top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security - ESORICS 2004 [[electronic resource] ] : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
Computer Security - ESORICS 2004 [[electronic resource] ] : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (X, 457 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Database management
Computers and civilization
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Database Management
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-30108-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Incorporating Dynamic Constraints in the Flexible Authorization Framework -- Access-Condition-Table-Driven Access Control for XML Databases -- An Algebra for Composing Enterprise Privacy Policies -- Deriving, Attacking and Defending the GDOI Protocol -- Better Privacy for Trusted Computing Platforms -- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol -- A Formalization of Anonymity and Onion Routing -- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics -- Comparison Between Two Practical Mix Designs -- Signature Bouquets: Immutability for Aggregated/Condensed Signatures -- Towards a Theory of Data Entanglement -- Portable and Flexible Document Access Control Mechanisms -- Possibilistic Information Flow Control in the Presence of Encrypted Communication -- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage -- Security Property Based Administrative Controls -- A Vector Model of Trust for Developing Trustworthy Systems -- Parameterized Authentication -- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks -- Hindering Eavesdropping via IPv6 Opportunistic Encryption -- On the Role of Key Schedules in Attacks on Iterated Ciphers -- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts -- A Host Intrusion Prevention System for Windows Operating Systems -- Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table -- ARCHERR: Runtime Environment Driven Program Safety -- Sets, Bags, and Rock and Roll -- Redundancy and Diversity in Security -- Discovering Novel Attack Strategies from INFOSEC Alerts.
Record Nr. UNISA-996465392303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2004 [[electronic resource] ] : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
Computer Security - ESORICS 2004 [[electronic resource] ] : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (X, 457 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Database management
Computers and civilization
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Database Management
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-30108-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Incorporating Dynamic Constraints in the Flexible Authorization Framework -- Access-Condition-Table-Driven Access Control for XML Databases -- An Algebra for Composing Enterprise Privacy Policies -- Deriving, Attacking and Defending the GDOI Protocol -- Better Privacy for Trusted Computing Platforms -- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol -- A Formalization of Anonymity and Onion Routing -- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics -- Comparison Between Two Practical Mix Designs -- Signature Bouquets: Immutability for Aggregated/Condensed Signatures -- Towards a Theory of Data Entanglement -- Portable and Flexible Document Access Control Mechanisms -- Possibilistic Information Flow Control in the Presence of Encrypted Communication -- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage -- Security Property Based Administrative Controls -- A Vector Model of Trust for Developing Trustworthy Systems -- Parameterized Authentication -- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks -- Hindering Eavesdropping via IPv6 Opportunistic Encryption -- On the Role of Key Schedules in Attacks on Iterated Ciphers -- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts -- A Host Intrusion Prevention System for Windows Operating Systems -- Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table -- ARCHERR: Runtime Environment Driven Program Safety -- Sets, Bags, and Rock and Roll -- Redundancy and Diversity in Security -- Discovering Novel Attack Strategies from INFOSEC Alerts.
Record Nr. UNINA-9910768178503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and System Security [[electronic resource] ] : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
Network and System Security [[electronic resource] ] : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVIII, 762 p. 214 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Software engineering
Application software
Systems and Data Security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Software Engineering
Information Systems Applications (incl. Internet)
ISBN 3-319-64701-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud and IoT Security -- Network Security -- Platform and Hardware Security -- Crypto and Others -- Authentication and Key Management. .
Record Nr. UNINA-9910484446003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and System Security [[electronic resource] ] : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
Network and System Security [[electronic resource] ] : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVIII, 762 p. 214 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Software engineering
Application software
Systems and Data Security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Software Engineering
Information Systems Applications (incl. Internet)
ISBN 3-319-64701-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud and IoT Security -- Network Security -- Platform and Hardware Security -- Crypto and Others -- Authentication and Key Management. .
Record Nr. UNISA-996466456903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Privacy in Ad-hoc and Sensor Networks [[electronic resource] ] : Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers / / edited by Refik Molva, Gene Tsudik, Dirk Westhoff
Security and Privacy in Ad-hoc and Sensor Networks [[electronic resource] ] : Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers / / edited by Refik Molva, Gene Tsudik, Dirk Westhoff
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (VIII, 219 p.)
Disciplina 005.8
Collana Computer Communication Networks and Telecommunications
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Application software
Electrical engineering
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Communications Engineering, Networks
ISBN 3-540-31615-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Efficient Verifiable Ring Encryption for Ad Hoc Groups -- SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations -- Remote Software-Based Attestation for Wireless Sensors -- Spontaneous Cooperation in Multi-domain Sensor Networks -- Authenticated Queries in Sensor Networks -- Improving Sensor Network Security with Information Quality -- One-Time Sensors: A Novel Concept to Mitigate Node-Capture Attacks -- Randomized Grid Based Scheme for Wireless Sensor Network -- Influence of Falsified Position Data on Geographic Ad-Hoc Routing -- Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks -- Statistical Wormhole Detection in Sensor Networks -- RFID System with Fairness Within the Framework of Security and Privacy -- Scalable and Flexible Privacy Protection Scheme for RFID Systems -- RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks -- Location Privacy in Bluetooth -- An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices -- Side Channel Attacks on Message Authentication Codes.
Record Nr. UNISA-996465571303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Privacy in Ad-hoc and Sensor Networks [[electronic resource] ] : Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers / / edited by Refik Molva, Gene Tsudik, Dirk Westhoff
Security and Privacy in Ad-hoc and Sensor Networks [[electronic resource] ] : Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers / / edited by Refik Molva, Gene Tsudik, Dirk Westhoff
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (VIII, 219 p.)
Disciplina 005.8
Collana Computer Communication Networks and Telecommunications
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Application software
Electrical engineering
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Communications Engineering, Networks
ISBN 3-540-31615-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Efficient Verifiable Ring Encryption for Ad Hoc Groups -- SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations -- Remote Software-Based Attestation for Wireless Sensors -- Spontaneous Cooperation in Multi-domain Sensor Networks -- Authenticated Queries in Sensor Networks -- Improving Sensor Network Security with Information Quality -- One-Time Sensors: A Novel Concept to Mitigate Node-Capture Attacks -- Randomized Grid Based Scheme for Wireless Sensor Network -- Influence of Falsified Position Data on Geographic Ad-Hoc Routing -- Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks -- Statistical Wormhole Detection in Sensor Networks -- RFID System with Fairness Within the Framework of Security and Privacy -- Scalable and Flexible Privacy Protection Scheme for RFID Systems -- RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks -- Location Privacy in Bluetooth -- An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices -- Side Channel Attacks on Message Authentication Codes.
Record Nr. UNINA-9910483407203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui