRT-Exponents -- An Attack on a Modified Niederreiter Encryption Scheme -- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm -- Distributed Crypto-computing -- Efficient Polynomial Operations in the Shared-Coefficients Setting -- Generic On-Line/Off-Line Threshold Signatures -- Linear Integer Secret Sharing and Distributed Exponentiation -- Encryption Methods -- Encoding-Free ElGamal Encryption Without Random Oracles -- Parallel Key-Insulated Public Key Encryption -- Provably Secure Steganography with Imperfect Sampling -- Cryptographic Hash and Applications -- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited -- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption -- Number Theory Algorithms -- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve -- Efficient Scalar Multiplication by Isogeny Decompositions -- Curve25519: New Diffie-Hellman Speed Records -- Pairing-Based Cryptography -- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman -- Generalization of the Selective-ID Security Model for HIBE Protocols -- Identity-Based Aggregate Signatures -- On the Limitations of the Spread of an IBE-to-PKE Transformation -- Cryptosystems Design and Analysis -- Inoculating Multivariate Schemes Against Differential Attacks -- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol -- High-Order Attacks Against the Exponent Splitting Protection -- Signature and Identification -- New Online/Offline Signature Schemes Without Random Oracles -- Anonymous Signature Schemes -- The Power of Identification Schemes -- Authentication and Key Establishment -- Security Analysis of KEA Authenticated Key Exchange Protocol -- SAS-Based Authenticated Key Agreement -- The Twist-AUgmented Technique for Key Exchange -- Password-Based Group Key Exchange in a Constant Number of Rounds -- Multi-party Computation -- Conditional Oblivious Cast -- Efficiency Tradeoffs for Malicious Two-Party Computation -- PKI Techniques -- On Constructing Certificateless Cryptosystems from Identity Based Encryption -- Building Better Signcryption Schemes with Tag-KEMs -- Security-Mediated Certificateless Cryptography -- k-Times Anonymous Authentication with a Constant Proving Cost. |
Record Nr. | UNISA-996465932503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Public-Key Cryptography – PKC 2020 [[electronic resource] ] : 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I / / edited by Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (692 pages) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer networks - Security measures Computer communication systems Coding theory Information theory Computers Cryptology Security Services Mobile and Network Security Computer Communication Networks Coding and Information Theory Computing Milieux |
ISBN | 3-030-45374-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Functional encryption -- Identity-based encryption -- Obfuscation and applications -- Encryption schemes -- Secure channels -- Basic primitives with special properties -- Proofs and arguments -- Lattice-based cryptography -- Isogeny-based cryptography -- Multiparty protocols -- Secure computation and related primitives -- Post-quantum primitives -- Privacy-preserving schemes. |
Record Nr. | UNISA-996418213903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Public-Key Cryptography – PKC 2020 [[electronic resource] ] : 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II / / edited by Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (666 pages) : illustrations |
Disciplina | 005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Computer organization
Computer security Computer networks - Security measures Computers Computer communication systems Computer Systems Organization and Communication Networks Security Services Mobile and Network Security Computing Milieux Computer Communication Networks |
ISBN | 3-030-45388-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Functional encryption -- Identity-based encryption -- Obfuscation and applications -- Encryption schemes -- Secure channels -- Basic primitives with special properties -- Proofs and arguments -- Lattice-based cryptography -- Isogeny-based cryptography -- Multiparty protocols -- Secure computation and related primitives -- Post-quantum primitives -- Privacy-preserving schemes. |
Record Nr. | UNISA-996418213003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|