top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
29th Biennial Symposium on Communications : Toronto, Ontario, Canada, June 6-7, 2018 / / edited by Ali Miri ; sponsored by Institute of Electrical and Electronics Engineers
29th Biennial Symposium on Communications : Toronto, Ontario, Canada, June 6-7, 2018 / / edited by Ali Miri ; sponsored by Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Descrizione fisica 1 online resource (706 pages)
Disciplina 621.382
Soggetto topico Telecommunication
Wireless communication systems
ISBN 1-5386-5735-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996280101203316
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
29th Biennial Symposium on Communications : Toronto, Ontario, Canada, June 6-7, 2018 / / edited by Ali Miri ; sponsored by Institute of Electrical and Electronics Engineers
29th Biennial Symposium on Communications : Toronto, Ontario, Canada, June 6-7, 2018 / / edited by Ali Miri ; sponsored by Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Descrizione fisica 1 online resource (706 pages)
Disciplina 621.382
Soggetto topico Telecommunication
Wireless communication systems
ISBN 1-5386-5735-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910289359203321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations and Practice of Security [[electronic resource] ] : 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi
Foundations and Practice of Security [[electronic resource] ] : 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 383 p. 90 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Software engineering
Application software
Information technology
Business—Data processing
Management information systems
Computer science
Optical data processing
Software Engineering
Information Systems Applications (incl. Internet)
IT in Business
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-642-37119-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography and Information Theory -- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic Protocols -- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities -- COMPASS: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network Users through the Social Graph -- A Formal Derivation of Composite Trust -- Policies and Applications Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy in the Java Security Manager -- A Novel Obfuscation: Class Hierarchy Flattening -- RESource: A Framework for Online Matching of Assembly with Open Source Code -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone -- Network and Adaptive Security -- Short-Term Linkable Group Signatures with Categorized Batch Verification -- GHUMVEE: Efficient, Effective, and Flexible Replication -- Extracting Attack Scenarios Using Intrusion Semantics -- On Securely Manipulating XML Data -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC -- Short Papers -- Towards Modelling Adaptive Attacker’s Behaviour -- Scalable Deniable Group Key Establishment -- Information-Theoretic Foundations of Differential Privacy.
Record Nr. UNISA-996465615903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Foundations and Practice of Security [[electronic resource] ] : 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi
Foundations and Practice of Security [[electronic resource] ] : 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 383 p. 90 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Software engineering
Application software
Information technology
Business—Data processing
Management information systems
Computer science
Optical data processing
Software Engineering
Information Systems Applications (incl. Internet)
IT in Business
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-642-37119-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography and Information Theory -- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic Protocols -- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities -- COMPASS: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network Users through the Social Graph -- A Formal Derivation of Composite Trust -- Policies and Applications Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy in the Java Security Manager -- A Novel Obfuscation: Class Hierarchy Flattening -- RESource: A Framework for Online Matching of Assembly with Open Source Code -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone -- Network and Adaptive Security -- Short-Term Linkable Group Signatures with Categorized Batch Verification -- GHUMVEE: Efficient, Effective, and Flexible Replication -- Extracting Attack Scenarios Using Intrusion Semantics -- On Securely Manipulating XML Data -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC -- Short Papers -- Towards Modelling Adaptive Attacker’s Behaviour -- Scalable Deniable Group Key Establishment -- Information-Theoretic Foundations of Differential Privacy.
Record Nr. UNINA-9910741162403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected Areas in Cryptography [[electronic resource] ] : 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papers / / edited by Ali Miri, Serge Vaudenay
Selected Areas in Cryptography [[electronic resource] ] : 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papers / / edited by Ali Miri, Serge Vaudenay
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XIII, 431 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computer communication systems
Application software
Optical data processing
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-642-28496-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465963503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers / / Carlisle Adams, Ali Miri, Michael Wiener, editors
Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers / / Carlisle Adams, Ali Miri, Michael Wiener, editors
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (X, 412 p.)
Disciplina 001.5436
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Computer security
ISBN 3-540-77360-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Reduced Complexity Attacks on the Alternating Step Generator -- Extended BDD-Based Cryptanalysis of Keystream Generators -- Two Trivial Attacks on Trivium -- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search -- Cryptanalysis of the CRUSH Hash Function -- Improved Side-Channel Collision Attacks on AES -- Analysis of Countermeasures Against Access Driven Cache Attacks on AES -- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms -- Koblitz Curves and Integer Equivalents of Frobenius Expansions -- Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic -- Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations -- Explicit Formulas for Efficient Multiplication in -- Linear Cryptanalysis of Non Binary Ciphers -- The Delicate Issues of Addition with Respect to XOR Differences -- MRHS Equation Systems -- A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software -- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings -- Cryptanalysis of White Box DES Implementations -- Attacks on the ESA-PSS-04-151 MAC Scheme -- The Security of the Extended Codebook (XCB) Mode of Operation -- A Generic Method to Design Modes of Operation Beyond the Birthday Bound -- Passive–Only Key Recovery Attacks on RC4 -- Permutation After RC4 Key Scheduling Reveals the Secret Key -- Revisiting Correlation-Immunity in Filter Generators -- Distinguishing Attack Against TPypy.
Record Nr. UNINA-9910483643003321
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers / / Carlisle Adams, Ali Miri, Michael Wiener, editors
Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers / / Carlisle Adams, Ali Miri, Michael Wiener, editors
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (X, 412 p.)
Disciplina 001.5436
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Computer security
ISBN 3-540-77360-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Reduced Complexity Attacks on the Alternating Step Generator -- Extended BDD-Based Cryptanalysis of Keystream Generators -- Two Trivial Attacks on Trivium -- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search -- Cryptanalysis of the CRUSH Hash Function -- Improved Side-Channel Collision Attacks on AES -- Analysis of Countermeasures Against Access Driven Cache Attacks on AES -- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms -- Koblitz Curves and Integer Equivalents of Frobenius Expansions -- Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic -- Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations -- Explicit Formulas for Efficient Multiplication in -- Linear Cryptanalysis of Non Binary Ciphers -- The Delicate Issues of Addition with Respect to XOR Differences -- MRHS Equation Systems -- A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software -- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings -- Cryptanalysis of White Box DES Implementations -- Attacks on the ESA-PSS-04-151 MAC Scheme -- The Security of the Extended Codebook (XCB) Mode of Operation -- A Generic Method to Design Modes of Operation Beyond the Birthday Bound -- Passive–Only Key Recovery Attacks on RC4 -- Permutation After RC4 Key Scheduling Reveals the Secret Key -- Revisiting Correlation-Immunity in Filter Generators -- Distinguishing Attack Against TPypy.
Record Nr. UNISA-996465656503316
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless sensor and actor networks II : proceedings of the 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN 08), Ottawa, Ontario, Canada, July 14-15, 2008 / / Miri, Ali
Wireless sensor and actor networks II : proceedings of the 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN 08), Ottawa, Ontario, Canada, July 14-15, 2008 / / Miri, Ali
Autore Engelhardt Wolf von <1910-2008>
Edizione [1st ed. 2008.]
Pubbl/distr/stampa New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (291 p.)
Disciplina 551
Collana Scientific report - Inter-union Commission of Geodynamics ; no. 58
Soggetto topico Wireless communication systems
Sensor networks
ISBN 0-387-09441-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Threat-Aware Clustering in Wireless Sensor Networks -- CES: Cluster-based Energy-efficient Scheme for Mobile Wireless Sensor Networks -- Balancing Overhearing Energy and Latency in Wireless Sensor Networks -- Transmission Power Management for IR-UWB WSN Based on Node Population Density -- Power-On Controller for high lifetime wireless sensor nodes -- Cooperation Mechanism Taxonomy for Wireless Sensor and Actor Networks -- Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks -- Deployment-based Solution for Prolonging Network Lifetime in Sensor Networks -- An Architecture for Multimedia Delivery Over Service Specific Overlay Networks -- A Security Protocol for Wireless Sensor Networks -- HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks -- Designing incentive packet relaying strategies for wireless ad hoc networks with game theory -- Energy Efficient Key Management Protocols to Securely Confirm Intrusion Detection in Wireless Sensor Networks -- Proposal and Evaluation of a Rendezvous-based Adaptive Communication Protocol for Large-scale Wireless Sensor Networks -- A Sensor Network Protocol for Automatic Meter Reading in an Apartment Building -- Monitoring Linear Infrastructures Using Wireless Sensor Networks * -- Non-Custodial Multicast over the DTN-Prophet Protocol -- Improving Mobile and Ad-hoc Networks performance using Group-Based Topologies -- MAC specifications for a WPAN allowing both energy saving and guaranteed delay -- MAC specifications for a WPAN allowing both energy saving and guaranteed delay* -- ERFS: Enhanced RSSI value Filtering Schema for Localization in Wireless Sensor Networks -- Energy-Efficient Location-Independent k-connected Scheme in Wireless Sensor Networks* -- RAS: A Reliable Routing Protocol for Wireless Ad Hoc and Sensor Networks?.
Record Nr. UNINA-9910483860403321
Engelhardt Wolf von <1910-2008>  
New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui