top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in cryptology : ASIACRYPT 2006 : 12th international conference on the theory and application of cryptology and information security Shanghai, China, December 2006 : proceedings / / Xuejia Lai, Kefei Chen (eds.)
Advances in cryptology : ASIACRYPT 2006 : 12th international conference on the theory and application of cryptology and information security Shanghai, China, December 2006 : proceedings / / Xuejia Lai, Kefei Chen (eds.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, 2006
Descrizione fisica 1 online resource (XIV, 470 p.)
Disciplina 005.8
Altri autori (Persone) LaiXuejia
ChenKefei <1959->
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
ISBN 3-540-49476-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attacks on Hash Functions -- Finding SHA-1 Characteristics: General Results and Applications -- Improved Collision Search for SHA-0 -- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions -- Stream Ciphers and Boolean Functions -- New Guess-and-Determine Attack on the Self-Shrinking Generator -- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition -- Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity -- Biometrics and ECC Computation -- Secure Sketch for Biometric Templates -- The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography -- Extending Scalar Multiplication Using Double Bases -- ID-Based Schemes -- HIBE With Short Public Parameters Without Random Oracle -- Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys -- On the Generic Construction of Identity-Based Signatures with Additional Properties -- Public-Key Schemes -- On the Provable Security of an Efficient RSA-Based Pseudorandom Generator -- On the Security of OAEP -- Relationship Between Standard Model Plaintext Awareness and Message Hiding -- RSA and Factorization -- On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms -- Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption -- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants -- Construction of Hash Function -- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding -- Multi-Property-Preserving Hash Domain Extension and the EMD Transform -- Combining Compression Functions and Block Cipher-Based Hash Functions -- Protocols -- A Scalable Password-Based Group Key Exchange Protocol in the Standard Model -- A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols -- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution -- Block Ciphers -- KFC – The Krazy Feistel Cipher -- Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions -- New Cryptanalytic Results on IDEA -- Signatures -- New Approach for Selectively Convertible Undeniable Signature Schemes -- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures -- Analysis of One Popular Group Signature Scheme.
Altri titoli varianti ASIACRYPT 2006
Record Nr. UNINA-9910146617503321
Berlin ; ; New York, : Springer, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology -- ASIACRYPT 2006 [[electronic resource] ] : 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings / / edited by Xuejia Lai, Kefei Chen
Advances in Cryptology -- ASIACRYPT 2006 [[electronic resource] ] : 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings / / edited by Xuejia Lai, Kefei Chen
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 470 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Management information systems
Computer science
Computer communication systems
Computer science - Mathematics
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Computer Communication Networks
Discrete Mathematics in Computer Science
ISBN 3-540-49476-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attacks on Hash Functions -- Finding SHA-1 Characteristics: General Results and Applications -- Improved Collision Search for SHA-0 -- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions -- Stream Ciphers and Boolean Functions -- New Guess-and-Determine Attack on the Self-Shrinking Generator -- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition -- Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity -- Biometrics and ECC Computation -- Secure Sketch for Biometric Templates -- The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography -- Extending Scalar Multiplication Using Double Bases -- ID-Based Schemes -- HIBE With Short Public Parameters Without Random Oracle -- Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys -- On the Generic Construction of Identity-Based Signatures with Additional Properties -- Public-Key Schemes -- On the Provable Security of an Efficient RSA-Based Pseudorandom Generator -- On the Security of OAEP -- Relationship Between Standard Model Plaintext Awareness and Message Hiding -- RSA and Factorization -- On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms -- Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption -- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants -- Construction of Hash Function -- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding -- Multi-Property-Preserving Hash Domain Extension and the EMD Transform -- Combining Compression Functions and Block Cipher-Based Hash Functions -- Protocols -- A Scalable Password-Based Group Key Exchange Protocol in the Standard Model -- A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols -- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution -- Block Ciphers -- KFC – The Krazy Feistel Cipher -- Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions -- New Cryptanalytic Results on IDEA -- Signatures -- New Approach for Selectively Convertible Undeniable Signature Schemes -- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures -- Analysis of One Popular Group Signature Scheme.
Record Nr. UNISA-996465884903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings / / edited by Xuejia Lai, Jianying Zhou, Hui Li
Information Security [[electronic resource] ] : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings / / edited by Xuejia Lai, Jianying Zhou, Hui Li
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIII, 388 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Special purpose computers
Application software
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
Math Applications in Computer Science
Special Purpose and Application-Based Systems
Information Systems Applications (incl. Internet)
ISBN 3-642-24861-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465428203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Cryptology [[electronic resource] ] : 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers / / edited by Xuejia Lai, Moti Yung, Dongdai Lin
Information Security and Cryptology [[electronic resource] ] : 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers / / edited by Xuejia Lai, Moti Yung, Dongdai Lin
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIV, 524 p. 91 illus., 31 illus. in color.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Algorithms
Data protection
Computers and civilization
Computer Communication Networks
Cryptology
IT Operations
Data and Information Security
Computers and Society
ISBN 3-642-21518-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto New constructions of public-key encryption schemes from conjugacy search problems / Lihua Wang [and 4 others] -- On the CCA1-security of Elganial and Damgard's Elgamal / Helger Lipmaa -- Online/offline identity0based signcryption revisited / Joseph K. Liu, Joonsang Baek, Jianying Zhou.
Record Nr. UNISA-996465765403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings / / edited by Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou
Information Security Practice and Experience [[electronic resource] ] : Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings / / edited by Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 392 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Computers and civilization
Management information systems
Computer science
Information retrieval
Cryptology
Computer Communication Networks
Operating Systems
Computers and Society
Management of Computing and Information Systems
Information Storage and Retrieval
ISBN 3-540-33058-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptoanalysis -- DPA-Resistant Finite Field Multipliers and Secure AES Design -- Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication -- Diophantine Approximation Attack on a Fast Public Key Cryptosystem -- Further Security Analysis of XTR -- Network Security I -- A Counting-Based Method for Massive Spam Mail Classification -- Model and Estimation of Worm Propagation Under Network Partition -- Tackling Worm Detection Speed and False Alarm in Virus Throttling -- Network Security II -- Using Data Field to Analyze Network Intrusions -- Adversarial Organization Modeling for Network Attack/Defense -- A Novel Dynamic Immunization Strategy for Computer Network Epidemics -- Preventing Web-Spoofing with Automatic Detecting Security Indicator -- Security Protocol -- Security Protocol Analysis with Improved Authentication Tests -- A Protocol of Member-Join in a Secret Sharing Scheme -- More on Shared-Scalar-Product Protocols -- Communication Security -- Efficient Public Key Broadcast Encryption Using Identifier of Receivers -- A Practical Clumped-Tree Multicast Encryption Scheme -- Trojan Horse Attack Strategy on Quantum Private Communication -- Signature and Key Agreement -- Linkable Democratic Group Signatures -- Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings -- Short (Identity-Based) Strong Designated Verifier Signature Schemes -- Identity Based Key Insulated Signature -- Application I -- Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems -- A Design and Implementation of Profile Based Web Application Securing Proxy -- An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards -- Application II -- Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments -- Using ?-Calculus to Formalize Domain Administration of RBAC -- An Efficient Way to Build Secure Disk -- Practical Forensic Analysis in Advanced Access Content System -- Cryptographic Techniques -- Security Analysis of a Server-Aided RSA Key Generation Protocol -- Integrating Grid with Cryptographic Computing -- Three-Round Secret Handshakes Based on ElGamal and DSA -- System Security -- Securing C Programs by Dynamic Type Checking -- A Chaos-Based Robust Software Watermarking -- Privately Retrieve Data from Large Databases -- An Empirical Study of Quality and Cost Based Security Engineering.
Record Nr. UNISA-996465794203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart City and Informatization : 7th International Conference, iSCI 2019, Guangzhou, China, November 12–15, 2019, Proceedings / / edited by Guojun Wang, Abdulmotaleb El Saddik, Xuejia Lai, Gregorio Martinez Perez, Kim-Kwang Raymond Choo
Smart City and Informatization : 7th International Conference, iSCI 2019, Guangzhou, China, November 12–15, 2019, Proceedings / / edited by Guojun Wang, Abdulmotaleb El Saddik, Xuejia Lai, Gregorio Martinez Perez, Kim-Kwang Raymond Choo
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XXI, 675 p. 280 illus., 188 illus. in color.)
Disciplina 004.6
Collana Communications in Computer and Information Science
Soggetto topico Computer communication systems
Architecture, Computer
Computer security
Artificial intelligence
Application software
Computer Communication Networks
Computer System Implementation
Systems and Data Security
Artificial Intelligence
Information Systems Applications (incl. Internet)
ISBN 981-15-1301-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Internet of Things (IoT) and Smart Sensing -- Urban Computing and Big Data -- Smart Society Informatization Technologies -- Cloud/Edge/Fog Computing for Smart City -- Applications for Smart City Informatization -- Assistive Engineering and Information Technology -- Cyberspace Security -- Blockchain and Applications. .
Record Nr. UNINA-9910357845203321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui