Cryptology and Network Security [[electronic resource] ] : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / / edited by Yi Mu, Robert H. Deng, Xinyi Huang
| Cryptology and Network Security [[electronic resource] ] : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / / edited by Yi Mu, Robert H. Deng, Xinyi Huang |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XIII, 540 p. 388 illus., 61 illus. in color.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Software engineering Artificial intelligence Data mining Special purpose computers Computer communication systems Cryptology Software Engineering/Programming and Operating Systems Artificial Intelligence Data Mining and Knowledge Discovery Special Purpose and Application-Based Systems Computer Communication Networks |
| ISBN | 3-030-31578-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Homomorphic Encryption -- SIKE and Hash -- Lattice and Post-quantum Cryptography -- Searchable Encryption -- Blockchains, Cloud Security -- Secret Sharing and Interval Test -- LWE -- Encryption, Data Aggregation, and Revocation -- Signature, ML, Payment, and Factorization. |
| Record Nr. | UNISA-996466447603316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cryptology and Network Security : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / / edited by Yi Mu, Robert H. Deng, Xinyi Huang
| Cryptology and Network Security : 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings / / edited by Yi Mu, Robert H. Deng, Xinyi Huang |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XIII, 540 p. 388 illus., 61 illus. in color.) |
| Disciplina |
005.82
005.824 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Software engineering Artificial intelligence Data mining Computers, Special purpose Computer networks Cryptology Software Engineering/Programming and Operating Systems Artificial Intelligence Data Mining and Knowledge Discovery Special Purpose and Application-Based Systems Computer Communication Networks |
| ISBN | 3-030-31578-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Homomorphic Encryption -- SIKE and Hash -- Lattice and Post-quantum Cryptography -- Searchable Encryption -- Blockchains, Cloud Security -- Secret Sharing and Interval Test -- LWE -- Encryption, Data Aggregation, and Revocation -- Signature, ML, Payment, and Factorization. |
| Record Nr. | UNINA-9910349274903321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cryptology and Network Security [[electronic resource] ] : 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings / / edited by David Pointcheval, Yi Mu, Kefei Chen
| Cryptology and Network Security [[electronic resource] ] : 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings / / edited by David Pointcheval, Yi Mu, Kefei Chen |
| Edizione | [1st ed. 2006.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
| Descrizione fisica | 1 online resource (XIII, 384 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Computers and civilization Computer communication systems Algorithms Cryptology Systems and Data Security Management of Computing and Information Systems Computers and Society Computer Communication Networks Algorithm Analysis and Problem Complexity |
| ISBN | 3-540-49463-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Encryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems -- Efficient Identity-Based Encryption with Tight Security Reduction -- Key Exchange -- A Diffie-Hellman Key Exchange Protocol Without Random Oracles -- Authenticated Group Key Agreement for Multicast -- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks -- Authentication and Signatures -- Efficient Mutual Data Authentication Using Manually Authenticated Strings -- Achieving Multicast Stream Authentication Using MDS Codes -- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps -- Proxy Signatures -- Security Model of Proxy-Multi Signature Schemes -- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque -- Cryptanalysis -- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields -- Improved Collision Attack on Reduced Round Camellia -- Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks -- Implementation -- Bitslice Implementation of AES -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3) -- Steganalysis and Watermarking -- Steganalysis Based on Differential Statistics -- Watermarking Essential Data Structures for Copyright Protection -- Boolean Functions and Stream Ciphers -- A Note of Perfect Nonlinear Functions -- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing -- Intrusion Detection -- Cooperative Intrusion Detection for Web Applications -- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis -- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems -- A Multi-agent Cooperative Model and System for Integrated Security Monitoring -- Disponibility and Reliability -- Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network -- An Immune-Based Model for Service Survivability -- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. |
| Record Nr. | UNISA-996466239003316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cryptology and network security : 5th international conference, CANS 2006, Suzhou, China, December 8-10, 2006 : proceedings / / David Pointcheval, Yi Mu, Kefei Chen (eds.)
| Cryptology and network security : 5th international conference, CANS 2006, Suzhou, China, December 8-10, 2006 : proceedings / / David Pointcheval, Yi Mu, Kefei Chen (eds.) |
| Edizione | [1st ed. 2006.] |
| Pubbl/distr/stampa | Berlin ; ; [London], : Springer, c2006 |
| Descrizione fisica | 1 online resource (XIII, 384 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
PointchevalDavid
MuYi ChenKefei <1959-> |
| Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
| Soggetto topico |
Computer networks - Security measures
Cryptography |
| ISBN | 3-540-49463-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Encryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems -- Efficient Identity-Based Encryption with Tight Security Reduction -- Key Exchange -- A Diffie-Hellman Key Exchange Protocol Without Random Oracles -- Authenticated Group Key Agreement for Multicast -- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks -- Authentication and Signatures -- Efficient Mutual Data Authentication Using Manually Authenticated Strings -- Achieving Multicast Stream Authentication Using MDS Codes -- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps -- Proxy Signatures -- Security Model of Proxy-Multi Signature Schemes -- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque -- Cryptanalysis -- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields -- Improved Collision Attack on Reduced Round Camellia -- Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks -- Implementation -- Bitslice Implementation of AES -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3) -- Steganalysis and Watermarking -- Steganalysis Based on Differential Statistics -- Watermarking Essential Data Structures for Copyright Protection -- Boolean Functions and Stream Ciphers -- A Note of Perfect Nonlinear Functions -- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing -- Intrusion Detection -- Cooperative Intrusion Detection for Web Applications -- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis -- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems -- A Multi-agent Cooperative Model and System for Integrated Security Monitoring -- Disponibility and Reliability -- Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network -- An Immune-Based Model for Service Survivability -- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. |
| Altri titoli varianti | CANS 2006 |
| Record Nr. | UNINA-9910483370903321 |
| Berlin ; ; [London], : Springer, c2006 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cryptology and Network Security [[electronic resource] ] : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings / / edited by Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li
| Cryptology and Network Security [[electronic resource] ] : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings / / edited by Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li |
| Edizione | [1st ed. 2005.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
| Descrizione fisica | 1 online resource (XII, 352 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer communication systems
Data encryption (Computer science) Operating systems (Computers) Management information systems Computer science Computers and civilization Algorithms Computer Communication Networks Cryptology Operating Systems Management of Computing and Information Systems Computers and Society Algorithm Analysis and Problem Complexity |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -- An Immune-Based Model for Computer Virus Detection -- A New Model for Dynamic Intrusion Detection -- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection -- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time -- Authentication and Signature -- ID-Based Aggregate Signatures from Bilinear Pairings -- Efficient Identity-Based Signatures and Blind Signatures -- How to Authenticate Real Time Streams Using Improved Online/Offline Signatures -- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange -- Signcryption -- Two Proxy Signcryption Schemes from Bilinear Pairings -- Constructing Secure Warrant-Based Proxy Signcryption Schemes -- E-mail Security -- Design and Implementation of an Inline Certified E-mail Service -- Efficient Identity-Based Protocol for Fair Certified E-mail Delivery -- Cryptosystems -- Similar Keys of Multivariate Quadratic Public Key Cryptosystems -- A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems -- Constructions of Almost Resilient Functions -- Privacy and Tracing -- A Novel Method to Maintain Privacy in Mobile Agent Applications -- Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring -- Information Hiding -- Revaluation of Error Correcting Coding in Watermarking Channel -- Firewalls, Denial of Service and DNS Security -- On the Performance and Analysis of DNS Security Extensions -- On Securing RTP-Based Streaming Content with Firewalls -- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling -- Trust Management -- Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles. |
| Record Nr. | UNISA-996465378403316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Emerging Directions in Embedded and Ubiquitous Computing [[electronic resource] ] : EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings / / edited by Xiaobo Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong-Chun Lee, Daeyoung Kim, Young-Sik Jeong, Cheng-Zhong Xu
| Emerging Directions in Embedded and Ubiquitous Computing [[electronic resource] ] : EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings / / edited by Xiaobo Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong-Chun Lee, Daeyoung Kim, Young-Sik Jeong, Cheng-Zhong Xu |
| Edizione | [1st ed. 2006.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
| Descrizione fisica | 1 online resource (XXVII, 1034 p.) |
| Disciplina |
005.437
4.019 |
| Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
| Soggetto topico |
User interfaces (Computer systems)
Computer communication systems Special purpose computers Application software Data encryption (Computer science) Computers and civilization User Interfaces and Human Computer Interaction Computer Communication Networks Special Purpose and Application-Based Systems Information Systems Applications (incl. Internet) Cryptology Computers and Society |
| ISBN | 3-540-36851-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | NCUS 2006 Symposium -- SecUbiq 2006 Workshop -- USN 2006 Workshop -- TRUST 2006 Workshop -- ESO 2006 Workshop -- MSA 2006 Workshop. |
| Record Nr. | UNISA-996466089703316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information Security and Privacy [[electronic resource] ] : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings / / edited by Willy Susilo, Yi Mu
| Information Security and Privacy [[electronic resource] ] : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings / / edited by Willy Susilo, Yi Mu |
| Edizione | [1st ed. 2014.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
| Descrizione fisica | 1 online resource (XIV, 464 p. 61 illus.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Systems and Data Security Cryptology Management of Computing and Information Systems |
| ISBN | 3-319-08344-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cryptanalysis -- Cryptographic protocols -- Fine-grain cryptographic protocols -- Key exchange -- Fundamentals -- Lattices -- Homomorphic encryption -- Applications. |
| Record Nr. | UNISA-996213701703316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information Security and Privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings / / edited by Willy Susilo, Yi Mu
| Information Security and Privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings / / edited by Willy Susilo, Yi Mu |
| Edizione | [1st ed. 2014.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
| Descrizione fisica | 1 online resource (XIV, 464 p. 61 illus.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Systems and Data Security Cryptology Management of Computing and Information Systems |
| ISBN | 3-319-08344-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cryptanalysis -- Cryptographic protocols -- Fine-grain cryptographic protocols -- Key exchange -- Fundamentals -- Lattices -- Homomorphic encryption -- Applications. |
| Record Nr. | UNINA-9910484563703321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information Security and Privacy [[electronic resource] ] : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings / / edited by Willy Susilo, Yi Mu, Jennifer Seberry
| Information Security and Privacy [[electronic resource] ] : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings / / edited by Willy Susilo, Yi Mu, Jennifer Seberry |
| Edizione | [1st ed. 2012.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
| Descrizione fisica | 1 online resource (XIV, 460 p. 46 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Coding theory Information theory Application software E-commerce Systems and Data Security Cryptology Management of Computing and Information Systems Coding and Information Theory Computer Appl. in Administrative Data Processing e-Commerce/e-business |
| ISBN | 3-642-31448-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996465758903316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information Security and Privacy [[electronic resource] ] : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings / / edited by Yi Mu, Willy Susilo, Jennifer Seberry
| Information Security and Privacy [[electronic resource] ] : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings / / edited by Yi Mu, Willy Susilo, Jennifer Seberry |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
| Descrizione fisica | 1 online resource (XIII, 480 p.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Computer security Computer communication systems Coding theory Information theory Algorithms Cryptology Management of Computing and Information Systems Systems and Data Security Computer Communication Networks Coding and Information Theory Algorithm Analysis and Problem Complexity |
| ISBN | 3-540-70500-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | New Paradigms for Password Security -- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy -- Secure Biometric Authentication with Improved Accuracy -- A Critical Analysis and Improvement of AACS Drive-Host Authentication -- Comparing the Pre- and Post-specified Peer Models for Key Agreement -- Efficient One-Round Key Exchange in the Standard Model -- On the Improvement of the BDF Attack on LSBS-RSA -- Public-Key Cryptosystems with Primitive Power Roots of Unity -- Relationship between Two Approaches for Defining the Standard Model PA-ness -- Distributed Verification of Mixing - Local Forking Proofs Model -- Fully-Simulatable Oblivious Set Transfer -- Efficient Disjointness Tests for Private Datasets -- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary -- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers -- Multidimensional Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of Reduced-Round SMS4 Block Cipher -- On the Unprovable Security of 2-Key XCBC -- Looking Back at a New Hash Function -- Non-linear Reduced Round Attacks against SHA-2 Hash Family -- Collisions for Round-Reduced LAKE -- Preimage Attacks on Step-Reduced MD5 -- Linear Distinguishing Attack on Shannon -- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck -- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 -- Signature Generation and Detection of Malware Families -- Reducing Payload Scans for Attack Signature Matching Using Rule Classification -- Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor -- FormatShield: A Binary Rewriting Defense against Format String Attacks -- Advanced Permission-Role Relationship in Role-Based Access Control -- Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases -- Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k ) -- A Tree-Based Approach for Computing Double-Base Chains -- Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves -- Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation. |
| Record Nr. | UNISA-996465735503316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||