Information and Communications Security [[electronic resource] ] : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings / / edited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XVI, 689 p. 168 illus.) |
Disciplina | 343.0999 |
Collana | Security and Cryptology |
Soggetto topico |
Data structures (Computer science)
Computer communication systems Computers Law and legislation Computers and civilization Computer security Software engineering Data Structures and Information Theory Computer Communication Networks Legal Aspects of Computing Computers and Society Systems and Data Security Software Engineering |
ISBN | 3-319-89500-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security. |
Record Nr. | UNISA-996465597303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings / / edited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XVI, 689 p. 168 illus.) |
Disciplina | 343.0999 |
Collana | Security and Cryptology |
Soggetto topico |
Data structures (Computer science)
Computer communication systems Computers Law and legislation Computers and civilization Computer security Software engineering Data Structures and Information Theory Computer Communication Networks Legal Aspects of Computing Computers and Society Systems and Data Security Software Engineering |
ISBN | 3-319-89500-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security. |
Record Nr. | UNINA-9910349423703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information and communications security : 11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings / / Sihan Qing, Chris J. Mitchell, Guilin Wang (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg, : Springer-Verlag, c2009 |
Descrizione fisica | 1 online resource (XIV, 504 p.) |
Disciplina | 004n/a |
Altri autori (Persone) |
QingSihan
MitchellChris WangGuilin, Dr. |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Computer security
Telecommunication systems - Security measures |
ISBN |
1-280-38340-2
9786613561329 3-642-11145-9 |
Classificazione |
DAT 461f
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- How to Steal a Botnet and What Can Happen When You Do -- A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing -- Cryptanalysis -- Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform -- Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher -- Algorithms and Implementations -- The rakaposhi Stream Cipher -- Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes -- Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems -- Public Key Cryptography -- Online/Offline Ring Signature Scheme -- Policy-Controlled Signatures -- Public Key Encryption without Random Oracle Made Truly Practical -- A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate -- Security Applications -- Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks -- Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains -- Biometric-Based Non-transferable Anonymous Credentials -- Software Security -- Secure Remote Execution of Sequential Computations -- Architecture- and OS-Independent Binary-Level Dynamic Test Generation -- System Security -- Measuring Information Flow in Reactive Processes -- Trusted Isolation Environment: An Attestation Architecture with Usage Control Model -- Denial-of-Service Attacks on Host-Based Generic Unpackers -- Network Security -- Predictive Pattern Matching for Scalable Network Intrusion Detection -- Deterministic Finite Automata Characterization for Memory-Based Pattern Matching -- A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold -- User-Assisted Host-Based Detection of Outbound Malware Traffic -- Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence -- Short Papers I -- Using the (Open) Solaris Service Management Facility as a Building Block for System Security -- IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program -- A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper] -- Database Security -- Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining -- GUC-Secure Join Operator in Distributed Relational Database -- Trust Management -- TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics -- Bring Efficient Connotation Expressible Policies to Trust Management -- A User Trust-Based Collaborative Filtering Recommendation Algorithm -- Applied Cryptography -- Fingerprinting Attack on the Tor Anonymity System -- Proactive Verifiable Linear Integer Secret Sharing Scheme -- A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach -- Digital Audio Watermarking Technique Using Pseudo-Zernike Moments -- Short Papers II -- An Image Sanitizing Scheme Using Digital Watermarking -- Adaptive and Composable Oblivious Transfer Protocols (Short Paper) -- Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. |
Altri titoli varianti | ICICS 2009 |
Record Nr. | UNINA-9910483214003321 |
Berlin ; ; Heidelberg, : Springer-Verlag, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Public Key Infrastructures, Services and Applications [[electronic resource] ] : 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Sabrina De Capitani di Vimercati, Chris Mitchell |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 195 p. 30 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Computer security Computer Communication Networks Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Systems and Data Security |
ISBN | 3-642-40012-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptographic Schemas and Protocols -- Efficient Public Key Encryption Admitting Decryption by Sender -- Public Key Infrastructure -- How to Avoid the Breakdown of Public Key Infrastructures Forward Secure Signatures for Certificate Authorities -- Personal PKI for the Smart Device Era -- The Notary Based PKI -- Wireless Authentication and Revocation How to Bootstrap Trust Among Devices in Wireless Environments via EAP-STLS -- Anonymity Revocation through Standard Infrastructures. |
Record Nr. | UNISA-996465954403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Public Key Infrastructures, Services and Applications : 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Sabrina De Capitani di Vimercati, Chris Mitchell |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 195 p. 30 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Computer security Computer Communication Networks Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Systems and Data Security |
ISBN | 3-642-40012-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptographic Schemas and Protocols -- Efficient Public Key Encryption Admitting Decryption by Sender -- Public Key Infrastructure -- How to Avoid the Breakdown of Public Key Infrastructures Forward Secure Signatures for Certificate Authorities -- Personal PKI for the Smart Device Era -- The Notary Based PKI -- Wireless Authentication and Revocation How to Bootstrap Trust Among Devices in Wireless Environments via EAP-STLS -- Anonymity Revocation through Standard Infrastructures. |
Record Nr. | UNINA-9910483163603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Quantitative methods for business and management / / Stuart Wall, Claire Coday, Chris Mitchell |
Autore | Wall Stuart <1946-> |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Harlow, England : , : Pearson Education Limited, , [2014] |
Descrizione fisica | 1 online resource (360 pages) : illustrations (some color) |
Disciplina | 658.5 |
Collana | Always Learning |
Soggetto topico |
Industrial management - Statistical methods
Commercial statistics |
ISBN |
9780273770619
0-273-77061-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright -- Contents -- Part One Introduction stage of product life cycle -- Chapter 1 Collecting and presenting data -- Introduction -- Collection of data -- Presenting data using frequency tables -- Presenting data using bar charts and pie charts -- Presenting data using histograms -- Presenting data using frequency polygons and frequency curves -- Presenting data using the Lorenz curve -- Review questions -- Chapter 2 Making sense of data: Central location and dispersion -- Introduction -- Notation -- Measures of central location -- Normal and skewed distribution -- Measures of dispersion -- Coefficient of variation (C of V) -- Review questions -- Chapter 3 Financial decision making: Project appraisal -- Introduction -- Investment and financial decision making -- Interest rates and project appraisal -- Compound factors, discounting and present value -- Cash flow and financial decision making -- Investment appraisal: non-discounting techniques -- Investment appraisal: discounting techniques -- Review questions -- Part Two Growth stage of product life cycle? -- Chapter 4 Regression, correlation and time series -- Introduction -- Regression analysis -- Correlation -- Spearman's coefficient of rank correlation -- Time series and forecasting -- Review questions -- Chapter 5 Probability and probability distributions -- Introduction -- Probability calculations -- Venn diagrams: events not mutually exclusive -- Independent events: AND rule -- Dependent events: conditional probability -- Game theory and expected value -- The normal distribution -- The binomial distribution -- The Poisson distribution -- Review questions -- Chapter 6 Sampling and tests of hypotheses -- Introduction -- Types of sample -- Distribution of sample means -- Confidence intervals -- Tests of hypotheses: principles and practice -- Student t-distribution.
Chi-squared test -- Review questions -- Part Three Maturity stage of product life cycle? -- Chapter 7 Business modelling: Linear relationships -- Introduction -- Break-even analysis -- Linear programming -- Solving the linear programme: maximisation -- Solving the linear programme: minimisation -- Review questions -- Chapter 8 Business modelling: Non-linear relationships -- Introduction -- Differentiation -- Turning points -- Rules of differentiation -- Applications of differentiation -- Partial differentiation -- Integration -- Review questions -- Chapter 9 Project management -- Introduction -- Defining projects -- Planning a project -- Network diagrams -- Critical path analysis -- Gantt charts -- Taking account of uncertainty: PERT -- Project costs and crashing -- Review questions -- Appendix 1 Review of basic mathematics -- Introduction -- Whole numbers, fractions and decimals -- Rounding off -- Percentages and ratios -- Powers and roots -- Simple algebra -- Solving equations -- Simultaneous equations -- Inequalities -- Graphs and functions -- Progressions -- Review questions -- Appendix 2 Probabilities for the normal distribution -- Appendix 3 Cumulative binomial probabilities -- Appendix 4 Cumulative Poisson probabilities -- Appendix 5 Student t critical values -- Appendix 6 x2 critical values -- Appendix 7 Table of random numbers -- Index. |
Record Nr. | UNINA-9910151655403321 |
Wall Stuart <1946-> | ||
Harlow, England : , : Pearson Education Limited, , [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Trust Management [[electronic resource] ] : 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017, Proceedings / / edited by Giovanni Livraga, Chris Mitchell |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 235 p. 66 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Application software Software engineering Computer communication systems Computers Systems and Data Security Information Systems Applications (incl. Internet) Software Engineering Computer Communication Networks Computing Milieux |
ISBN | 3-319-68063-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptosystems and Applied Cryptography -- Software Security and Risk Management -- Authorization -- Security Vulnerabilities and Protocols -- Secure Systems. |
Record Nr. | UNISA-996465545503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Trust Management : 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017, Proceedings / / edited by Giovanni Livraga, Chris Mitchell |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 235 p. 66 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Application software Software engineering Computer communication systems Computers Systems and Data Security Information Systems Applications (incl. Internet) Software Engineering Computer Communication Networks Computing Milieux |
ISBN | 3-319-68063-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptosystems and Applied Cryptography -- Software Security and Risk Management -- Authorization -- Security Vulnerabilities and Protocols -- Secure Systems. |
Record Nr. | UNINA-9910483711503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security standardisation research : 6th international conference, SSR 2020, London, UK, November 30 - December 1, 2020 : proceedings / / Thyla van der Merwe, Chris Mitchell and Maryam Mehrnezhad (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (IX, 169 p. 21 illus., 5 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Application software |
ISBN | 3-030-64357-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On the Memory Fault Resilience of TLS 1.3 -- On Internal Re-keying -- A Systematic Appraisal of Side Channel Evaluation Strategies -- Taming the many EdDSAs -- SoK: Comparison of the Security of Real World RSA Hash-and-Sign Signatures -- The Vacuity of the Open Source Security Testing Methodology Manual -- Vision: A Critique of Immunity Passports and W3C Decentralized Identifiers. |
Record Nr. | UNISA-996418215303316 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security standardisation research : 6th international conference, SSR 2020, London, UK, November 30 - December 1, 2020 : proceedings / / Thyla van der Merwe, Chris Mitchell and Maryam Mehrnezhad (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (IX, 169 p. 21 illus., 5 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Application software |
ISBN | 3-030-64357-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On the Memory Fault Resilience of TLS 1.3 -- On Internal Re-keying -- A Systematic Appraisal of Side Channel Evaluation Strategies -- Taming the many EdDSAs -- SoK: Comparison of the Security of Real World RSA Hash-and-Sign Signatures -- The Vacuity of the Open Source Security Testing Methodology Manual -- Vision: A Critique of Immunity Passports and W3C Decentralized Identifiers. |
Record Nr. | UNINA-9910427667703321 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|