Communications and Multimedia Security [[electronic resource] ] : 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings / / edited by Herbert Leitold, Evangelos Markatos |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XII, 260 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Algorithms Management information systems Computer science Application software Electrical engineering Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Information Systems Applications (incl. Internet) Communications Engineering, Networks |
Soggetto non controllato |
CMS
Multimedia security |
ISBN | 3-540-47823-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Computing of Trust in Ad-Hoc Networks -- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation -- On the Privacy Risks of Publishing Anonymized IP Network Traces -- Secure Mobile Notifications of Civilians in Case of a Disaster -- A Fair Anonymous Submission and Review System -- Attribute Delegation Based on Ontologies and Context Information -- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains -- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange -- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart -- Perturbing and Protecting a Traceable Block Cipher -- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors -- Timed Release Cryptography from Bilinear Pairings Using Hash Chains -- Compression of Encrypted Visual Data -- Selective Encryption for Hierarchical MPEG -- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods -- A Flexible and Open DRM Framework -- PPINA – A Forensic Investigation Protocol for Privacy Enhancing Technologies -- A Privacy Agent in Context-Aware Ubiquitous Computing Environments -- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems -- Attack Graph Based Evaluation of Network Security -- Information Modeling for Automated Risk Analysis -- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. |
Record Nr. | UNISA-996466142303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Communications and Multimedia Security : 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings / / edited by Herbert Leitold, Evangelos Markatos |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XII, 260 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Algorithms Management information systems Computer science Application software Electrical engineering Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Information Systems Applications (incl. Internet) Communications Engineering, Networks |
Soggetto non controllato |
CMS
Multimedia security |
ISBN | 3-540-47823-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Computing of Trust in Ad-Hoc Networks -- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation -- On the Privacy Risks of Publishing Anonymized IP Network Traces -- Secure Mobile Notifications of Civilians in Case of a Disaster -- A Fair Anonymous Submission and Review System -- Attribute Delegation Based on Ontologies and Context Information -- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains -- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange -- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart -- Perturbing and Protecting a Traceable Block Cipher -- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors -- Timed Release Cryptography from Bilinear Pairings Using Hash Chains -- Compression of Encrypted Visual Data -- Selective Encryption for Hierarchical MPEG -- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods -- A Flexible and Open DRM Framework -- PPINA – A Forensic Investigation Protocol for Privacy Enhancing Technologies -- A Privacy Agent in Context-Aware Ubiquitous Computing Environments -- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems -- Attack Graph Based Evaluation of Network Security -- Information Modeling for Automated Risk Analysis -- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. |
Record Nr. | UNINA-9910483758403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 243 p. 86 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
E-commerce Computer communication systems Architecture, Computer Systems and Data Security e-Commerce/e-business Computer Communication Networks Computer System Implementation |
ISBN | 3-642-37300-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware Downloaders -- Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications -- ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems -- A Static, Packer-Agnostic Filter to Detect Similar Malware Samples -- Experiments with Malware Visualization -- Tracking Memory Writes for Malware Classification and Code Reuse Identification -- System-Level Support for Intrusion Recovery -- NetGator: Malware Detection Using Program Interactive Challenges -- SmartProxy: Secure Smartphone-Assisted Loginon Compromised Machines -- BISSAM: Automatic Vulnerability Identification of Office Documents -- Self-organized Collaboration of Distributed IDS Sensors -- Shedding Light on Log Correlation in Network Forensics Analysis. |
Record Nr. | UNISA-996465575003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 243 p. 86 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
E-commerce Computer communication systems Architecture, Computer Systems and Data Security e-Commerce/e-business Computer Communication Networks Computer System Implementation |
ISBN | 3-642-37300-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware Downloaders -- Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications -- ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems -- A Static, Packer-Agnostic Filter to Detect Similar Malware Samples -- Experiments with Malware Visualization -- Tracking Memory Writes for Malware Classification and Code Reuse Identification -- System-Level Support for Intrusion Recovery -- NetGator: Malware Detection Using Program Interactive Challenges -- SmartProxy: Secure Smartphone-Assisted Loginon Compromised Machines -- BISSAM: Automatic Vulnerability Identification of Office Documents -- Self-organized Collaboration of Distributed IDS Sensors -- Shedding Light on Log Correlation in Network Forensics Analysis. |
Record Nr. | UNINA-9910741165403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
EuroSys '20 : proceedings of the Fifteenth European Conference on Computer Systems / / Angelos Bilas, Kostas Magoutis, Evangelos Markatos |
Autore | Bilas Angelos |
Pubbl/distr/stampa | New York, New York : , : Association for Computing Machinery, , 2020 |
Descrizione fisica | 1 online resource (49 pages) : illustrations |
Disciplina | 004 |
Soggetto topico |
Computer systems
Operating systems (Computers) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910412331303321 |
Bilas Angelos
![]() |
||
New York, New York : , : Association for Computing Machinery, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the Second European Workshop on System Security |
Pubbl/distr/stampa | [Place of publication not identified], : Association for Computing Machinery, 2009 |
Descrizione fisica | 1 online resource (57 p.;) |
Collana | ACM Conferences |
Soggetto topico | Information Technology - Computer Science (Hardware & Networks) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | EUROSEC '09 |
Record Nr. | UNINA-9910375801803321 |
[Place of publication not identified], : Association for Computing Machinery, 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Trust Management [[electronic resource] ] : 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings / / edited by Gilles Barthe, Evangelos Markatos, Pierangela Samarati |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (X, 229 p. 59 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Application software Computers and civilization Systems and Data Security Management of Computing and Information Systems Cryptology Information Systems Applications (incl. Internet) Computers and Society |
ISBN | 3-319-46598-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Personal Security Device -- Privacy Analysis -- Linked Data -- Secure logs -- Information Security -- Security Policies. |
Record Nr. | UNISA-996465375303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Trust Management : 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings / / edited by Gilles Barthe, Evangelos Markatos, Pierangela Samarati |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (X, 229 p. 59 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Application software Computers and civilization Systems and Data Security Management of Computing and Information Systems Cryptology Information Systems Applications (incl. Internet) Computers and Society |
ISBN | 3-319-46598-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Personal Security Device -- Privacy Analysis -- Linked Data -- Secure logs -- Information Security -- Security Policies. |
Record Nr. | UNINA-9910483476903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|