top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied Cryptography and Network Security [[electronic resource] ] : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / / edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
Applied Cryptography and Network Security [[electronic resource] ] : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / / edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 698 p. 152 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Computers
Computers and civilization
Systems and Data Security
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Theory of Computation
Computers and Society
ISBN 3-319-28166-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness.
Record Nr. UNISA-996466370003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / / edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
Applied Cryptography and Network Security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / / edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 698 p. 152 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Computers
Computers and civilization
Systems and Data Security
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Theory of Computation
Computers and Society
ISBN 3-319-28166-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness.
Record Nr. UNINA-9910483660403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptology and Network Security [[electronic resource] ] : 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 – November 2, 2023, Proceedings / / edited by Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann
Cryptology and Network Security [[electronic resource] ] : 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 – November 2, 2023, Proceedings / / edited by Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann
Autore Deng Jing
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (593 pages)
Disciplina 005.824
Altri autori (Persone) KolesnikovVladimir
SchwarzmannAlexander A
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Computer networks - Security measures
Data protection
Application software
Cryptology
Computer Communication Networks
Mobile and Network Security
Data and Information Security
Computer and Information Systems Applications
ISBN 981-9975-63-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Schemes I -- Forward Security under Leakage Resilience, Revisited -- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE -- Signatures with Delegation -- Basic Primitives -- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium -- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks -- Hardness of Learning AES with Gradient-based Methods -- Security -- Privacy-Preserving Digital Vaccine Passport -- Exploiting Android Browser -- Are Current CCPA Compliant Banners Conveying User’s Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners -- MPC with Cards -- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols -- Free-XOR in Card-based Garbled Circuits -- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal -- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives -- Key Filtering in Cube Attacks from the Implementation Aspect -- New Techniques for Modeling SBoxes: An MILP Approach -- Blockchain -- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness -- Improving Privacy of Anonymous Proof-of-Stake Protocols -- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys -- CTA: Confidetial Transactions Protocol with State Accumulator -- MPC and Secret Sharing -- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets -- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing -- Schemes II -- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding -- A Practical Forward-Secure DualRing -- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption -- A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.
Record Nr. UNISA-996558464003316
Deng Jing  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptology and Network Security [[electronic resource] ] : 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 – November 2, 2023, Proceedings / / edited by Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann
Cryptology and Network Security [[electronic resource] ] : 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 – November 2, 2023, Proceedings / / edited by Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann
Autore Deng Jing
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (593 pages)
Disciplina 005.824
Altri autori (Persone) KolesnikovVladimir
SchwarzmannAlexander A
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Computer networks - Security measures
Data protection
Application software
Cryptology
Computer Communication Networks
Mobile and Network Security
Data and Information Security
Computer and Information Systems Applications
ISBN 981-9975-63-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Schemes I -- Forward Security under Leakage Resilience, Revisited -- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE -- Signatures with Delegation -- Basic Primitives -- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium -- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks -- Hardness of Learning AES with Gradient-based Methods -- Security -- Privacy-Preserving Digital Vaccine Passport -- Exploiting Android Browser -- Are Current CCPA Compliant Banners Conveying User’s Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners -- MPC with Cards -- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols -- Free-XOR in Card-based Garbled Circuits -- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal -- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives -- Key Filtering in Cube Attacks from the Implementation Aspect -- New Techniques for Modeling SBoxes: An MILP Approach -- Blockchain -- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness -- Improving Privacy of Anonymous Proof-of-Stake Protocols -- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys -- CTA: Confidetial Transactions Protocol with State Accumulator -- MPC and Secret Sharing -- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets -- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing -- Schemes II -- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding -- A Practical Forward-Secure DualRing -- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption -- A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.
Record Nr. UNINA-9910755086603321
Deng Jing  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (265 pages) : illustrations
Disciplina 005.824
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers
Architecture, Computer
Computer networks - Security measures
Systems and Data Security
Computer Communication Networks
Cryptology
Information Systems and Communication Service
Computer System Implementation
Mobile and Network Security
ISBN 3-030-49785-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Single Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for Detecting Malicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption.
Record Nr. UNISA-996418285703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security Cryptography and Machine Learning : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss
Cyber Security Cryptography and Machine Learning : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings / / edited by Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (265 pages) : illustrations
Disciplina 005.824
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers
Architecture, Computer
Computer networks - Security measures
Systems and Data Security
Computer Communication Networks
Cryptology
Information Systems and Communication Service
Computer System Implementation
Mobile and Network Security
ISBN 3-030-49785-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Single Tweakey Cryptanalysis of Reduced-Round Skinny-64 -- Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services -- Security Ranking of IoT Devices Using an AHP Model -- Robust Malicious Domain Detection -- NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis -- Can the Operator of a Drone be Located by Following the Drone's Path? -- Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning -- Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography -- Efficient CORDIC-based Sine and Cosine Implementation for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion is not enough: A Case Study of Android Malware -- Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain -- A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives based on FHE -- Comparison of DNS based Methods for Detecting Malicious Domains -- Average-case Competitive Ratio for Evaluating Scheduling Algorithms of Multi-user Cache -- CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption.
Record Nr. UNINA-9910409661403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public-Key Cryptography - PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II / / Alexandra Boldyreva and Vladimir Kolesnikov, editors
Public-Key Cryptography - PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II / / Alexandra Boldyreva and Vladimir Kolesnikov, editors
Edizione [First edition.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (707 pages)
Disciplina 005.82
Collana Lecture Notes in Computer Science Series
Soggetto topico Public key cryptography
ISBN 9783031313714
9783031313707
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Post-Quantum Cryptography -- Attacks -- Signatures -- Isogenies -- Crypto for Crypto -- Pairings -- Key Exchange and Messaging -- Homomorphic Cryptography and Other Topics -- MPC -- Encryption -- IO and ZK.
Record Nr. UNISA-996534467603316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-Key Cryptography - PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I / / Alexandra Boldyreva and Vladimir Kolesnikov, editors
Public-Key Cryptography - PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I / / Alexandra Boldyreva and Vladimir Kolesnikov, editors
Edizione [First edition.]
Pubbl/distr/stampa Cham, Switzerland : , : International Association for Cryptologic Research, , [2023]
Descrizione fisica 1 online resource (812 pages)
Disciplina 005.82
Collana Lecture Notes in Computer Science Series
Soggetto topico Public key cryptography
ISBN 9783031313684
9783031313677
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Post-Quantum Cryptography -- Attacks -- Signatures -- Isogenies -- Crypto for Crypto -- Pairings -- Key Exchange and Messaging -- Homomorphic Cryptography and Other Topics -- MPC -- Encryption -- IO and ZK.
Record Nr. UNISA-996534467403316
Cham, Switzerland : , : International Association for Cryptologic Research, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-Key Cryptography - PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II / / Alexandra Boldyreva and Vladimir Kolesnikov, editors
Public-Key Cryptography - PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II / / Alexandra Boldyreva and Vladimir Kolesnikov, editors
Edizione [First edition.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (707 pages)
Disciplina 005.82
Collana Lecture Notes in Computer Science Series
Soggetto topico Public key cryptography
ISBN 9783031313714
9783031313707
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Post-Quantum Cryptography -- Attacks -- Signatures -- Isogenies -- Crypto for Crypto -- Pairings -- Key Exchange and Messaging -- Homomorphic Cryptography and Other Topics -- MPC -- Encryption -- IO and ZK.
Record Nr. UNINA-9910720074103321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public-Key Cryptography - PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I / / Alexandra Boldyreva and Vladimir Kolesnikov, editors
Public-Key Cryptography - PKC 2023 : 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I / / Alexandra Boldyreva and Vladimir Kolesnikov, editors
Edizione [First edition.]
Pubbl/distr/stampa Cham, Switzerland : , : International Association for Cryptologic Research, , [2023]
Descrizione fisica 1 online resource (812 pages)
Disciplina 005.82
Collana Lecture Notes in Computer Science Series
Soggetto topico Public key cryptography
ISBN 9783031313684
9783031313677
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Post-Quantum Cryptography -- Attacks -- Signatures -- Isogenies -- Crypto for Crypto -- Pairings -- Key Exchange and Messaging -- Homomorphic Cryptography and Other Topics -- MPC -- Encryption -- IO and ZK.
Record Nr. UNINA-9910720065103321
Cham, Switzerland : , : International Association for Cryptologic Research, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui