CCS '05 : proceedings of the 12th ACM Conference on Computer and Communications Security : November 7-11, 2005, Alexandria, Virginia, USA |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2005 |
Descrizione fisica | 1 online resource (410 pages) |
Collana | ACM Conferences |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Computer and Communications Security '05 : proceedings of the 12th Association for Computing Machinery Conference on Computer and Communications Security : November 7-11, 2005, Alexandria, Virginia, United States of America
Proceedings of the 12th ACM Conference on Computer and Communications Security CCS '05 12th ACM Conference on Computer and Communications Security 2005, Alexandria, VA, USA - November 07 - 10, 2005 |
Record Nr. | UNINA-9910375920303321 |
[Place of publication not identified], : ACM, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 |
Descrizione fisica | 1 online resource (X, 382 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Management information systems Computer science Computer communication systems Cryptology Operating Systems Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-540-49784-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fixed vs. variable-length patterns for detecting suspicious process behavior -- A tool for pro-active defense against the buffer overrun attack -- A kernelized architecture for multilevel secure application policies -- Dealing with multi-policy security in large open distributed systems -- A flexible method for information system security policy specification -- On the security of some variants of the RSA signature scheme -- Side channel cryptanalysis of product ciphers -- On the security of digital tachographs -- An authorization model and its formal semantics -- Authorization in CORBA security -- Rules for designing multilevel Object-Oriented Databases -- Byte code verification for Java smart cards based on model checking -- Towards formalizing the Java security architecture of JDK 1.2 -- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets -- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video -- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system -- The “ticket” concept for copy control based on embedded signalling -- Panel session: Watermarking -- Authentication and payment in future mobile systems -- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks -- A mix-mediated anonymity service and its payment -- A subjective metric of authentication -- A sound logic for analysing electronic commerce protocols -- Kerberos Version IV: Inductive analysis of the secrecy goals. |
Record Nr. | UNISA-996466151003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 |
Descrizione fisica | 1 online resource (X, 382 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Management information systems Computer science Computer communication systems Cryptology Operating Systems Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-540-49784-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fixed vs. variable-length patterns for detecting suspicious process behavior -- A tool for pro-active defense against the buffer overrun attack -- A kernelized architecture for multilevel secure application policies -- Dealing with multi-policy security in large open distributed systems -- A flexible method for information system security policy specification -- On the security of some variants of the RSA signature scheme -- Side channel cryptanalysis of product ciphers -- On the security of digital tachographs -- An authorization model and its formal semantics -- Authorization in CORBA security -- Rules for designing multilevel Object-Oriented Databases -- Byte code verification for Java smart cards based on model checking -- Towards formalizing the Java security architecture of JDK 1.2 -- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets -- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video -- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system -- The “ticket” concept for copy control based on embedded signalling -- Panel session: Watermarking -- Authentication and payment in future mobile systems -- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks -- A mix-mediated anonymity service and its payment -- A subjective metric of authentication -- A sound logic for analysing electronic commerce protocols -- Kerberos Version IV: Inductive analysis of the secrecy goals. |
Record Nr. | UNINA-9910768472703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security – ESORICS 2016 [[electronic resource] ] : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I / / edited by Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIX, 623 p. 153 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society |
ISBN | 3-319-45744-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security and privacy -- Data protection -- Systems security -- Network security -- Access control.-Authentication -- Security in such emerging areas -- Cloud computing -- Cyber-physical systems -- The Internet of Things. |
Record Nr. | UNISA-996466270903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security – ESORICS 2016 [[electronic resource] ] : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II / / edited by Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIX, 609 p. 117 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society |
ISBN | 3-319-45741-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security and privacy -- Data protection -- Systems security -- Network security -- Access control.-Authentication -- Security in such emerging areas -- Cloud computing -- Cyber-physical systems -- The Internet of Things. |
Record Nr. | UNISA-996466270303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II / / edited by Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIX, 609 p. 117 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society |
ISBN | 3-319-45741-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security and privacy -- Data protection -- Systems security -- Network security -- Access control.-Authentication -- Security in such emerging areas -- Cloud computing -- Cyber-physical systems -- The Internet of Things. |
Record Nr. | UNINA-9910484331703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I / / edited by Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIX, 623 p. 153 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society |
ISBN | 3-319-45744-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security and privacy -- Data protection -- Systems security -- Network security -- Access control.-Authentication -- Security in such emerging areas -- Cloud computing -- Cyber-physical systems -- The Internet of Things. |
Record Nr. | UNINA-9910484331603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 2005 Workshop on Issues in the Theory of Security |
Autore | Meadows Catherine |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2005 |
Descrizione fisica | 1 online resource (90 pages) |
Collana | ACM Conferences |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | WITS '05 Workshop on Issues in the Theory of Security 2005 (co-located with POPL 2005 Conference), Long Beach, CA, USA - January 10 - 11, 2005 |
Record Nr. | UNINA-9910375912503321 |
Meadows Catherine | ||
[Place of publication not identified], : ACM, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|