29th Biennial Symposium on Communications : Toronto, Ontario, Canada, June 6-7, 2018 / / edited by Ali Miri ; sponsored by Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018 |
Descrizione fisica | 1 online resource (706 pages) |
Disciplina | 621.382 |
Soggetto topico |
Telecommunication
Wireless communication systems |
ISBN | 1-5386-5735-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996280101203316 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
29th Biennial Symposium on Communications : Toronto, Ontario, Canada, June 6-7, 2018 / / edited by Ali Miri ; sponsored by Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018 |
Descrizione fisica | 1 online resource (706 pages) |
Disciplina | 621.382 |
Soggetto topico |
Telecommunication
Wireless communication systems |
ISBN | 1-5386-5735-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910289359203321 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Foundations and Practice of Security [[electronic resource] ] : 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XIV, 383 p. 90 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Software engineering
Application software Information technology Business—Data processing Management information systems Computer science Optical data processing Software Engineering Information Systems Applications (incl. Internet) IT in Business Computer Appl. in Administrative Data Processing Management of Computing and Information Systems Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-642-37119-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptography and Information Theory -- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic Protocols -- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities -- COMPASS: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network Users through the Social Graph -- A Formal Derivation of Composite Trust -- Policies and Applications Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy in the Java Security Manager -- A Novel Obfuscation: Class Hierarchy Flattening -- RESource: A Framework for Online Matching of Assembly with Open Source Code -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone -- Network and Adaptive Security -- Short-Term Linkable Group Signatures with Categorized Batch Verification -- GHUMVEE: Efficient, Effective, and Flexible Replication -- Extracting Attack Scenarios Using Intrusion Semantics -- On Securely Manipulating XML Data -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC -- Short Papers -- Towards Modelling Adaptive Attacker’s Behaviour -- Scalable Deniable Group Key Establishment -- Information-Theoretic Foundations of Differential Privacy. |
Record Nr. | UNISA-996465615903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Foundations and Practice of Security : 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XIV, 383 p. 90 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Software engineering
Application software Information technology Business—Data processing Management information systems Computer science Optical data processing Software Engineering Information Systems Applications (incl. Internet) IT in Business Computer Appl. in Administrative Data Processing Management of Computing and Information Systems Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-642-37119-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptography and Information Theory -- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic Protocols -- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities -- COMPASS: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network Users through the Social Graph -- A Formal Derivation of Composite Trust -- Policies and Applications Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy in the Java Security Manager -- A Novel Obfuscation: Class Hierarchy Flattening -- RESource: A Framework for Online Matching of Assembly with Open Source Code -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone -- Network and Adaptive Security -- Short-Term Linkable Group Signatures with Categorized Batch Verification -- GHUMVEE: Efficient, Effective, and Flexible Replication -- Extracting Attack Scenarios Using Intrusion Semantics -- On Securely Manipulating XML Data -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC -- Short Papers -- Towards Modelling Adaptive Attacker’s Behaviour -- Scalable Deniable Group Key Establishment -- Information-Theoretic Foundations of Differential Privacy. |
Record Nr. | UNINA-9910741162403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Selected Areas in Cryptography [[electronic resource] ] : 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papers / / edited by Ali Miri, Serge Vaudenay |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XIII, 431 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Algorithms Computer communication systems Application software Optical data processing Cryptology Systems and Data Security Algorithm Analysis and Problem Complexity Computer Communication Networks Information Systems Applications (incl. Internet) Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-642-28496-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465963503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers / / Carlisle Adams, Ali Miri, Michael Wiener, editors |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (X, 412 p.) |
Disciplina | 001.5436 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Computer security |
ISBN | 3-540-77360-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Reduced Complexity Attacks on the Alternating Step Generator -- Extended BDD-Based Cryptanalysis of Keystream Generators -- Two Trivial Attacks on Trivium -- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search -- Cryptanalysis of the CRUSH Hash Function -- Improved Side-Channel Collision Attacks on AES -- Analysis of Countermeasures Against Access Driven Cache Attacks on AES -- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms -- Koblitz Curves and Integer Equivalents of Frobenius Expansions -- Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic -- Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations -- Explicit Formulas for Efficient Multiplication in -- Linear Cryptanalysis of Non Binary Ciphers -- The Delicate Issues of Addition with Respect to XOR Differences -- MRHS Equation Systems -- A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software -- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings -- Cryptanalysis of White Box DES Implementations -- Attacks on the ESA-PSS-04-151 MAC Scheme -- The Security of the Extended Codebook (XCB) Mode of Operation -- A Generic Method to Design Modes of Operation Beyond the Birthday Bound -- Passive–Only Key Recovery Attacks on RC4 -- Permutation After RC4 Key Scheduling Reveals the Secret Key -- Revisiting Correlation-Immunity in Filter Generators -- Distinguishing Attack Against TPypy. |
Record Nr. | UNINA-9910483643003321 |
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers / / Carlisle Adams, Ali Miri, Michael Wiener, editors |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (X, 412 p.) |
Disciplina | 001.5436 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Computer security |
ISBN | 3-540-77360-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Reduced Complexity Attacks on the Alternating Step Generator -- Extended BDD-Based Cryptanalysis of Keystream Generators -- Two Trivial Attacks on Trivium -- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search -- Cryptanalysis of the CRUSH Hash Function -- Improved Side-Channel Collision Attacks on AES -- Analysis of Countermeasures Against Access Driven Cache Attacks on AES -- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms -- Koblitz Curves and Integer Equivalents of Frobenius Expansions -- Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic -- Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations -- Explicit Formulas for Efficient Multiplication in -- Linear Cryptanalysis of Non Binary Ciphers -- The Delicate Issues of Addition with Respect to XOR Differences -- MRHS Equation Systems -- A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software -- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings -- Cryptanalysis of White Box DES Implementations -- Attacks on the ESA-PSS-04-151 MAC Scheme -- The Security of the Extended Codebook (XCB) Mode of Operation -- A Generic Method to Design Modes of Operation Beyond the Birthday Bound -- Passive–Only Key Recovery Attacks on RC4 -- Permutation After RC4 Key Scheduling Reveals the Secret Key -- Revisiting Correlation-Immunity in Filter Generators -- Distinguishing Attack Against TPypy. |
Record Nr. | UNISA-996465656503316 |
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Wireless sensor and actor networks II : proceedings of the 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN 08), Ottawa, Ontario, Canada, July 14-15, 2008 / / Miri, Ali |
Autore | Engelhardt Wolf von <1910-2008> |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (291 p.) |
Disciplina | 551 |
Collana | Scientific report - Inter-union Commission of Geodynamics ; no. 58 |
Soggetto topico |
Wireless communication systems
Sensor networks |
ISBN | 0-387-09441-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Threat-Aware Clustering in Wireless Sensor Networks -- CES: Cluster-based Energy-efficient Scheme for Mobile Wireless Sensor Networks -- Balancing Overhearing Energy and Latency in Wireless Sensor Networks -- Transmission Power Management for IR-UWB WSN Based on Node Population Density -- Power-On Controller for high lifetime wireless sensor nodes -- Cooperation Mechanism Taxonomy for Wireless Sensor and Actor Networks -- Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks -- Deployment-based Solution for Prolonging Network Lifetime in Sensor Networks -- An Architecture for Multimedia Delivery Over Service Specific Overlay Networks -- A Security Protocol for Wireless Sensor Networks -- HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks -- Designing incentive packet relaying strategies for wireless ad hoc networks with game theory -- Energy Efficient Key Management Protocols to Securely Confirm Intrusion Detection in Wireless Sensor Networks -- Proposal and Evaluation of a Rendezvous-based Adaptive Communication Protocol for Large-scale Wireless Sensor Networks -- A Sensor Network Protocol for Automatic Meter Reading in an Apartment Building -- Monitoring Linear Infrastructures Using Wireless Sensor Networks * -- Non-Custodial Multicast over the DTN-Prophet Protocol -- Improving Mobile and Ad-hoc Networks performance using Group-Based Topologies -- MAC specifications for a WPAN allowing both energy saving and guaranteed delay -- MAC specifications for a WPAN allowing both energy saving and guaranteed delay* -- ERFS: Enhanced RSSI value Filtering Schema for Localization in Wireless Sensor Networks -- Energy-Efficient Location-Independent k-connected Scheme in Wireless Sensor Networks* -- RAS: A Reliable Routing Protocol for Wireless Ad Hoc and Sensor Networks?. |
Record Nr. | UNINA-9910483860403321 |
Engelhardt Wolf von <1910-2008> | ||
New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|