top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in information and computer security : Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, proceedings / / Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg (editors)
Advances in information and computer security : Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, proceedings / / Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 462 p.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
ISBN 3-540-75651-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software and Multimedia Security -- A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption -- Design Issues of an Isolated Sandbox Used to Analyze Malwares -- Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique -- Public-Key Cryptography (1) -- Reduction Optimal Trinomials for Efficient Software Implementation of the ? T Pairing -- Experiments on the Linear Algebra Step in the Number Field Sieve -- Batch Pairing Delegation -- Botnet Traffic Detection Techniques by C&C Session Classification Using SVM -- A Global Authentication Scheme for Mobile Ad-Hoc Networks -- An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks -- Intrusion Detection and Identification System Using Data Mining and Forensic Techniques -- Run-Time Randomization to Mitigate Tampering -- Privacy-Preserving Eigentaste-Based Collaborative Filtering -- Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks -- Verifiable Internet Voting Solving Secure Platform Problem -- Enforcement of Integrated Security Policy in Trusted Operating Systems -- Salvia: A Privacy-Aware Operating System for Prevention of Data Leakage -- InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs -- Public-Key Cryptography (2) -- Accredited Symmetrically Private Information Retrieval -- Generic Certificateless Encryption in the Standard Model -- On Security Models and Compilers for Group Key Exchange Protocols -- Processing Multi-parameter Attacktrees with Estimated Parameter Values -- Practical Security Analysis of E-Voting Systems -- Fine-Grained Sticky Provenance Architecture for Office Documents -- Secure Anonymous Communications with Practical Anonymity Revocation Scheme -- GAS: Overloading a File Sharing Network as an Anonymizing System -- A Composite Privacy Protection Model -- Nominative Signature from Ring Signature -- Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications -- How to Find Many Collisions of 3-Pass HAVAL -- A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.
Record Nr. UNINA-9910484098703321
Berlin ; ; Heidelberg : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in information and computer security : Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, proceedings / / Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg (editors)
Advances in information and computer security : Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, proceedings / / Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 462 p.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
ISBN 3-540-75651-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software and Multimedia Security -- A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption -- Design Issues of an Isolated Sandbox Used to Analyze Malwares -- Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique -- Public-Key Cryptography (1) -- Reduction Optimal Trinomials for Efficient Software Implementation of the ? T Pairing -- Experiments on the Linear Algebra Step in the Number Field Sieve -- Batch Pairing Delegation -- Botnet Traffic Detection Techniques by C&C Session Classification Using SVM -- A Global Authentication Scheme for Mobile Ad-Hoc Networks -- An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks -- Intrusion Detection and Identification System Using Data Mining and Forensic Techniques -- Run-Time Randomization to Mitigate Tampering -- Privacy-Preserving Eigentaste-Based Collaborative Filtering -- Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks -- Verifiable Internet Voting Solving Secure Platform Problem -- Enforcement of Integrated Security Policy in Trusted Operating Systems -- Salvia: A Privacy-Aware Operating System for Prevention of Data Leakage -- InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs -- Public-Key Cryptography (2) -- Accredited Symmetrically Private Information Retrieval -- Generic Certificateless Encryption in the Standard Model -- On Security Models and Compilers for Group Key Exchange Protocols -- Processing Multi-parameter Attacktrees with Estimated Parameter Values -- Practical Security Analysis of E-Voting Systems -- Fine-Grained Sticky Provenance Architecture for Office Documents -- Secure Anonymous Communications with Practical Anonymity Revocation Scheme -- GAS: Overloading a File Sharing Network as an Anonymizing System -- A Composite Privacy Protection Model -- Nominative Signature from Ring Signature -- Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications -- How to Find Many Collisions of 3-Pass HAVAL -- A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.
Record Nr. UNISA-996465741603316
Berlin ; ; Heidelberg : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings / / edited by Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
Applied Cryptography and Network Security [[electronic resource] ] : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings / / edited by Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 710 p. 167 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Data protection
Computer communication systems
Software engineering
Application software
Systems and Data Security
Cryptology
Security
Computer Communication Networks
Software Engineering
Information Systems Applications (incl. Internet)
ISBN 3-319-61204-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography -- Simple Security Definitions for and Constructions of 0-RTT Key Exchange -- TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF -- Secure and Efficient Pairing at 256-bit Security Level -- Data Protection and Mobile Security No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices -- Are You Lying: Validating the Time-Location of Outdoor Images -- Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks -- A Pilot Study of Multiple Password Interference between Text and Map-based Passwords -- Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security -- A Novel GPU-Based Implementation of the Cube Attack – Preliminary Results Against Trivium -- Related-Key Impossible-Differential Attack on Reduced-Round SKINNY -- Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables -- An experimental study of the BDD approach for the search LWE problem -- Efficiently Obfuscating Re-Encryption Program under DDH Assumption -- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease -- A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers -- Side-Channel Attacks meet Secure Network Protocols -- Lattice-based DAPS and Generalizations: Self-Enforcement in Signature Schemes -- Forward-Secure Searchable Encryption on Labeled Bipartite Graphs -- Bounds in Various Generalized Settings of the Discrete Logarithm Problem -- An Enhanced Binary Characteristic Set Algorithm And Its Applications to Algebraic Cryptanalysis -- Accountable Storage -- Maliciously Secure Multi-Client ORAM -- Legacy-Compliant Data Authentication for Industrial Control System Traffic -- Multi-Client Oblivious RAM Secure Against Malicious Servers -- Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols -- Adaptive Proofs have Straightline Extractors (in the Random Oracle Model) -- How to Achieve Bounded Key Dependent Message Security -- Signature Schemes with Randomized Verification -- SCRAPE: Scalable Randomness Attested by Public Entities -- cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operation -- Almost Optimal Oblivious Transfer from QA-NIZK -- OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
Record Nr. UNINA-9910483812503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings / / edited by Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
Applied Cryptography and Network Security [[electronic resource] ] : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings / / edited by Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 710 p. 167 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Data protection
Computer communication systems
Software engineering
Application software
Systems and Data Security
Cryptology
Security
Computer Communication Networks
Software Engineering
Information Systems Applications (incl. Internet)
ISBN 3-319-61204-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography -- Simple Security Definitions for and Constructions of 0-RTT Key Exchange -- TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF -- Secure and Efficient Pairing at 256-bit Security Level -- Data Protection and Mobile Security No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices -- Are You Lying: Validating the Time-Location of Outdoor Images -- Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks -- A Pilot Study of Multiple Password Interference between Text and Map-based Passwords -- Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security -- A Novel GPU-Based Implementation of the Cube Attack – Preliminary Results Against Trivium -- Related-Key Impossible-Differential Attack on Reduced-Round SKINNY -- Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables -- An experimental study of the BDD approach for the search LWE problem -- Efficiently Obfuscating Re-Encryption Program under DDH Assumption -- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease -- A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers -- Side-Channel Attacks meet Secure Network Protocols -- Lattice-based DAPS and Generalizations: Self-Enforcement in Signature Schemes -- Forward-Secure Searchable Encryption on Labeled Bipartite Graphs -- Bounds in Various Generalized Settings of the Discrete Logarithm Problem -- An Enhanced Binary Characteristic Set Algorithm And Its Applications to Algebraic Cryptanalysis -- Accountable Storage -- Maliciously Secure Multi-Client ORAM -- Legacy-Compliant Data Authentication for Industrial Control System Traffic -- Multi-Client Oblivious RAM Secure Against Malicious Servers -- Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols -- Adaptive Proofs have Straightline Extractors (in the Random Oracle Model) -- How to Achieve Bounded Key Dependent Message Security -- Signature Schemes with Randomized Verification -- SCRAPE: Scalable Randomness Attested by Public Entities -- cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operation -- Almost Optimal Oblivious Transfer from QA-NIZK -- OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
Record Nr. UNISA-996466465803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Electromagnetic Nondestructive Evaluation (X) [[electronic resource] /] / edited by Seiki Takahashi and Hiroaki Kikuchi
Electromagnetic Nondestructive Evaluation (X) [[electronic resource] /] / edited by Seiki Takahashi and Hiroaki Kikuchi
Pubbl/distr/stampa Amsterdam ; ; Washington, DC, : IOS Press, c2007
Descrizione fisica 1 online resource (300 p.)
Disciplina 620.1/1278
Altri autori (Persone) TakahashiSeiki
KikuchiHiroaki
Collana Studies in applied electromagnetics and mechanics
Soggetto topico Nondestructive testing
Magnetic testing
Eddy currents (Electric)
Soggetto genere / forma Electronic books.
ISBN 6611029761
1-281-02976-9
9786611029760
1-60750-251-8
600-00-0415-X
1-4356-0859-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Preface; List of Referees; Organization; List of Participants; Contents; Invited Talks; ECT Modeling and Simulation; Eddy Current Testing and Technique; Industrial Applications and New Methods; NDE by Magnetism and Magnetics; Inverse Problem and Benchmark; Author Index
Record Nr. UNINA-9910451865503321
Amsterdam ; ; Washington, DC, : IOS Press, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electromagnetic Nondestructive Evaluation (X) [[electronic resource] /] / edited by Seiki Takahashi and Hiroaki Kikuchi
Electromagnetic Nondestructive Evaluation (X) [[electronic resource] /] / edited by Seiki Takahashi and Hiroaki Kikuchi
Pubbl/distr/stampa Amsterdam ; ; Washington, DC, : IOS Press, c2007
Descrizione fisica 1 online resource (300 p.)
Disciplina 620.1/1278
Altri autori (Persone) TakahashiSeiki
KikuchiHiroaki
Collana Studies in applied electromagnetics and mechanics
Soggetto topico Nondestructive testing
Magnetic testing
Eddy currents (Electric)
ISBN 6611029761
1-281-02976-9
9786611029760
1-60750-251-8
600-00-0415-X
1-4356-0859-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Preface; List of Referees; Organization; List of Participants; Contents; Invited Talks; ECT Modeling and Simulation; Eddy Current Testing and Technique; Industrial Applications and New Methods; NDE by Magnetism and Magnetics; Inverse Problem and Benchmark; Author Index
Record Nr. UNINA-9910778106003321
Amsterdam ; ; Washington, DC, : IOS Press, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electromagnetic Nondestructive Evaluation (X) [[electronic resource] /] / edited by Seiki Takahashi and Hiroaki Kikuchi
Electromagnetic Nondestructive Evaluation (X) [[electronic resource] /] / edited by Seiki Takahashi and Hiroaki Kikuchi
Pubbl/distr/stampa Amsterdam ; ; Washington, DC, : IOS Press, c2007
Descrizione fisica 1 online resource (300 p.)
Disciplina 620.1/1278
Altri autori (Persone) TakahashiSeiki
KikuchiHiroaki
Collana Studies in applied electromagnetics and mechanics
Soggetto topico Nondestructive testing
Magnetic testing
Eddy currents (Electric)
ISBN 6611029761
1-281-02976-9
9786611029760
1-60750-251-8
600-00-0415-X
1-4356-0859-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Preface; List of Referees; Organization; List of Participants; Contents; Invited Talks; ECT Modeling and Simulation; Eddy Current Testing and Technique; Industrial Applications and New Methods; NDE by Magnetism and Magnetics; Inverse Problem and Benchmark; Author Index
Record Nr. UNINA-9910818587103321
Amsterdam ; ; Washington, DC, : IOS Press, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electromagnetic nondestructive evaluation (XIX) / / edited by Noritaka Yusa, Tetsuya Uchimoto, Hiroaki Kikuchi
Electromagnetic nondestructive evaluation (XIX) / / edited by Noritaka Yusa, Tetsuya Uchimoto, Hiroaki Kikuchi
Pubbl/distr/stampa Amsterdam, [Netherlands] ; ; Berlin, [Germany] ; ; Washington, District of Columbia : , : IOS Press, , 2016
Descrizione fisica 1 online resource (344 pages) : illustrations
Disciplina 620.11278
Collana Studies in Applied Electromagnetics and Mechanics
Soggetto topico Magnetic testing
Electromagnetic measurements
Nondestructive testing
Soggetto genere / forma Electronic books.
ISBN 1-61499-639-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910466209703321
Amsterdam, [Netherlands] ; ; Berlin, [Germany] ; ; Washington, District of Columbia : , : IOS Press, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electromagnetic nondestructive evaluation (XIX) / / edited by Noritaka Yusa, Tetsuya Uchimoto, Hiroaki Kikuchi
Electromagnetic nondestructive evaluation (XIX) / / edited by Noritaka Yusa, Tetsuya Uchimoto, Hiroaki Kikuchi
Pubbl/distr/stampa Amsterdam, [Netherlands] ; ; Berlin, [Germany] ; ; Washington, District of Columbia : , : IOS Press, , 2016
Descrizione fisica 1 online resource (344 pages) : illustrations
Disciplina 620.11278
Collana Studies in Applied Electromagnetics and Mechanics
Soggetto topico Magnetic testing
Electromagnetic measurements
Nondestructive testing
ISBN 1-61499-639-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910798541603321
Amsterdam, [Netherlands] ; ; Berlin, [Germany] ; ; Washington, District of Columbia : , : IOS Press, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electromagnetic nondestructive evaluation (XIX) / / edited by Noritaka Yusa, Tetsuya Uchimoto, Hiroaki Kikuchi
Electromagnetic nondestructive evaluation (XIX) / / edited by Noritaka Yusa, Tetsuya Uchimoto, Hiroaki Kikuchi
Pubbl/distr/stampa Amsterdam, [Netherlands] ; ; Berlin, [Germany] ; ; Washington, District of Columbia : , : IOS Press, , 2016
Descrizione fisica 1 online resource (344 pages) : illustrations
Disciplina 620.11278
Collana Studies in Applied Electromagnetics and Mechanics
Soggetto topico Magnetic testing
Electromagnetic measurements
Nondestructive testing
ISBN 1-61499-639-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910825157903321
Amsterdam, [Netherlands] ; ; Berlin, [Germany] ; ; Washington, District of Columbia : , : IOS Press, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui