top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Theoretic Security [[electronic resource] ] : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings / / edited by Anja Lehmann, Stefan Wolf
Information Theoretic Security [[electronic resource] ] : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings / / edited by Anja Lehmann, Stefan Wolf
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIV, 297 p. 29 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Systems and Data Security
Cryptology
Coding and Information Theory
ISBN 3-319-17470-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Practical Sharing of Quantum Secrets over Untrusted Channels -- Generalizing Efficient Multiparty Computation -- Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity -- On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits -- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy -- On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation -- Metric Pseudoentropy: Characterizations, Transformations and Applications -- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy -- Gambling, Computational Information and Encryption Security -- Query-Complexity Amplification for Random Oracles -- The Chaining Lemma and Its Application -- Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens -- Limited View Adversary Codes: Bounds, Constructions and Applications -- Locally Decodable Codes for Edit Distance -- The Multivariate Hidden Number Problem -- Lattice Point Enumeration on Block Reduced Bases -- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes.
Record Nr. UNISA-996207295603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Theoretic Security : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings / / edited by Anja Lehmann, Stefan Wolf
Information Theoretic Security : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings / / edited by Anja Lehmann, Stefan Wolf
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIV, 297 p. 29 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Systems and Data Security
Cryptology
Coding and Information Theory
ISBN 3-319-17470-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Practical Sharing of Quantum Secrets over Untrusted Channels -- Generalizing Efficient Multiparty Computation -- Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity -- On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits -- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy -- On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation -- Metric Pseudoentropy: Characterizations, Transformations and Applications -- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy -- Gambling, Computational Information and Encryption Security -- Query-Complexity Amplification for Random Oracles -- The Chaining Lemma and Its Application -- Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens -- Limited View Adversary Codes: Bounds, Constructions and Applications -- Locally Decodable Codes for Edit Distance -- The Multivariate Hidden Number Problem -- Lattice Point Enumeration on Block Reduced Bases -- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes.
Record Nr. UNINA-9910483087403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy and Identity Management. Facing up to Next Steps : 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers / / edited by Anja Lehmann, Diane Whitehouse, Simone Fischer-Hübner, Lothar Fritsch, Charles Raab
Privacy and Identity Management. Facing up to Next Steps : 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers / / edited by Anja Lehmann, Diane Whitehouse, Simone Fischer-Hübner, Lothar Fritsch, Charles Raab
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 279 p. 31 illus.)
Disciplina 005.8
Collana IFIP AICT Tutorials
Soggetto topico Computer security
Data protection
Management information systems
Computer science
Application software
Computers and civilization
Systems and Data Security
Security
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 3-319-55783-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Big Data -- Big Data Privacy and Anonymization -- Data Protection by Design and by Default à la European General Data Protection Regulation -- Evaluating Websites and Their Adherence to Data Protection Principles: Tools and Experiences -- Privacy in the Human Brain Project: The Perspective of Ethics Management -- Smart Cars Cruising on the Road Paved with Good Intentions? Workshop on Big Data Applications and Individual Rights under the New European General Data Protection Regulation.-Opportunities and Challenges of CREDENTIAL -- Co-development of RRI Framework to Emphasize Privacy and Data Protection -- Evidence-Based Methods for Privacy and Identity Management -- Enforcing Data Protection Law: the Role of the Supervisory Authorities in Theory and Practice -- Not Just User Control in the General Data Protection Regulation. On the Problems with Choice and Paternalism, and on the Point of Data Protection -- Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This? -- Cloud Computing Contracts Regulatory Issues and Cloud Service Providers' Offers: An Analysis -- Using Differential Privacy for the Internet of Things -- Implicit Bias in Predictive Data Profiling within Recruitments -- A Survey of Security Analysis in Federated Identity Management -- The Impact of Users' Affect States on Privacy Concern -- Privacy Salience: Taxonomies and Research Opportunities.
Record Nr. UNINA-9910254998803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security Standardisation Research [[electronic resource] ] : 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings / / edited by Cas Cremers, Anja Lehmann
Security Standardisation Research [[electronic resource] ] : 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings / / edited by Cas Cremers, Anja Lehmann
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (IX, 185 p. 43 illus., 15 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Data encryption (Computer science)
Programming languages (Electronic computers)
Application software
Systems and Data Security
Software Engineering
Cryptology
Programming Languages, Compilers, Interpreters
Information Systems Applications (incl. Internet)
ISBN 3-030-04762-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security standardisation research -- Including cryptographic evaluation -- Standards development -- Analysis with formal methods -- Potential future areas of standardisation -- Proving existing standards.
Record Nr. UNISA-996466196803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security Standardisation Research : 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings / / edited by Cas Cremers, Anja Lehmann
Security Standardisation Research : 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings / / edited by Cas Cremers, Anja Lehmann
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (IX, 185 p. 43 illus., 15 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Data encryption (Computer science)
Programming languages (Electronic computers)
Application software
Systems and Data Security
Software Engineering
Cryptology
Programming Languages, Compilers, Interpreters
Information Systems Applications (incl. Internet)
ISBN 3-030-04762-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security standardisation research -- Including cryptographic evaluation -- Standards development -- Analysis with formal methods -- Potential future areas of standardisation -- Proving existing standards.
Record Nr. UNINA-9910349390203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui