top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data Hiding and Its Applications : Digital Watermarking and Steganography / / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi
Data Hiding and Its Applications : Digital Watermarking and Steganography / / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi
Autore Megías David
Pubbl/distr/stampa Basel : , : MDPI - Multidisciplinary Digital Publishing Institute, , 2022
Descrizione fisica 1 online resource (234 pages)
Disciplina 005.8
Soggetto topico Computer security
Computer security - Management
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Data Hiding and Its Applications
Record Nr. UNINA-9910674393303321
Megías David  
Basel : , : MDPI - Multidisciplinary Digital Publishing Institute, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures / / Wojciech Mazurczyk...[et al.]
Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures / / Wojciech Mazurczyk...[et al.]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2016
Descrizione fisica 1 online resource (325 p.)
Disciplina 005.8
Altri autori (Persone) MazurczykWojciech
WendzelSteffen
ZanderSebastian
HoumansadrAmir
SzczypiorskiKrzysztof
Collana IEEE Press Series on Information and Communication Networks Security
Soggetto topico Computer networks - Security measures
ISBN 1-119-08171-8
1-119-08183-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Series Page; Title Page; Copyright; Dedication; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Chapter 1: Introduction; 1.1 Information Hiding Inspired by Nature; 1.2 Information Hiding Basics; 1.3 Information Hiding Throughout the History1; 1.4 Evolution of Modern Information Hiding; 1.5 Emerging Trends in Information Hiding3; 1.6 Applications of Information Hiding and Recent Use Cases; 1.7 Countermeasures for Information Hiding Techniques; 1.8 Potential Future Trends in Information Hiding; 1.9 Summary; 1.10 Organization of the Book; References
Chapter 2: Background Concepts, Definitions, and Classification2.1 Classification of Information Hiding in Communication Networks; 2.2 Evolution of Information Hiding Terminology; 2.3 Network Steganography: Definitions, Classification and Characteristic Features; 2.4 Traffic Type Obfuscation: Definitions, Classification and Characteristic Features; 2.5 Hidden Communication Model and Communication Scenarios; 2.6 Information Hiding Countermeasures Models; 2.7 Summary; References; Chapter 3: Network Steganography; 3.1 Hiding Information in Protocol Modifications
3.2 Hiding Information in the Timing of Protocol Messages3.3 Hybrid Methods; 3.4 Summary; References; Chapter 4: Control Protocols for Reliable Network Steganography; 4.1 Steganographic Control Protocols; 4.2 Deep Hiding Techniques; 4.3 Control Protocol Engineering; 4.5 Techniques for Timing Methods; 4.6 Attacks on Control Protocols; 4.7 Open Research Challenges for Control Protocols; 4.8 Summary; References; Chapter 5: Traffic Type Obfuscation; 5.1 Preliminaries; 5.2 Classification Based on the Objective; 5.3 Classification Based on the Implementation Domain; 5.4 Countermeasures; 5.5 Summary
7.5 Information Hiding Concepts for Wireless Networks7.6 Multiplayer Games and Virtual Worlds4; 7.7 Social Networks; 7.8 Internet of Things; 7.9 Summary; References; Chapter 8: Network Steganography Countermeasures; 8.1 Overview of Countermeasures; 8.2 Identification and Prevention During Protocol Design; 8.3 Elimination of Covert Channels; 8.4 Limiting the Channel Capacity; 8.5 General Detection Techniques and Metrics; 8.6 Detection Techniques for Covert Channels; 8.7 Future Work; 8.8 Summary; References; Chapter 9: Closing Remarks; Glossary; Index; End User License Agreement
Record Nr. UNINA-9910136810303321
Hoboken, New Jersey : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures / / Wojciech Mazurczyk...[et al.]
Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures / / Wojciech Mazurczyk...[et al.]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2016
Descrizione fisica 1 online resource (325 p.)
Disciplina 005.8
Altri autori (Persone) MazurczykWojciech
WendzelSteffen
ZanderSebastian
HoumansadrAmir
SzczypiorskiKrzysztof
Collana IEEE Press Series on Information and Communication Networks Security
Soggetto topico Computer networks - Security measures
ISBN 1-119-08171-8
1-119-08183-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Series Page; Title Page; Copyright; Dedication; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Chapter 1: Introduction; 1.1 Information Hiding Inspired by Nature; 1.2 Information Hiding Basics; 1.3 Information Hiding Throughout the History1; 1.4 Evolution of Modern Information Hiding; 1.5 Emerging Trends in Information Hiding3; 1.6 Applications of Information Hiding and Recent Use Cases; 1.7 Countermeasures for Information Hiding Techniques; 1.8 Potential Future Trends in Information Hiding; 1.9 Summary; 1.10 Organization of the Book; References
Chapter 2: Background Concepts, Definitions, and Classification2.1 Classification of Information Hiding in Communication Networks; 2.2 Evolution of Information Hiding Terminology; 2.3 Network Steganography: Definitions, Classification and Characteristic Features; 2.4 Traffic Type Obfuscation: Definitions, Classification and Characteristic Features; 2.5 Hidden Communication Model and Communication Scenarios; 2.6 Information Hiding Countermeasures Models; 2.7 Summary; References; Chapter 3: Network Steganography; 3.1 Hiding Information in Protocol Modifications
3.2 Hiding Information in the Timing of Protocol Messages3.3 Hybrid Methods; 3.4 Summary; References; Chapter 4: Control Protocols for Reliable Network Steganography; 4.1 Steganographic Control Protocols; 4.2 Deep Hiding Techniques; 4.3 Control Protocol Engineering; 4.5 Techniques for Timing Methods; 4.6 Attacks on Control Protocols; 4.7 Open Research Challenges for Control Protocols; 4.8 Summary; References; Chapter 5: Traffic Type Obfuscation; 5.1 Preliminaries; 5.2 Classification Based on the Objective; 5.3 Classification Based on the Implementation Domain; 5.4 Countermeasures; 5.5 Summary
7.5 Information Hiding Concepts for Wireless Networks7.6 Multiplayer Games and Virtual Worlds4; 7.7 Social Networks; 7.8 Internet of Things; 7.9 Summary; References; Chapter 8: Network Steganography Countermeasures; 8.1 Overview of Countermeasures; 8.2 Identification and Prevention During Protocol Design; 8.3 Elimination of Covert Channels; 8.4 Limiting the Channel Capacity; 8.5 General Detection Techniques and Metrics; 8.6 Detection Techniques for Covert Channels; 8.7 Future Work; 8.8 Summary; References; Chapter 9: Closing Remarks; Glossary; Index; End User License Agreement
Record Nr. UNINA-9910819813003321
Hoboken, New Jersey : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and System Security [[electronic resource] ] : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
Network and System Security [[electronic resource] ] : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVIII, 762 p. 214 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Software engineering
Application software
Systems and Data Security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Software Engineering
Information Systems Applications (incl. Internet)
ISBN 3-319-64701-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud and IoT Security -- Network Security -- Platform and Hardware Security -- Crypto and Others -- Authentication and Key Management. .
Record Nr. UNINA-9910484446003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and System Security [[electronic resource] ] : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
Network and System Security [[electronic resource] ] : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVIII, 762 p. 214 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Software engineering
Application software
Systems and Data Security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Software Engineering
Information Systems Applications (incl. Internet)
ISBN 3-319-64701-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud and IoT Security -- Network Security -- Platform and Hardware Security -- Crypto and Others -- Authentication and Key Management. .
Record Nr. UNISA-996466456903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Privacy Preserving for IoT and 5G Networks : Techniques, Challenges, and New Directions
Security and Privacy Preserving for IoT and 5G Networks : Techniques, Challenges, and New Directions
Autore Abd El-Latif Ahmed A
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (283 pages)
Altri autori (Persone) Abd-El-AttyBassem
Venegas-AndracaSalvador E
MazurczykWojciech
GuptaBrij B
Collana Studies in Big Data Ser.
Soggetto genere / forma Electronic books.
ISBN 3-030-85428-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910502978403321
Abd El-Latif Ahmed A  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui