top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Identity and Privacy in the Internet Age [[electronic resource] ] : 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings / / edited by Audun Jøsang, Torleiv Maseng, Svein J. Knapskog
Identity and Privacy in the Internet Age [[electronic resource] ] : 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings / / edited by Audun Jøsang, Torleiv Maseng, Svein J. Knapskog
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 303 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Application software
Information storage and retrieval
Coding theory
Information theory
Computer security
Data structures (Computer science)
Data encryption (Computer science)
Computer Applications
Information Storage and Retrieval
Coding and Information Theory
Systems and Data Security
Data Structures and Information Theory
Cryptology
Soggetto genere / forma Kongress.
Oslo (2009)
ISBN 3-642-04766-1
Classificazione DAT 461f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1: Anonymity and Privacy -- On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market -- Facilitating the Adoption of Tor by Focusing on a Promising Target Group -- A Parallelism-Based Approach to Network Anonymization -- Security Usability of Petname Systems -- Session 2: Modelling and Design -- An Analysis of Widget Security -- Trade-Offs in Cryptographic Implementations of Temporal Access Control -- Blunting Differential Attacks on PIN Processing APIs -- Session 3: Network Layer Security -- Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic -- An Improved Attack on TKIP -- Session 4: Security for Mobile Users -- ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System -- A Mechanism for Identity Delegation at Authentication Level -- Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services -- Towards True Random Number Generation in Mobile Environments -- Session 5: Embedded Systems and Mechanisms -- Towards Modelling Information Security with Key-Challenge Petri Nets -- Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011 -- Advanced SIM Capabilities Supporting Trust-Based Applications -- Towards Practical Enforcement Theories -- Session 6: Protocols and Protocol Analysis -- Security Analysis of AN.ON’s Payment Scheme -- Formal Analysis of the Estonian Mobile-ID Protocol -- Generating In-Line Monitors for Rabin Automata.
Record Nr. UNISA-996465313803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Networked Services and Applications - Engineering, Control and Management [[electronic resource] ] : 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010, Proceedings / / edited by Finn Arve Aagesen, Svein J. Knapskog
Networked Services and Applications - Engineering, Control and Management [[electronic resource] ] : 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010, Proceedings / / edited by Finn Arve Aagesen, Svein J. Knapskog
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 275 p. 125 illus.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer communication systems
Computers
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Computer Communication Networks
Theory of Computation
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 1-280-38753-X
9786613565457
3-642-13971-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Admission Control and Networking -- On the Performance of Grooming Strategies for Offloading IP Flows onto Lightpaths in Hybrid Networks -- MBAC: Impact of the Measurement Error on Key Performance Issues -- An Algorithm for Automatic Base Station Placement in Cellular Network Deployment -- An Energy-Efficient FPGA-Based Packet Processing Framework -- Service Mobility -- Service Migration Protocol for NFC Links -- Swarm Intelligence Heuristics for Component Deployment -- Peer-to-Peer and Virtualization -- On Force-Based Placement of Distributed Services within a Substrate Network -- Enabling P2P Gaming with Network Coding -- A Virtual File System Interface for Computational Grids -- Security -- Labeled VoIP Data-Set for Intrusion Detection Evaluation -- Document Provenance in the Cloud: Constraints and Challenges -- Wireless Handoff Optimization: A Comparison of IEEE 802.11r and HOKEY -- Introducing Perfect Forward Secrecy for AN.ON -- Congestion Control -- Mobility-Aware Drop Precedence Scheme in DiffServ-Enabled Mobile Network Systems -- Theoretical Analysis of an Ideal Startup Scheme in Multihomed SCTP -- Monitoring and Filtering -- The Network Data Handling War: MySQL vs. NfDump -- Processing of Flow Accounting Data in Java: Framework Design and Performance Evaluation -- Fighting Spam on the Sender Side: A Lightweight Approach -- Dependability -- Degradation Model for Erbium-Doped Fiber Amplifiers to Reduce Network Downtime -- A Token Based Approach Detecting Downtime in Distributed Application Servers or Network Elements -- Distributed Resource Reservation for Beacon Based MAC Protocols -- Adaptation and Reconfiguration -- On Runtime Adaptation of Application-Layer Multicast Protocol Parameters -- A Framework with Proactive Nodes for Scheduling and Optimizing Distributed Embedded Systems -- Resource Adaptive Distributed Information Sharing -- Poster Session -- Performance Impacts of Node Failures on a Chord-Based Hierarchical Peer-to-Peer Network -- A Low-Power Scheme for Localization in Wireless Sensor Networks -- Flow Aggregation Using Dynamic Packet State -- Evaluating MDC with Incentives in P2PTV Systems -- Translation from UML to SPN Model: A Performance Modeling Framework -- An Open and Extensible Service Discovery for Ubiquitous Communication Systems.
Record Nr. UNISA-996465871103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui