top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security and Privacy [[electronic resource] ] : 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings / / edited by Joseph K. Liu, Hui Cui
Information Security and Privacy [[electronic resource] ] : 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings / / edited by Joseph K. Liu, Hui Cui
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVI, 676 p. 344 illus., 71 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer communication systems
Computer networks - Security measures
Systems and Data Security
Computing Milieux
Information Systems and Communication Service
Computer Communication Networks
Mobile and Network Security
Security Services
ISBN 3-030-55304-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Post-Quantum Cryptography -- Symmetric Cipher -- Signature -- Network Security and Blockchain -- Cryptographic Primitives -- Mathematical Foundation -- Machine Learning Security -- Attack -- Privacy -- Short Papers.
Record Nr. UNISA-996418294303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy : 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings / / edited by Joseph K. Liu, Hui Cui
Information Security and Privacy : 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings / / edited by Joseph K. Liu, Hui Cui
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVI, 676 p. 344 illus., 71 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer communication systems
Computer networks - Security measures
Systems and Data Security
Computing Milieux
Information Systems and Communication Service
Computer Communication Networks
Mobile and Network Security
Security Services
ISBN 3-030-55304-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Post-Quantum Cryptography -- Symmetric Cipher -- Signature -- Network Security and Blockchain -- Cryptographic Primitives -- Mathematical Foundation -- Machine Learning Security -- Attack -- Privacy -- Short Papers.
Record Nr. UNINA-9910416086403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I / / edited by Joseph K. Liu, Ron Steinfeld
Information Security and Privacy [[electronic resource] ] : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I / / edited by Joseph K. Liu, Ron Steinfeld
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVIII, 543 p. 114 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-319-40253-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto National Security Infrastructure -- Social Network Security -- Bitcoin Security -- Statistical Privacy -- Network Security -- Smart City Security -- Digital Forensics -- Lightweight Security -- Secure Batch Processing -- Pseudo Random/One-Way Function -- Cloud Storage Security -- Password/QR Code Security -- Functional Encryption and Attribute-Based Cryptosystem.
Record Nr. UNISA-996466002503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II / / edited by Joseph K. Liu, Ron Steinfeld
Information Security and Privacy [[electronic resource] ] : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II / / edited by Joseph K. Liu, Ron Steinfeld
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVIII, 517 p. 46 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-319-40367-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Signature and Key Management -- Public Key and Identity-Based Encryption -- Searchable Encryption -- Broadcast Encryption -- Mathematical Primitives -- Symmetric Cipher -- Public Key and Identity-Based Encryption -- Biometric Security -- Digital Forensics -- National Security Infrastructure -- Mobile Security -- Network Security -- Pseudo Random/One-Way Function.
Record Nr. UNISA-996465961103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I / / edited by Joseph K. Liu, Ron Steinfeld
Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I / / edited by Joseph K. Liu, Ron Steinfeld
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVIII, 543 p. 114 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-319-40253-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto National Security Infrastructure -- Social Network Security -- Bitcoin Security -- Statistical Privacy -- Network Security -- Smart City Security -- Digital Forensics -- Lightweight Security -- Secure Batch Processing -- Pseudo Random/One-Way Function -- Cloud Storage Security -- Password/QR Code Security -- Functional Encryption and Attribute-Based Cryptosystem.
Record Nr. UNINA-9910483684203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II / / edited by Joseph K. Liu, Ron Steinfeld
Information Security and Privacy : 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II / / edited by Joseph K. Liu, Ron Steinfeld
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVIII, 517 p. 46 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-319-40367-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Signature and Key Management -- Public Key and Identity-Based Encryption -- Searchable Encryption -- Broadcast Encryption -- Mathematical Primitives -- Symmetric Cipher -- Public Key and Identity-Based Encryption -- Biometric Security -- Digital Forensics -- National Security Infrastructure -- Mobile Security -- Network Security -- Pseudo Random/One-Way Function.
Record Nr. UNINA-9910483558903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings / / edited by Joseph K. Liu, Pierangela Samarati
Information Security Practice and Experience [[electronic resource] ] : 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings / / edited by Joseph K. Liu, Pierangela Samarati
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 907 p. 211 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Computer Communication Networks
Cryptology
Computers and Society
Legal Aspects of Computing
ISBN 3-319-72359-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain -- Asymmetric encryption -- Symmetric encryption -- Lattice-based cryptography -- Searchable encryption -- Signature -- Authentication -- Cloud security -- Network security -- Cyber-physical security -- Social network and QR code security -- Software security and trusted computing.-  SocialSec track.
Record Nr. UNISA-996465739703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience : 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings / / edited by Joseph K. Liu, Pierangela Samarati
Information Security Practice and Experience : 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings / / edited by Joseph K. Liu, Pierangela Samarati
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 907 p. 211 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Computer Communication Networks
Cryptology
Computers and Society
Legal Aspects of Computing
ISBN 3-319-72359-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain -- Asymmetric encryption -- Symmetric encryption -- Lattice-based cryptography -- Searchable encryption -- Signature -- Authentication -- Cloud security -- Network security -- Cyber-physical security -- Social network and QR code security -- Software security and trusted computing.-  SocialSec track.
Record Nr. UNINA-9910483318403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and System Security [[electronic resource] ] : 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings / / edited by Joseph K. Liu, Xinyi Huang
Network and System Security [[electronic resource] ] : 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings / / edited by Joseph K. Liu, Xinyi Huang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (xiii, 731 pages) : illustrations
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer organization
Artificial intelligence
Application software
Systems and Data Security
Cryptology
Computer Systems Organization and Communication Networks
Artificial Intelligence
Information Systems Applications (incl. Internet)
ISBN 3-030-36938-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks -- Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation -- Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey -- A Graph Database-based Approach to Analyze Network Log Files -- Full Papers -- A Privacy-Enhancing Framework for Internet of Things Services -- Using Audio Characteristics for Mobile Device Authentication -- Ethereum Analysis via Node Clustering -- Strong Known Related-Key Attacks and the Security of ECDSA -- Threat Assessment of Enterprise Applications via Graphical Modelling -- A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing -- Towards Secure Open Banking Architecture: An Evaluation with OWASP -- OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms -- OVERSCAN: OAuth 2.0 Scanner for Missing Parameters -- LaT-Voting: Traceable Anonymous E-Voting on Blockchain -- Distributed Secure Storage System Based on Blockchain and TPA -- SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique -- A Practical Dynamic Enhanced BFT protocol -- Pre-adjustment Based Anti-collusion Mechanism for Audio Signals -- Detecting Intruders by User File Access Patterns -- Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture -- Privacy Preserving Machine Learning with Limited Information Leakage -- Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained -- Sequential Aggregate MACs with Detecting Functionality Revisited -- A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System -- EEG-based Authentication with Variational Universal Background Model -- An Efficient Vulnerability Detection Model for Ethereum Smart Contracts -- A Comparative Study on Network Traffic Clustering -- Tell Them From Me: an Encrypted Application Profiler -- Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP -- Gnocchi: Multiplexed Payment Channels for Cryptocurrencies -- Difficulty of decentralized structure due to rational user behavior on Blockchain -- A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration -- Cryptanalysis of Raindrop and FBC -- Attribute Based Encryption with Publicly Verifiable Outsourced Decryption -- New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost -- Lattice based verifiably encrypted double authentication preventing Signatures -- Privacy-Preserving Sequential Data Publishing -- A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter -- Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks -- SparkDA: RDD-Based High Performance Data Anonymization Technique for Spark Platform -- Short Papers -- An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol -- Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices -- Privacy-preserving k-means clustering: an application to driving style Recognition -- Derandomized PACE with Mutual Authentication -- A Muti-attributes-based Trust Model of Internet of Vehicle -- Using Sparse Composite Document Vectors to Classify VBA Macros -- A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications.
Record Nr. UNISA-996466200103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Network and System Security : 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings / / edited by Joseph K. Liu, Xinyi Huang
Network and System Security : 13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings / / edited by Joseph K. Liu, Xinyi Huang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (xiii, 731 pages) : illustrations
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer organization
Artificial intelligence
Application software
Systems and Data Security
Cryptology
Computer Systems Organization and Communication Networks
Artificial Intelligence
Information Systems Applications (incl. Internet)
ISBN 3-030-36938-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks -- Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation -- Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey -- A Graph Database-based Approach to Analyze Network Log Files -- Full Papers -- A Privacy-Enhancing Framework for Internet of Things Services -- Using Audio Characteristics for Mobile Device Authentication -- Ethereum Analysis via Node Clustering -- Strong Known Related-Key Attacks and the Security of ECDSA -- Threat Assessment of Enterprise Applications via Graphical Modelling -- A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing -- Towards Secure Open Banking Architecture: An Evaluation with OWASP -- OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms -- OVERSCAN: OAuth 2.0 Scanner for Missing Parameters -- LaT-Voting: Traceable Anonymous E-Voting on Blockchain -- Distributed Secure Storage System Based on Blockchain and TPA -- SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique -- A Practical Dynamic Enhanced BFT protocol -- Pre-adjustment Based Anti-collusion Mechanism for Audio Signals -- Detecting Intruders by User File Access Patterns -- Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture -- Privacy Preserving Machine Learning with Limited Information Leakage -- Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained -- Sequential Aggregate MACs with Detecting Functionality Revisited -- A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System -- EEG-based Authentication with Variational Universal Background Model -- An Efficient Vulnerability Detection Model for Ethereum Smart Contracts -- A Comparative Study on Network Traffic Clustering -- Tell Them From Me: an Encrypted Application Profiler -- Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP -- Gnocchi: Multiplexed Payment Channels for Cryptocurrencies -- Difficulty of decentralized structure due to rational user behavior on Blockchain -- A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration -- Cryptanalysis of Raindrop and FBC -- Attribute Based Encryption with Publicly Verifiable Outsourced Decryption -- New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost -- Lattice based verifiably encrypted double authentication preventing Signatures -- Privacy-Preserving Sequential Data Publishing -- A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter -- Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks -- SparkDA: RDD-Based High Performance Data Anonymization Technique for Spark Platform -- Short Papers -- An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol -- Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices -- Privacy-preserving k-means clustering: an application to driving style Recognition -- Derandomized PACE with Mutual Authentication -- A Muti-attributes-based Trust Model of Internet of Vehicle -- Using Sparse Composite Document Vectors to Classify VBA Macros -- A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications.
Record Nr. UNINA-9910364954703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui