Information Theoretic Security [[electronic resource] ] : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings / / edited by Anja Lehmann, Stefan Wolf |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XIV, 297 p. 29 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Systems and Data Security Cryptology Coding and Information Theory |
ISBN | 3-319-17470-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Practical Sharing of Quantum Secrets over Untrusted Channels -- Generalizing Efficient Multiparty Computation -- Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity -- On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits -- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy -- On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation -- Metric Pseudoentropy: Characterizations, Transformations and Applications -- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy -- Gambling, Computational Information and Encryption Security -- Query-Complexity Amplification for Random Oracles -- The Chaining Lemma and Its Application -- Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens -- Limited View Adversary Codes: Bounds, Constructions and Applications -- Locally Decodable Codes for Edit Distance -- The Multivariate Hidden Number Problem -- Lattice Point Enumeration on Block Reduced Bases -- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes. |
Record Nr. | UNISA-996207295603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Theoretic Security : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings / / edited by Anja Lehmann, Stefan Wolf |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XIV, 297 p. 29 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Systems and Data Security Cryptology Coding and Information Theory |
ISBN | 3-319-17470-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Practical Sharing of Quantum Secrets over Untrusted Channels -- Generalizing Efficient Multiparty Computation -- Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity -- On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits -- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy -- On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation -- Metric Pseudoentropy: Characterizations, Transformations and Applications -- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy -- Gambling, Computational Information and Encryption Security -- Query-Complexity Amplification for Random Oracles -- The Chaining Lemma and Its Application -- Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens -- Limited View Adversary Codes: Bounds, Constructions and Applications -- Locally Decodable Codes for Edit Distance -- The Multivariate Hidden Number Problem -- Lattice Point Enumeration on Block Reduced Bases -- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes. |
Record Nr. | UNINA-9910483087403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy and Identity Management. Facing up to Next Steps : 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers / / edited by Anja Lehmann, Diane Whitehouse, Simone Fischer-Hübner, Lothar Fritsch, Charles Raab |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XII, 279 p. 31 illus.) |
Disciplina | 005.8 |
Collana | IFIP AICT Tutorials |
Soggetto topico |
Computer security
Data protection Management information systems Computer science Application software Computers and civilization Systems and Data Security Security Management of Computing and Information Systems Information Systems Applications (incl. Internet) Computers and Society |
ISBN | 3-319-55783-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Big Data -- Big Data Privacy and Anonymization -- Data Protection by Design and by Default à la European General Data Protection Regulation -- Evaluating Websites and Their Adherence to Data Protection Principles: Tools and Experiences -- Privacy in the Human Brain Project: The Perspective of Ethics Management -- Smart Cars Cruising on the Road Paved with Good Intentions? Workshop on Big Data Applications and Individual Rights under the New European General Data Protection Regulation.-Opportunities and Challenges of CREDENTIAL -- Co-development of RRI Framework to Emphasize Privacy and Data Protection -- Evidence-Based Methods for Privacy and Identity Management -- Enforcing Data Protection Law: the Role of the Supervisory Authorities in Theory and Practice -- Not Just User Control in the General Data Protection Regulation. On the Problems with Choice and Paternalism, and on the Point of Data Protection -- Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This? -- Cloud Computing Contracts Regulatory Issues and Cloud Service Providers' Offers: An Analysis -- Using Differential Privacy for the Internet of Things -- Implicit Bias in Predictive Data Profiling within Recruitments -- A Survey of Security Analysis in Federated Identity Management -- The Impact of Users' Affect States on Privacy Concern -- Privacy Salience: Taxonomies and Research Opportunities. |
Record Nr. | UNINA-9910254998803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security Standardisation Research [[electronic resource] ] : 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings / / edited by Cas Cremers, Anja Lehmann |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (IX, 185 p. 43 illus., 15 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Data encryption (Computer science) Programming languages (Electronic computers) Application software Systems and Data Security Software Engineering Cryptology Programming Languages, Compilers, Interpreters Information Systems Applications (incl. Internet) |
ISBN | 3-030-04762-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security standardisation research -- Including cryptographic evaluation -- Standards development -- Analysis with formal methods -- Potential future areas of standardisation -- Proving existing standards. |
Record Nr. | UNISA-996466196803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security Standardisation Research : 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings / / edited by Cas Cremers, Anja Lehmann |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (IX, 185 p. 43 illus., 15 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Data encryption (Computer science) Programming languages (Electronic computers) Application software Systems and Data Security Software Engineering Cryptology Programming Languages, Compilers, Interpreters Information Systems Applications (incl. Internet) |
ISBN | 3-030-04762-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security standardisation research -- Including cryptographic evaluation -- Standards development -- Analysis with formal methods -- Potential future areas of standardisation -- Proving existing standards. |
Record Nr. | UNINA-9910349390203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|