top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
E-Voting and Identity [[electronic resource] ] : Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers / / edited by Aggelos Kiayias, Helger Lipmaa
E-Voting and Identity [[electronic resource] ] : Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers / / edited by Aggelos Kiayias, Helger Lipmaa
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (X, 257 p. 26 illus.)
Disciplina 324.6/502854678
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Special purpose computers
Application software
Computers and civilization
Cryptology
Systems and Data Security
Computer Communication Networks
Special Purpose and Application-Based Systems
Computer Appl. in Administrative Data Processing
Computers and Society
ISBN 3-642-32747-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Norwegian Internet Voting Protocol -- Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting -- Internet Voting System with Cast as Intended Verification.- Linear Logical Voting Protocols.- Efficient Vote Authorization in Coercion-Resistant Internet Voting.- The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Voting -- An Efficient and Highly Sound Voter Verification Technique and Its Implementation.- Single Layer Optical-Scan Voting with Fully Distributed Trust.- Paperless Independently-Verifiable Voting.- Feasibility Analysis of Pret a Voter for German Federal Elections.- Pret a Voter with Write-Ins.- Trivitas: Voters Directly Verifying Votes.- The Application of I-Voting for Estonian Parliamentary Elections of 2011.- Towards Best Practice for E-election Systems: Lessons from Trial and Error in Australian Elections.- On the Side-Effects of Introducing E-Voting. Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting -- Internet Voting System with Cast as Intended Verification.- Linear Logical Voting Protocols.- Efficient Vote Authorization in Coercion-Resistant Internet Voting.- The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Voting -- An Efficient and Highly Sound Voter Verification Technique and Its Implementation.- Single Layer Optical-Scan Voting with Fully Distributed Trust.- Paperless Independently-Verifiable Voting.- Feasibility Analysis of Pret a Voter for German Federal Elections.- Pret a Voter with Write-Ins.- Trivitas: Voters Directly Verifying Votes.- The Application of I-Voting for Estonian Parliamentary Elections of 2011.- Towards Best Practice for E-election Systems: Lessons from Trial and Error in Australian Elections.- On the Side-Effects of Introducing E-Voting.
Record Nr. UNISA-996465499903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Cryptology [[electronic resource] ] : Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings / / edited by Helger Lipmaa, Moti Yung, Donghai Lin
Information Security and Cryptology [[electronic resource] ] : Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings / / edited by Helger Lipmaa, Moti Yung, Donghai Lin
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 308 p.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Electronic data processing—Management
Computers and civilization
Computer networks
Algorithms
Cryptology
Data and Information Security
IT Operations
Computers and Society
Computer Communication Networks
ISBN 3-540-49610-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Digital Signature Schemes -- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05 -- Identity-Based Key-Insulated Signature with Secure Key-Updates -- Efficient Intrusion-Resilient Signatures Without Random Oracles -- Sequences and Stream Ciphers -- New Constructions of Large Binary Sequences Family with Low Correlation -- On the Rate of Coincidence of Two Clock-Controlled Combiners -- Symmetric-Key Cryptography -- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining -- OPMAC: One-Key Poly1305 MAC -- A General Construction of Tweakable Block Ciphers and Different Modes of Operations -- Cryptographic Schemes -- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme -- Efficient Short Signcryption Scheme with Public Verifiability -- A Revocation Scheme Preserving Privacy -- Network Security -- Deterministic Packet Marking with Link Signatures for IP Traceback -- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System -- A Network Security Policy Model and Its Realization Mechanism -- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic -- Access Control -- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty -- Design and Implementation of Fast Access Control That Supports the Separation of Duty -- Computer and Applications Security -- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models -- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks -- Application and Evaluation of Bayesian Filter for Chinese Spam -- Web and Media Security -- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes -- An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses -- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.
Record Nr. UNISA-996466142703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Cryptology : Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings / / edited by Helger Lipmaa, Moti Yung, Donghai Lin
Information Security and Cryptology : Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings / / edited by Helger Lipmaa, Moti Yung, Donghai Lin
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 308 p.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Electronic data processing—Management
Computers and civilization
Computer networks
Algorithms
Cryptology
Data and Information Security
IT Operations
Computers and Society
Computer Communication Networks
ISBN 3-540-49610-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Digital Signature Schemes -- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05 -- Identity-Based Key-Insulated Signature with Secure Key-Updates -- Efficient Intrusion-Resilient Signatures Without Random Oracles -- Sequences and Stream Ciphers -- New Constructions of Large Binary Sequences Family with Low Correlation -- On the Rate of Coincidence of Two Clock-Controlled Combiners -- Symmetric-Key Cryptography -- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining -- OPMAC: One-Key Poly1305 MAC -- A General Construction of Tweakable Block Ciphers and Different Modes of Operations -- Cryptographic Schemes -- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme -- Efficient Short Signcryption Scheme with Public Verifiability -- A Revocation Scheme Preserving Privacy -- Network Security -- Deterministic Packet Marking with Link Signatures for IP Traceback -- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System -- A Network Security Policy Model and Its Realization Mechanism -- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic -- Access Control -- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty -- Design and Implementation of Fast Access Control That Supports the Separation of Duty -- Computer and Applications Security -- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models -- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks -- Application and Evaluation of Bayesian Filter for Chinese Spam -- Web and Media Security -- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes -- An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses -- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.
Record Nr. UNINA-9910483083703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure IT Systems [[electronic resource] ] : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius
Secure IT Systems [[electronic resource] ] : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVIII, 313 p. 77 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Application software
Data mining
Computers and civilization
Computer organization
Systems and Data Security
Cryptology
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computers and Society
Computer Systems Organization and Communication Networks
ISBN 3-319-70290-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Invited Talks -- Homomorphic Authentication for Computing Securely on Untrusted Machines -- Security and Privacy Challenges in Machine Learning -- Proof of Stake Blockchain Protocols -- Contents -- Outsourcing Computations -- A Server-Assisted Hash-Based Signature Scheme -- 1 Introduction -- 2 Related Work -- 3 Our Contribution -- 4 Preliminaries -- 5 Description of the Scheme -- 6 Security Proof -- 7 Practical Considerations -- 8 Conclusions and Outlook -- References -- Outsourcing of Verifiable Attribute-Based Keyword Search -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 3 System Model -- 4 ABKS Outsourcing Scheme -- 4.1 Model of ABKS Outsourcing Scheme -- 4.2 Security Definition of ABKS Outsourcing Scheme -- 4.3 Our ABKS Outsourcing Scheme -- 5 VABKS Outsourcing Scheme -- 5.1 Model of VABKS Outsourcing Scheme -- 5.2 Security Definition of VABKS Outsourcing Scheme -- 5.3 Our VABKS Outsourcing Scheme -- 6 Comparison -- 7 Conclusion -- References -- Privacy Preservation -- Is RCB a Leakage Resilient Authenticated Encryption Scheme? -- 1 Introduction -- 2 Preliminaries and Notions -- 3 General Overview of RCB -- 4 Attacks on RCB -- 4.1 Forgery Attack -- 4.2 Attacks on Misuse Resistance -- 4.3 A Denial-of-Service (DoS) Attack -- 4.4 Attack on Full-Duplex Communication -- 5 Privacy by RCB -- 6 Conclusion -- References -- Practical and Secure Searchable Symmetric Encryption with a Small Index -- 1 Introduction -- 1.1 Backgrounds -- 1.2 Our Contributions -- 1.3 Related Works -- 2 Preliminaries -- 3 Bloom Filter -- 4 Proposed Scheme -- 4.1 Constructing an Encrypted Index -- 4.2 Search Protocol -- 5 Security Analysis -- 6 Experimental Results -- References -- Anonymous Certification for an e-Assessment Framework -- 1 Introduction -- 2 Related Work.
3 Anonymous Certification (AC) Construction -- 3.1 Background -- 3.2 Our Construction -- 4 E-learning Use Case for PCS -- 4.1 TeSLA Architecture -- 4.2 Pseudonymity -- 4.3 Integrating Anonymous Certification to TeSLA -- 5 Implementation and Security Details of PCS -- 5.1 Implementation Details -- 5.2 Security Level Sketch of Our Proposal -- 6 Conclusion -- References -- PARTS -- Privacy-Aware Routing with Transportation Subgraphs -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure -- 2 Related Work -- 3 System Model -- 3.1 Road Network -- 3.2 Users -- 3.3 LBS Provider -- 3.4 Adversary -- 4 Strategies for Privacy-Enhanced Routing -- 4.1 Route Parts -- 4.2 Dummy Traffic -- 4.3 Time Shift Requests -- 5 Adversary's Inference Model -- 5.1 Background Knowledge -- 5.2 Empirically Improved Guessing -- 5.3 Privacy Measurement -- 6 Evaluation -- 6.1 Dataset and Simulator -- 6.2 Experimental Setup -- 6.3 Overhead of Segmented Routes -- 6.4 Privacy Related Results -- 6.5 Performance Analysis -- 7 Discussion -- 8 Conclusion -- References -- Security and Privacy in Machine Learning -- Bayesian Network Models in Cyber Security: A Systematic Review -- 1 Introduction -- 2 Review Methodology -- 3 Analysis of Standard Bayesian Network Models in Cyber Security -- 3.1 Citation Details -- 3.2 Data Sources Used to Construct DAGs and Populate CPTs -- 3.3 The Number of Nodes Used in the Model -- 3.4 Type of Threat Actor -- 3.5 Application and Application Sector -- 3.6 Scope of Variables -- 3.7 The Approach(es) Used to Validate Models -- 3.8 Model Purpose and Type of Purpose -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Improving and Measuring Learning Effectiveness at Cyber Defense Exercises -- 1 Introduction -- 2 Learning Measurement Dimensions in CDX's -- 2.1 5-Timestamp Methodology -- 2.2 Data Collection and Sources -- 3 LS17---Learning Measurement.
3.1 5-Timestamp Methodology Experience -- 3.2 Discussion and Findings from LS17 Learning Measurement -- 4 Related Work in Learning Measurement Context -- 5 Conclusion -- References -- Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data -- 1 Introduction -- 2 Preliminaries -- 2.1 Secure Multiparty Computation -- 2.2 Notation -- 2.3 General FIM Algorithms -- 3 Privacy-Preserving FIM -- 3.1 Algorithms for Privacy Preserving FIM -- 3.2 Comparing Bit Matrix and Set Based Approaches -- 3.3 Combining Dense and Sparse Representations -- 4 Benchmarks -- 5 Conclusion -- References -- Applications -- Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets -- 1 Introduction -- 2 Ceremony Description -- 2.1 Description of Mobilpendlerkort -- 2.2 Building the Inspection Ceremony -- 3 Attack Demonstration -- 3.1 Barcode Analysis -- 3.2 Primary Screen Forgery -- 3.3 Extra Zone Ticket Forgery -- 4 Principles -- 5 Alternative Inspection Ceremony -- 6 Related Work -- 7 Conclusions -- References -- Using the Estonian Electronic Identity Card for Authentication to a Machine -- 1 Introduction -- 2 Card Authentication -- 2.1 Document Expiration and Revocation Checks -- 2.2 Card Impersonation -- 3 Attacks by Malicious Terminals -- 3.1 Compromising the Cardholder's Privacy -- 3.2 Denial-of-Service Attacks -- 3.3 Unauthorized Use of Private Keys -- 4 Design of ID Card Emulator -- 4.1 Card ATR Adjustment -- 4.2 APDU Logging Functionality -- 4.3 Visual Imitation of ID Card -- 5 Card Authentication in Practice -- 6 Discussion: Improvements -- 6.1 Cloning Prevention -- 6.2 Cardholder Verification -- 6.3 Contactless Interface -- 7 Conclusion -- References -- Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure -- 1 Introduction -- 2 Related Work -- 3 Statistical Tests for Ransomware Attacks Detection.
4 Towards a Generic and Practical Ransomware Countermeasure -- 4.1 File System Activity Monitoring -- 4.2 Implementation Design -- 4.3 A Single Indicator of Compromise -- 5 Experiments: Performance Evaluation -- 5.1 Disk Performance -- 5.2 CPU Performance -- 5.3 Discussion -- 6 Experiments: Ransomware Detection -- 6.1 Malware - O - Matic -- 6.2 Experimental Setup -- 6.3 Detection Results -- 6.4 Ransomware-Like Applications -- 7 Conclusions -- References -- A Large-Scale Analysis of Download Portals and Freeware Installers -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Analysis System Overview -- 3.2 Installer Crawling -- 4 Results -- 4.1 Static Properties of the Installers -- 4.2 Dynamic Analysis of Installers -- 4.3 App Managers and Software Updates -- 5 Discussion and Future Work -- 6 Conclusion -- References -- Access Control -- GPASS: A Password Manager with Group-Based Access Control -- 1 Introduction -- 2 Related Work -- 3 Models and Assumptions -- 3.1 System Model -- 3.2 Threat Model -- 3.3 System Goals -- 3.4 Security Goals -- 4 GPASS -- 4.1 Overview -- 4.2 Fundamental Operations -- 5 Security Analysis -- 6 Extended GPASS -- 7 Implementation -- 8 Discussion -- 9 Conclusion -- References -- Towards Accelerated Usage Control Based on Access Correlations -- 1 Introduction -- 2 The Problem -- 3 Our Approach: SPEEDAC -- 3.1 Speculative Pre-computation of Decisions -- 3.2 Utilization of Access Correlations -- 3.3 Perceivable Overhead -- 4 Case Study -- 5 Enforcement Mechanism -- 5.1 Design Space -- 5.2 Design for Effectiveness -- 5.3 Implementation -- 6 Performance Evaluation -- 6.1 Experimental Setup -- 6.2 Perceivable Overhead -- 6.3 File-Correlation Effects -- 7 Related Work -- 8 Conclusion -- References -- Emerging Security Areas -- Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs.
1 Introduction -- 2 Control Flow Graph Transcompilation -- 2.1 Prerequisites -- 2.2 Overview of Our Approach -- 2.3 Contexts -- 2.4 Node Passivation -- 2.5 Jumps and Internal Calls -- 2.6 Routing -- 3 Control Flow Graph Obfuscation -- 3.1 Forcing Execution -- 3.2 Node Hiding -- 3.3 Route Hiding -- 4 Security -- 4.1 Security Against Dynamic Analysis -- 5 Implementation -- 6 Conclusion -- References -- Proof of a Shuffle for Lattice-Based Cryptography -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 2 Preliminaries -- 2.1 Ideal Lattices -- 2.2 RLWE Encryption Scheme -- 2.3 Zero Knowledge Proofs -- 2.4 Pedersen Commitments -- 3 Shuffling Ring-LWE Encryptions -- 3.1 Protocol Overview -- 3.2 Proof of Knowledge of Permutation Matrix -- 3.3 Proof of Knowledge of Small Exponents -- 3.4 Opening the Commitments -- 4 Conclusions -- References -- An Analysis of Bitcoin Laundry Services -- 1 Introduction to Tumblers -- 2 Results -- 2.1 DarkLaunder, Bitlaunder and CoinMixer -- 2.2 Helix -- 2.3 Alphabay -- 3 Conclusions -- References -- Author Index.
Record Nr. UNISA-996466460503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius
Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVIII, 313 p. 77 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Application software
Data mining
Computers and civilization
Computer organization
Systems and Data Security
Cryptology
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computers and Society
Computer Systems Organization and Communication Networks
ISBN 3-319-70290-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Invited Talks -- Homomorphic Authentication for Computing Securely on Untrusted Machines -- Security and Privacy Challenges in Machine Learning -- Proof of Stake Blockchain Protocols -- Contents -- Outsourcing Computations -- A Server-Assisted Hash-Based Signature Scheme -- 1 Introduction -- 2 Related Work -- 3 Our Contribution -- 4 Preliminaries -- 5 Description of the Scheme -- 6 Security Proof -- 7 Practical Considerations -- 8 Conclusions and Outlook -- References -- Outsourcing of Verifiable Attribute-Based Keyword Search -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 3 System Model -- 4 ABKS Outsourcing Scheme -- 4.1 Model of ABKS Outsourcing Scheme -- 4.2 Security Definition of ABKS Outsourcing Scheme -- 4.3 Our ABKS Outsourcing Scheme -- 5 VABKS Outsourcing Scheme -- 5.1 Model of VABKS Outsourcing Scheme -- 5.2 Security Definition of VABKS Outsourcing Scheme -- 5.3 Our VABKS Outsourcing Scheme -- 6 Comparison -- 7 Conclusion -- References -- Privacy Preservation -- Is RCB a Leakage Resilient Authenticated Encryption Scheme? -- 1 Introduction -- 2 Preliminaries and Notions -- 3 General Overview of RCB -- 4 Attacks on RCB -- 4.1 Forgery Attack -- 4.2 Attacks on Misuse Resistance -- 4.3 A Denial-of-Service (DoS) Attack -- 4.4 Attack on Full-Duplex Communication -- 5 Privacy by RCB -- 6 Conclusion -- References -- Practical and Secure Searchable Symmetric Encryption with a Small Index -- 1 Introduction -- 1.1 Backgrounds -- 1.2 Our Contributions -- 1.3 Related Works -- 2 Preliminaries -- 3 Bloom Filter -- 4 Proposed Scheme -- 4.1 Constructing an Encrypted Index -- 4.2 Search Protocol -- 5 Security Analysis -- 6 Experimental Results -- References -- Anonymous Certification for an e-Assessment Framework -- 1 Introduction -- 2 Related Work.
3 Anonymous Certification (AC) Construction -- 3.1 Background -- 3.2 Our Construction -- 4 E-learning Use Case for PCS -- 4.1 TeSLA Architecture -- 4.2 Pseudonymity -- 4.3 Integrating Anonymous Certification to TeSLA -- 5 Implementation and Security Details of PCS -- 5.1 Implementation Details -- 5.2 Security Level Sketch of Our Proposal -- 6 Conclusion -- References -- PARTS -- Privacy-Aware Routing with Transportation Subgraphs -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure -- 2 Related Work -- 3 System Model -- 3.1 Road Network -- 3.2 Users -- 3.3 LBS Provider -- 3.4 Adversary -- 4 Strategies for Privacy-Enhanced Routing -- 4.1 Route Parts -- 4.2 Dummy Traffic -- 4.3 Time Shift Requests -- 5 Adversary's Inference Model -- 5.1 Background Knowledge -- 5.2 Empirically Improved Guessing -- 5.3 Privacy Measurement -- 6 Evaluation -- 6.1 Dataset and Simulator -- 6.2 Experimental Setup -- 6.3 Overhead of Segmented Routes -- 6.4 Privacy Related Results -- 6.5 Performance Analysis -- 7 Discussion -- 8 Conclusion -- References -- Security and Privacy in Machine Learning -- Bayesian Network Models in Cyber Security: A Systematic Review -- 1 Introduction -- 2 Review Methodology -- 3 Analysis of Standard Bayesian Network Models in Cyber Security -- 3.1 Citation Details -- 3.2 Data Sources Used to Construct DAGs and Populate CPTs -- 3.3 The Number of Nodes Used in the Model -- 3.4 Type of Threat Actor -- 3.5 Application and Application Sector -- 3.6 Scope of Variables -- 3.7 The Approach(es) Used to Validate Models -- 3.8 Model Purpose and Type of Purpose -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Improving and Measuring Learning Effectiveness at Cyber Defense Exercises -- 1 Introduction -- 2 Learning Measurement Dimensions in CDX's -- 2.1 5-Timestamp Methodology -- 2.2 Data Collection and Sources -- 3 LS17---Learning Measurement.
3.1 5-Timestamp Methodology Experience -- 3.2 Discussion and Findings from LS17 Learning Measurement -- 4 Related Work in Learning Measurement Context -- 5 Conclusion -- References -- Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data -- 1 Introduction -- 2 Preliminaries -- 2.1 Secure Multiparty Computation -- 2.2 Notation -- 2.3 General FIM Algorithms -- 3 Privacy-Preserving FIM -- 3.1 Algorithms for Privacy Preserving FIM -- 3.2 Comparing Bit Matrix and Set Based Approaches -- 3.3 Combining Dense and Sparse Representations -- 4 Benchmarks -- 5 Conclusion -- References -- Applications -- Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets -- 1 Introduction -- 2 Ceremony Description -- 2.1 Description of Mobilpendlerkort -- 2.2 Building the Inspection Ceremony -- 3 Attack Demonstration -- 3.1 Barcode Analysis -- 3.2 Primary Screen Forgery -- 3.3 Extra Zone Ticket Forgery -- 4 Principles -- 5 Alternative Inspection Ceremony -- 6 Related Work -- 7 Conclusions -- References -- Using the Estonian Electronic Identity Card for Authentication to a Machine -- 1 Introduction -- 2 Card Authentication -- 2.1 Document Expiration and Revocation Checks -- 2.2 Card Impersonation -- 3 Attacks by Malicious Terminals -- 3.1 Compromising the Cardholder's Privacy -- 3.2 Denial-of-Service Attacks -- 3.3 Unauthorized Use of Private Keys -- 4 Design of ID Card Emulator -- 4.1 Card ATR Adjustment -- 4.2 APDU Logging Functionality -- 4.3 Visual Imitation of ID Card -- 5 Card Authentication in Practice -- 6 Discussion: Improvements -- 6.1 Cloning Prevention -- 6.2 Cardholder Verification -- 6.3 Contactless Interface -- 7 Conclusion -- References -- Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure -- 1 Introduction -- 2 Related Work -- 3 Statistical Tests for Ransomware Attacks Detection.
4 Towards a Generic and Practical Ransomware Countermeasure -- 4.1 File System Activity Monitoring -- 4.2 Implementation Design -- 4.3 A Single Indicator of Compromise -- 5 Experiments: Performance Evaluation -- 5.1 Disk Performance -- 5.2 CPU Performance -- 5.3 Discussion -- 6 Experiments: Ransomware Detection -- 6.1 Malware - O - Matic -- 6.2 Experimental Setup -- 6.3 Detection Results -- 6.4 Ransomware-Like Applications -- 7 Conclusions -- References -- A Large-Scale Analysis of Download Portals and Freeware Installers -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Analysis System Overview -- 3.2 Installer Crawling -- 4 Results -- 4.1 Static Properties of the Installers -- 4.2 Dynamic Analysis of Installers -- 4.3 App Managers and Software Updates -- 5 Discussion and Future Work -- 6 Conclusion -- References -- Access Control -- GPASS: A Password Manager with Group-Based Access Control -- 1 Introduction -- 2 Related Work -- 3 Models and Assumptions -- 3.1 System Model -- 3.2 Threat Model -- 3.3 System Goals -- 3.4 Security Goals -- 4 GPASS -- 4.1 Overview -- 4.2 Fundamental Operations -- 5 Security Analysis -- 6 Extended GPASS -- 7 Implementation -- 8 Discussion -- 9 Conclusion -- References -- Towards Accelerated Usage Control Based on Access Correlations -- 1 Introduction -- 2 The Problem -- 3 Our Approach: SPEEDAC -- 3.1 Speculative Pre-computation of Decisions -- 3.2 Utilization of Access Correlations -- 3.3 Perceivable Overhead -- 4 Case Study -- 5 Enforcement Mechanism -- 5.1 Design Space -- 5.2 Design for Effectiveness -- 5.3 Implementation -- 6 Performance Evaluation -- 6.1 Experimental Setup -- 6.2 Perceivable Overhead -- 6.3 File-Correlation Effects -- 7 Related Work -- 8 Conclusion -- References -- Emerging Security Areas -- Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs.
1 Introduction -- 2 Control Flow Graph Transcompilation -- 2.1 Prerequisites -- 2.2 Overview of Our Approach -- 2.3 Contexts -- 2.4 Node Passivation -- 2.5 Jumps and Internal Calls -- 2.6 Routing -- 3 Control Flow Graph Obfuscation -- 3.1 Forcing Execution -- 3.2 Node Hiding -- 3.3 Route Hiding -- 4 Security -- 4.1 Security Against Dynamic Analysis -- 5 Implementation -- 6 Conclusion -- References -- Proof of a Shuffle for Lattice-Based Cryptography -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 2 Preliminaries -- 2.1 Ideal Lattices -- 2.2 RLWE Encryption Scheme -- 2.3 Zero Knowledge Proofs -- 2.4 Pedersen Commitments -- 3 Shuffling Ring-LWE Encryptions -- 3.1 Protocol Overview -- 3.2 Proof of Knowledge of Permutation Matrix -- 3.3 Proof of Knowledge of Small Exponents -- 3.4 Opening the Commitments -- 4 Conclusions -- References -- An Analysis of Bitcoin Laundry Services -- 1 Introduction to Tumblers -- 2 Results -- 2.1 DarkLaunder, Bitlaunder and CoinMixer -- 2.2 Helix -- 2.3 Alphabay -- 3 Conclusions -- References -- Author Index.
Record Nr. UNINA-9910483725903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui