top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Communications and Multimedia Security [[electronic resource] ] : 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings / / edited by Herbert Leitold, Evangelos Markatos
Communications and Multimedia Security [[electronic resource] ] : 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings / / edited by Herbert Leitold, Evangelos Markatos
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 260 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Application software
Electrical engineering
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Communications Engineering, Networks
Soggetto non controllato CMS
Multimedia security
ISBN 3-540-47823-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computing of Trust in Ad-Hoc Networks -- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation -- On the Privacy Risks of Publishing Anonymized IP Network Traces -- Secure Mobile Notifications of Civilians in Case of a Disaster -- A Fair Anonymous Submission and Review System -- Attribute Delegation Based on Ontologies and Context Information -- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains -- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange -- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart -- Perturbing and Protecting a Traceable Block Cipher -- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors -- Timed Release Cryptography from Bilinear Pairings Using Hash Chains -- Compression of Encrypted Visual Data -- Selective Encryption for Hierarchical MPEG -- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods -- A Flexible and Open DRM Framework -- PPINA – A Forensic Investigation Protocol for Privacy Enhancing Technologies -- A Privacy Agent in Context-Aware Ubiquitous Computing Environments -- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems -- Attack Graph Based Evaluation of Network Security -- Information Modeling for Automated Risk Analysis -- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.
Record Nr. UNISA-996466142303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Communications and Multimedia Security : 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings / / edited by Herbert Leitold, Evangelos Markatos
Communications and Multimedia Security : 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings / / edited by Herbert Leitold, Evangelos Markatos
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 260 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Application software
Electrical engineering
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Communications Engineering, Networks
Soggetto non controllato CMS
Multimedia security
ISBN 3-540-47823-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computing of Trust in Ad-Hoc Networks -- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation -- On the Privacy Risks of Publishing Anonymized IP Network Traces -- Secure Mobile Notifications of Civilians in Case of a Disaster -- A Fair Anonymous Submission and Review System -- Attribute Delegation Based on Ontologies and Context Information -- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains -- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange -- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart -- Perturbing and Protecting a Traceable Block Cipher -- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors -- Timed Release Cryptography from Bilinear Pairings Using Hash Chains -- Compression of Encrypted Visual Data -- Selective Encryption for Hierarchical MPEG -- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods -- A Flexible and Open DRM Framework -- PPINA – A Forensic Investigation Protocol for Privacy Enhancing Technologies -- A Privacy Agent in Context-Aware Ubiquitous Computing Environments -- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems -- Attack Graph Based Evaluation of Network Security -- Information Modeling for Automated Risk Analysis -- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.
Record Nr. UNINA-9910483758403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 243 p. 86 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
E-commerce
Computer communication systems
Architecture, Computer
Systems and Data Security
e-Commerce/e-business
Computer Communication Networks
Computer System Implementation
ISBN 3-642-37300-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware Downloaders -- Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications -- ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems -- A Static, Packer-Agnostic Filter to Detect Similar Malware Samples -- Experiments with Malware Visualization -- Tracking Memory Writes for Malware Classification and Code Reuse Identification -- System-Level Support for Intrusion Recovery -- NetGator: Malware Detection Using Program Interactive Challenges -- SmartProxy: Secure Smartphone-Assisted Loginon Compromised Machines -- BISSAM: Automatic Vulnerability Identification of Office Documents -- Self-organized Collaboration of Distributed IDS Sensors -- Shedding Light on Log Correlation in Network Forensics Analysis.
Record Nr. UNISA-996465575003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson
Detection of Intrusions and Malware, and Vulnerability Assessment : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 243 p. 86 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
E-commerce
Computer communication systems
Architecture, Computer
Systems and Data Security
e-Commerce/e-business
Computer Communication Networks
Computer System Implementation
ISBN 3-642-37300-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware Downloaders -- Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications -- ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems -- A Static, Packer-Agnostic Filter to Detect Similar Malware Samples -- Experiments with Malware Visualization -- Tracking Memory Writes for Malware Classification and Code Reuse Identification -- System-Level Support for Intrusion Recovery -- NetGator: Malware Detection Using Program Interactive Challenges -- SmartProxy: Secure Smartphone-Assisted Loginon Compromised Machines -- BISSAM: Automatic Vulnerability Identification of Office Documents -- Self-organized Collaboration of Distributed IDS Sensors -- Shedding Light on Log Correlation in Network Forensics Analysis.
Record Nr. UNINA-9910741165403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
EuroSys '20 : proceedings of the Fifteenth European Conference on Computer Systems / / Angelos Bilas, Kostas Magoutis, Evangelos Markatos
EuroSys '20 : proceedings of the Fifteenth European Conference on Computer Systems / / Angelos Bilas, Kostas Magoutis, Evangelos Markatos
Autore Bilas Angelos
Pubbl/distr/stampa New York, New York : , : Association for Computing Machinery, , 2020
Descrizione fisica 1 online resource (49 pages) : illustrations
Disciplina 004
Soggetto topico Computer systems
Operating systems (Computers)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910412331303321
Bilas Angelos  
New York, New York : , : Association for Computing Machinery, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the Second European Workshop on System Security
Proceedings of the Second European Workshop on System Security
Pubbl/distr/stampa [Place of publication not identified], : Association for Computing Machinery, 2009
Descrizione fisica 1 online resource (57 p.;)
Collana ACM Conferences
Soggetto topico Information Technology - Computer Science (Hardware & Networks)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti EUROSEC '09
Record Nr. UNINA-9910375801803321
[Place of publication not identified], : Association for Computing Machinery, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Trust Management [[electronic resource] ] : 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings / / edited by Gilles Barthe, Evangelos Markatos, Pierangela Samarati
Security and Trust Management [[electronic resource] ] : 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings / / edited by Gilles Barthe, Evangelos Markatos, Pierangela Samarati
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 229 p. 59 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Application software
Computers and civilization
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 3-319-46598-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Personal Security Device -- Privacy Analysis -- Linked Data -- Secure logs -- Information Security -- Security Policies.
Record Nr. UNISA-996465375303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Trust Management : 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings / / edited by Gilles Barthe, Evangelos Markatos, Pierangela Samarati
Security and Trust Management : 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings / / edited by Gilles Barthe, Evangelos Markatos, Pierangela Samarati
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 229 p. 59 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Application software
Computers and civilization
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 3-319-46598-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Personal Security Device -- Privacy Analysis -- Linked Data -- Secure logs -- Information Security -- Security Policies.
Record Nr. UNINA-9910483476903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui