Advances in information and computer security : Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, proceedings / / Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer, , [2007] |
Descrizione fisica | 1 online resource (XIV, 462 p.) |
Disciplina | 005.8 |
Collana | Lecture notes in computer science |
Soggetto topico | Computer security |
ISBN | 3-540-75651-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Software and Multimedia Security -- A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption -- Design Issues of an Isolated Sandbox Used to Analyze Malwares -- Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique -- Public-Key Cryptography (1) -- Reduction Optimal Trinomials for Efficient Software Implementation of the ? T Pairing -- Experiments on the Linear Algebra Step in the Number Field Sieve -- Batch Pairing Delegation -- Botnet Traffic Detection Techniques by C&C Session Classification Using SVM -- A Global Authentication Scheme for Mobile Ad-Hoc Networks -- An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks -- Intrusion Detection and Identification System Using Data Mining and Forensic Techniques -- Run-Time Randomization to Mitigate Tampering -- Privacy-Preserving Eigentaste-Based Collaborative Filtering -- Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks -- Verifiable Internet Voting Solving Secure Platform Problem -- Enforcement of Integrated Security Policy in Trusted Operating Systems -- Salvia: A Privacy-Aware Operating System for Prevention of Data Leakage -- InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs -- Public-Key Cryptography (2) -- Accredited Symmetrically Private Information Retrieval -- Generic Certificateless Encryption in the Standard Model -- On Security Models and Compilers for Group Key Exchange Protocols -- Processing Multi-parameter Attacktrees with Estimated Parameter Values -- Practical Security Analysis of E-Voting Systems -- Fine-Grained Sticky Provenance Architecture for Office Documents -- Secure Anonymous Communications with Practical Anonymity Revocation Scheme -- GAS: Overloading a File Sharing Network as an Anonymizing System -- A Composite Privacy Protection Model -- Nominative Signature from Ring Signature -- Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications -- How to Find Many Collisions of 3-Pass HAVAL -- A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. |
Record Nr. | UNINA-9910484098703321 |
Berlin ; ; Heidelberg : , : Springer, , [2007] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in information and computer security : Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, proceedings / / Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer, , [2007] |
Descrizione fisica | 1 online resource (XIV, 462 p.) |
Disciplina | 005.8 |
Collana | Lecture notes in computer science |
Soggetto topico | Computer security |
ISBN | 3-540-75651-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Software and Multimedia Security -- A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption -- Design Issues of an Isolated Sandbox Used to Analyze Malwares -- Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique -- Public-Key Cryptography (1) -- Reduction Optimal Trinomials for Efficient Software Implementation of the ? T Pairing -- Experiments on the Linear Algebra Step in the Number Field Sieve -- Batch Pairing Delegation -- Botnet Traffic Detection Techniques by C&C Session Classification Using SVM -- A Global Authentication Scheme for Mobile Ad-Hoc Networks -- An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks -- Intrusion Detection and Identification System Using Data Mining and Forensic Techniques -- Run-Time Randomization to Mitigate Tampering -- Privacy-Preserving Eigentaste-Based Collaborative Filtering -- Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks -- Verifiable Internet Voting Solving Secure Platform Problem -- Enforcement of Integrated Security Policy in Trusted Operating Systems -- Salvia: A Privacy-Aware Operating System for Prevention of Data Leakage -- InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs -- Public-Key Cryptography (2) -- Accredited Symmetrically Private Information Retrieval -- Generic Certificateless Encryption in the Standard Model -- On Security Models and Compilers for Group Key Exchange Protocols -- Processing Multi-parameter Attacktrees with Estimated Parameter Values -- Practical Security Analysis of E-Voting Systems -- Fine-Grained Sticky Provenance Architecture for Office Documents -- Secure Anonymous Communications with Practical Anonymity Revocation Scheme -- GAS: Overloading a File Sharing Network as an Anonymizing System -- A Composite Privacy Protection Model -- Nominative Signature from Ring Signature -- Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications -- How to Find Many Collisions of 3-Pass HAVAL -- A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. |
Record Nr. | UNISA-996465741603316 |
Berlin ; ; Heidelberg : , : Springer, , [2007] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Cryptography and Network Security [[electronic resource] ] : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings / / edited by Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVI, 710 p. 167 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Data protection Computer communication systems Software engineering Application software Systems and Data Security Cryptology Security Computer Communication Networks Software Engineering Information Systems Applications (incl. Internet) |
ISBN | 3-319-61204-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography -- Simple Security Definitions for and Constructions of 0-RTT Key Exchange -- TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF -- Secure and Efficient Pairing at 256-bit Security Level -- Data Protection and Mobile Security No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices -- Are You Lying: Validating the Time-Location of Outdoor Images -- Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks -- A Pilot Study of Multiple Password Interference between Text and Map-based Passwords -- Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security -- A Novel GPU-Based Implementation of the Cube Attack – Preliminary Results Against Trivium -- Related-Key Impossible-Differential Attack on Reduced-Round SKINNY -- Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables -- An experimental study of the BDD approach for the search LWE problem -- Efficiently Obfuscating Re-Encryption Program under DDH Assumption -- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease -- A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers -- Side-Channel Attacks meet Secure Network Protocols -- Lattice-based DAPS and Generalizations: Self-Enforcement in Signature Schemes -- Forward-Secure Searchable Encryption on Labeled Bipartite Graphs -- Bounds in Various Generalized Settings of the Discrete Logarithm Problem -- An Enhanced Binary Characteristic Set Algorithm And Its Applications to Algebraic Cryptanalysis -- Accountable Storage -- Maliciously Secure Multi-Client ORAM -- Legacy-Compliant Data Authentication for Industrial Control System Traffic -- Multi-Client Oblivious RAM Secure Against Malicious Servers -- Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols -- Adaptive Proofs have Straightline Extractors (in the Random Oracle Model) -- How to Achieve Bounded Key Dependent Message Security -- Signature Schemes with Randomized Verification -- SCRAPE: Scalable Randomness Attested by Public Entities -- cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operation -- Almost Optimal Oblivious Transfer from QA-NIZK -- OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. |
Record Nr. | UNINA-9910483812503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied Cryptography and Network Security [[electronic resource] ] : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings / / edited by Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVI, 710 p. 167 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Data protection Computer communication systems Software engineering Application software Systems and Data Security Cryptology Security Computer Communication Networks Software Engineering Information Systems Applications (incl. Internet) |
ISBN | 3-319-61204-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography -- Simple Security Definitions for and Constructions of 0-RTT Key Exchange -- TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF -- Secure and Efficient Pairing at 256-bit Security Level -- Data Protection and Mobile Security No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices -- Are You Lying: Validating the Time-Location of Outdoor Images -- Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks -- A Pilot Study of Multiple Password Interference between Text and Map-based Passwords -- Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security -- A Novel GPU-Based Implementation of the Cube Attack – Preliminary Results Against Trivium -- Related-Key Impossible-Differential Attack on Reduced-Round SKINNY -- Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables -- An experimental study of the BDD approach for the search LWE problem -- Efficiently Obfuscating Re-Encryption Program under DDH Assumption -- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease -- A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers -- Side-Channel Attacks meet Secure Network Protocols -- Lattice-based DAPS and Generalizations: Self-Enforcement in Signature Schemes -- Forward-Secure Searchable Encryption on Labeled Bipartite Graphs -- Bounds in Various Generalized Settings of the Discrete Logarithm Problem -- An Enhanced Binary Characteristic Set Algorithm And Its Applications to Algebraic Cryptanalysis -- Accountable Storage -- Maliciously Secure Multi-Client ORAM -- Legacy-Compliant Data Authentication for Industrial Control System Traffic -- Multi-Client Oblivious RAM Secure Against Malicious Servers -- Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols -- Adaptive Proofs have Straightline Extractors (in the Random Oracle Model) -- How to Achieve Bounded Key Dependent Message Security -- Signature Schemes with Randomized Verification -- SCRAPE: Scalable Randomness Attested by Public Entities -- cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operation -- Almost Optimal Oblivious Transfer from QA-NIZK -- OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. |
Record Nr. | UNISA-996466465803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Electromagnetic Nondestructive Evaluation (X) [[electronic resource] /] / edited by Seiki Takahashi and Hiroaki Kikuchi |
Pubbl/distr/stampa | Amsterdam ; ; Washington, DC, : IOS Press, c2007 |
Descrizione fisica | 1 online resource (300 p.) |
Disciplina | 620.1/1278 |
Altri autori (Persone) |
TakahashiSeiki
KikuchiHiroaki |
Collana | Studies in applied electromagnetics and mechanics |
Soggetto topico |
Nondestructive testing
Magnetic testing Eddy currents (Electric) |
Soggetto genere / forma | Electronic books. |
ISBN |
6611029761
1-281-02976-9 9786611029760 1-60750-251-8 600-00-0415-X 1-4356-0859-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Preface; List of Referees; Organization; List of Participants; Contents; Invited Talks; ECT Modeling and Simulation; Eddy Current Testing and Technique; Industrial Applications and New Methods; NDE by Magnetism and Magnetics; Inverse Problem and Benchmark; Author Index |
Record Nr. | UNINA-9910451865503321 |
Amsterdam ; ; Washington, DC, : IOS Press, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Electromagnetic Nondestructive Evaluation (X) [[electronic resource] /] / edited by Seiki Takahashi and Hiroaki Kikuchi |
Pubbl/distr/stampa | Amsterdam ; ; Washington, DC, : IOS Press, c2007 |
Descrizione fisica | 1 online resource (300 p.) |
Disciplina | 620.1/1278 |
Altri autori (Persone) |
TakahashiSeiki
KikuchiHiroaki |
Collana | Studies in applied electromagnetics and mechanics |
Soggetto topico |
Nondestructive testing
Magnetic testing Eddy currents (Electric) |
ISBN |
6611029761
1-281-02976-9 9786611029760 1-60750-251-8 600-00-0415-X 1-4356-0859-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Preface; List of Referees; Organization; List of Participants; Contents; Invited Talks; ECT Modeling and Simulation; Eddy Current Testing and Technique; Industrial Applications and New Methods; NDE by Magnetism and Magnetics; Inverse Problem and Benchmark; Author Index |
Record Nr. | UNINA-9910778106003321 |
Amsterdam ; ; Washington, DC, : IOS Press, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Electromagnetic Nondestructive Evaluation (X) [[electronic resource] /] / edited by Seiki Takahashi and Hiroaki Kikuchi |
Pubbl/distr/stampa | Amsterdam ; ; Washington, DC, : IOS Press, c2007 |
Descrizione fisica | 1 online resource (300 p.) |
Disciplina | 620.1/1278 |
Altri autori (Persone) |
TakahashiSeiki
KikuchiHiroaki |
Collana | Studies in applied electromagnetics and mechanics |
Soggetto topico |
Nondestructive testing
Magnetic testing Eddy currents (Electric) |
ISBN |
6611029761
1-281-02976-9 9786611029760 1-60750-251-8 600-00-0415-X 1-4356-0859-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Preface; List of Referees; Organization; List of Participants; Contents; Invited Talks; ECT Modeling and Simulation; Eddy Current Testing and Technique; Industrial Applications and New Methods; NDE by Magnetism and Magnetics; Inverse Problem and Benchmark; Author Index |
Record Nr. | UNINA-9910818587103321 |
Amsterdam ; ; Washington, DC, : IOS Press, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Electromagnetic nondestructive evaluation (XIX) / / edited by Noritaka Yusa, Tetsuya Uchimoto, Hiroaki Kikuchi |
Pubbl/distr/stampa | Amsterdam, [Netherlands] ; ; Berlin, [Germany] ; ; Washington, District of Columbia : , : IOS Press, , 2016 |
Descrizione fisica | 1 online resource (344 pages) : illustrations |
Disciplina | 620.11278 |
Collana | Studies in Applied Electromagnetics and Mechanics |
Soggetto topico |
Magnetic testing
Electromagnetic measurements Nondestructive testing |
Soggetto genere / forma | Electronic books. |
ISBN | 1-61499-639-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910466209703321 |
Amsterdam, [Netherlands] ; ; Berlin, [Germany] ; ; Washington, District of Columbia : , : IOS Press, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Electromagnetic nondestructive evaluation (XIX) / / edited by Noritaka Yusa, Tetsuya Uchimoto, Hiroaki Kikuchi |
Pubbl/distr/stampa | Amsterdam, [Netherlands] ; ; Berlin, [Germany] ; ; Washington, District of Columbia : , : IOS Press, , 2016 |
Descrizione fisica | 1 online resource (344 pages) : illustrations |
Disciplina | 620.11278 |
Collana | Studies in Applied Electromagnetics and Mechanics |
Soggetto topico |
Magnetic testing
Electromagnetic measurements Nondestructive testing |
ISBN | 1-61499-639-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910798541603321 |
Amsterdam, [Netherlands] ; ; Berlin, [Germany] ; ; Washington, District of Columbia : , : IOS Press, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Electromagnetic nondestructive evaluation (XIX) / / edited by Noritaka Yusa, Tetsuya Uchimoto, Hiroaki Kikuchi |
Pubbl/distr/stampa | Amsterdam, [Netherlands] ; ; Berlin, [Germany] ; ; Washington, District of Columbia : , : IOS Press, , 2016 |
Descrizione fisica | 1 online resource (344 pages) : illustrations |
Disciplina | 620.11278 |
Collana | Studies in Applied Electromagnetics and Mechanics |
Soggetto topico |
Magnetic testing
Electromagnetic measurements Nondestructive testing |
ISBN | 1-61499-639-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910825157903321 |
Amsterdam, [Netherlands] ; ; Berlin, [Germany] ; ; Washington, District of Columbia : , : IOS Press, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|