Communications and Multimedia Security. Advanced Techniques for Network and Data Protection [[electronic resource] ] : 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings / / edited by Antonio Lioy, Daniele Mazzocchi
| Communications and Multimedia Security. Advanced Techniques for Network and Data Protection [[electronic resource] ] : 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings / / edited by Antonio Lioy, Daniele Mazzocchi |
| Edizione | [1st ed. 2003.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
| Descrizione fisica | 1 online resource (VIII, 268 p.) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Multimedia information systems Computers and civilization Management information systems Computer science Cryptology Computer Communication Networks Operating Systems Multimedia Information Systems Computers and Society Management of Computing and Information Systems |
| ISBN | 3-540-45184-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cryptography -- Computation of Cryptographic Keys from Face Biometrics -- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution -- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection -- Network Security -- Securing the Border Gateway Protocol: A Status Update -- Towards an IPv6-Based Security Framework for Distributed Storage Resources -- Operational Characteristics of an Automated Intrusion Response System -- Mobile and Wireless Network Security -- A Secure Multimedia System in Emerging Wireless Home Networks -- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents -- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems -- Trust and Privacy -- Privacy and Trust in Distributed Networks -- Extending the SDSI / SPKI Model through Federation Webs -- Trust- : An XML Framework for Trust Negotiations -- Application Security -- How to Specify Security Services: A Practical Approach -- Application Level Smart Card Support through Networked Mobile Devices -- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage -- Multimedia Security -- Selective Encryption of the JPEG2000 Bitstream -- Robust Spatial Data Hiding for Color Images -- Watermark Security via Secret Wavelet Packet Subband Structures -- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression -- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs -- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization. |
| Record Nr. | UNISA-996465785703316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection : 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings / / edited by Antonio Lioy, Daniele Mazzocchi
| Communications and Multimedia Security. Advanced Techniques for Network and Data Protection : 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings / / edited by Antonio Lioy, Daniele Mazzocchi |
| Edizione | [1st ed. 2003.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
| Descrizione fisica | 1 online resource (VIII, 268 p.) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data encryption (Computer science)
Computer networks Operating systems (Computers) Multimedia systems Computers and civilization Management information systems Computer science Cryptology Computer Communication Networks Operating Systems Multimedia Information Systems Computers and Society Management of Computing and Information Systems |
| ISBN | 3-540-45184-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cryptography -- Computation of Cryptographic Keys from Face Biometrics -- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution -- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection -- Network Security -- Securing the Border Gateway Protocol: A Status Update -- Towards an IPv6-Based Security Framework for Distributed Storage Resources -- Operational Characteristics of an Automated Intrusion Response System -- Mobile and Wireless Network Security -- A Secure Multimedia System in Emerging Wireless Home Networks -- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents -- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems -- Trust and Privacy -- Privacy and Trust in Distributed Networks -- Extending the SDSI / SPKI Model through Federation Webs -- Trust- : An XML Framework for Trust Negotiations -- Application Security -- How to Specify Security Services: A Practical Approach -- Application Level Smart Card Support through Networked Mobile Devices -- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage -- Multimedia Security -- Selective Encryption of the JPEG2000 Bitstream -- Robust Spatial Data Hiding for Color Images -- Watermark Security via Secret Wavelet Packet Subband Structures -- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression -- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs -- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization. |
| Record Nr. | UNINA-9910144035903321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Digital Sovereignty in Cyber Security: New Challenges in Future Vision [[electronic resource] ] : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu
| Digital Sovereignty in Cyber Security: New Challenges in Future Vision [[electronic resource] ] : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu |
| Autore | Skarmeta Antonio |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (182 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
CanaveseDaniele
LioyAntonio MatheuSara |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection
Computers - Law and legislation Information technology - Law and legislation Computer crimes Software engineering Operating systems (Computers) Data and Information Security Legal Aspects of Computing Computer Crime Software Engineering Operating Systems |
| ISBN | 3-031-36096-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | S oftware Security -- Network Security and Privacy -- Cybersecurity and Society. |
| Record Nr. | UNISA-996546821203316 |
Skarmeta Antonio
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Digital Sovereignty in Cyber Security: New Challenges in Future Vision : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu
| Digital Sovereignty in Cyber Security: New Challenges in Future Vision : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers / / edited by Antonio Skarmeta, Daniele Canavese, Antonio Lioy, Sara Matheu |
| Autore | Skármeta Antonio |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (182 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
CanaveseDaniele
LioyAntonio MatheuSara |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection
Computers - Law and legislation Information technology - Law and legislation Computer crimes Software engineering Operating systems (Computers) Data and Information Security Legal Aspects of Computing Computer Crime Software Engineering Operating Systems Seguretat informàtica |
| Soggetto genere / forma |
Congressos
Llibres electrònics |
| ISBN | 3-031-36096-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | S oftware Security -- Network Security and Privacy -- Cybersecurity and Society. |
| Record Nr. | UNINA-9910731481503321 |
Skármeta Antonio
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Public Key Infrastructure [[electronic resource] ] : Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings / / edited by Andrea S. Atzeni, Antonio Lioy
| Public Key Infrastructure [[electronic resource] ] : Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings / / edited by Andrea S. Atzeni, Antonio Lioy |
| Edizione | [1st ed. 2006.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
| Descrizione fisica | 1 online resource (XII, 264 p.) |
| Disciplina | 004.6 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer communication systems
Data encryption (Computer science) Algorithms Information storage and retrieval Application software Computers and civilization Computer Communication Networks Cryptology Algorithm Analysis and Problem Complexity Information Storage and Retrieval Information Systems Applications (incl. Internet) Computers and Society |
| ISBN | 3-540-35152-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | PKI Management -- Use of a Validation Authority to Provide Risk Management for the PKI Relying Party -- Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI -- Distributing Security-Mediated PKI Revisited -- Authentication I -- An Improved Lu-Cao’s Remote User Authentication Scheme Using Smart Card -- Forward Secure Password-Enabled PKI with Instant Revocation -- Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing -- Cryptography -- Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes -- On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders -- Short Linkable Ring Signatures Revisited -- Applications -- An Infrastructure Supporting Secure Internet Routing -- Fighting E-Mail Abuses: The EMPE Approach -- DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel -- Towards Secure Electronic Workflows -- An Access Control System for Multimedia Content Distribution -- Efficient Conjunctive Keyword Search on Encrypted Data Storage System -- Authentication II -- Enhanced Forward-Secure User Authentication Scheme with Smart Cards -- Pseudonymous PKI for Ubiquitous Computing -- An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI -- On the Resilience of Key Agreement Protocols to Key Compromise Impersonation -- Short Contributions -- A PKI System for Detecting the Exposure of a User’s Secret Key -- A Guide to the Nightmares of the Certification Service Provider -- A High-Level 3G Wireless PKI Solution for Secure Healthcare Communications -- Identity-Based Strong Multi-Designated Verifiers Signatures. |
| Record Nr. | UNISA-996465741103316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||