top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in web-based learning - ICWL 2021 : 20th international conference, ICWL 2021, Macau, China, November 13-14, 2021, proceedings / / edited by Wanlei Zhou and Yi Mu
Advances in web-based learning - ICWL 2021 : 20th international conference, ICWL 2021, Macau, China, November 13-14, 2021, proceedings / / edited by Wanlei Zhou and Yi Mu
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (181 pages)
Disciplina 371.33
Collana Lecture Notes in Computer Science
Soggetto topico Computer engineering
Computer networks
Education - Data processing
ISBN 3-030-90785-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Online Learning Methodologies, Trust, and Analysis -- Decentralized M-Learning Platform with Trusted Execution Environment -- 1 Introduction -- 2 Technologies -- 3 Overview -- 4 Implementation -- 5 Evaluation -- 6 Conclusion -- References -- Scaffolding Teacher Learning During Professional Development with Theory-Driven Learning Analytics -- 1 Introduction -- 2 Related Work -- 2.1 Theory-Driven LA -- 2.2 Aiding Non-technical Users in Data Use -- 3 Research Context -- 4 Understanding Teachers' Data Use During PD -- 4.1 Method -- 4.2 Results -- 5 Designing the Dashboard Prototype -- 6 Evaluating the Dashboard Prototype -- 6.1 Method -- 6.2 Results -- 7 Conclusion -- References -- ImPres: An Immersive 3D Presentation Framework for Mixed Reality Enhanced Learning -- 1 Introduction -- 2 Related Work -- 3 3D Presentation Concept -- 4 Implemented Presentation System -- 4.1 System Architecture -- 4.2 2D Editor -- 4.3 3D Editor -- 4.4 Conducting Presentations Using the System -- 5 Evaluation -- 5.1 Paper Prototype -- 5.2 Software Prototype -- 6 Discussion -- 7 Conclusion and Future Work -- References -- Designing a Virtual Learning Environment Based on a Learner Language Corpus -- 1 Introduction -- 2 Corpora and Virtual Learning Environments in Language Learning -- 3 Methods -- 4 Results -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Is This Fake or Credible? A Virtual Learning Companion Supporting the Judgment of Young Learners Facing Social Media Content -- 1 Introduction -- 2 Learning Companion Systems and ITS -- 3 System Environment and Implementation -- 3.1 Conceptual Architecture -- 3.2 PixelFed and Browser Plugin -- 4 Example Scenario -- 4.1 Example Walkthrough -- 4.2 Preliminary User Study -- 5 Conclusion and Outlook -- References -- Online Learning Environment with Tools.
Extending Narrative Serious Games Using Ad-Hoc Mini-games -- 1 Introduction -- 2 Extending the uAdventure Narrative Model Through Ad-Hoc Mini-games -- 3 Pilots of uAdventure and Ad-Hoc Minigames -- 3.1 Pilot: Serious Game for Airport Protocols Training -- 3.2 Developing an Escape Room Game for Promoting Computational Thinking -- 4 Conclusions and Future Work -- References -- Supplemental Mobile Learner Support Through Moodle-Independent Assessment Bots -- 1 Introduction -- 2 Related Work -- 2.1 Technology-Mediated Learning -- 2.2 Assessments in E-learning -- 2.3 Assessment Bots -- 3 Assessment Chatbot for Computer Science Lectures -- 4 Assessment-Handler-Service -- 5 Evaluation -- 5.1 Participants -- 5.2 Materials and Procedure -- 5.3 Results and Discussion -- 6 Limitations and Future Work -- 7 Conclusion -- A Extracting Content of Quizzes From Moodle -- References -- Exploring the Innovative Blockchain-Based Application of Online Learning System in University -- 1 Introduction -- 2 Related Works -- 3 Overview of Blockchain -- 3.1 Concept of Blockchain -- 3.2 Features of Blockchain -- 4 Innovative Design of Blockchain-Based Applications of Online Learning System in University -- 4.1 Create a Community of Education Chain -- 4.2 Protecting the Sharing and Copyright of Online Education Resources -- 4.3 Using Token Rewards as an Incentive Mechanism -- 4.4 Learner-Centered Recording on Learning Behavior and Process of Students -- 4.5 Setting-Up a Fair and Reasonable Learning Evaluation System -- 5 Conclusion -- References -- Experiential E-Learning: A Creative Prospect for Education in the Built Environment? -- 1 The Context and Problem -- 1.1 Module Context -- 1.2 Pedagogy -- 1.3 The Problem -- 2 Methods -- 3 E-learning Tools and Platforms -- 3.1 Tools and Platforms for Online Teaching -- 3.2 Platforms for Grading of Online Assessment -- 4 Results.
4.1 Module Marks -- 4.2 Student Feedback via Qualtrics Survey -- 4.3 Student Feedback from Focus Group Discussion -- 5 Discussion -- 6 Conclusions -- References -- Strengths and Limitations of Using e-Learning for Chinese Learners on Creative Engagement -- 1 Introduction -- 1.1 A New Era in China's Education -- 2 Literature Review -- 2.1 Benefits and Limitations of e-Learning -- 2.2 e-Learning to Develop Students' Higher Order Thinking -- 2.3 Research Gap -- 3 Study Context -- 4 Discussion -- 4.1 Benefits e-Learning in China -- 4.2 Technology Alignment, Integration and Convergence -- 4.3 TECK - A Framework for Student's Knowledge -- 4.4 Limitations of the Study -- 5 Conclusion -- References -- Online Learning Privacy Issues and Special Tools -- Security and Privacy in E-learning -- 1 Introduction -- 2 Main Threats Facing E-learning -- 2.1 Computer Virus Attacks -- 2.2 Data Leakage of E-learning Platforms -- 2.3 Risks of Online Communication -- 2.4 Illegal Invasion -- 3 Countermeasures -- 3.1 Virus Detection and Removal -- 3.2 Solutions of E-learning Data Security -- 3.3 Communication Security Protocol of E-learning -- 3.4 Intrusion Prevention Technologies -- 4 Suggestions -- References -- Digitalization of Firm's Innovation Process - A Bibliometric Analysis -- 1 Introduction and Motivation -- 2 Theoretical Background -- 2.1 Firm's Innovation Process -- 2.2 Digitalization of Business Processes and Innovation Process -- 3 Research Methods -- 3.1 Data Extraction and Scope Definition -- 3.2 Bibliometric Analysis -- 4 Research and Discussion -- 5 Conclusion -- References -- Entrepreneurship Education and E-Learning in the Greater Bay Area of China -- 1 Introduction -- 2 Entrepreneurship in China -- 3 The Greater Bay Area Context -- 4 Entrepreneurship Education -- 5 E-Learning.
6 How E-Learning Techniques Contribute to the Joint Entrepreneurship Education in the Greater Bay Area -- 6.1 Remote Learning -- 6.2 Continue and Shared Learning -- 6.3 Adaptive Learning -- 6.4 Cross-Language Learning -- 7 Conclusion -- References -- Design and Implementation of Learning System Based on T-LSTM -- 1 Introduction -- 2 Related Theories and Research -- 3 Design of T-LSTM -- 4 Implementation of the Learning System -- 5 Conclusion and Prospect -- References -- Situational Awareness of E-learning System Based on Cyber-Attack and Vulnerability -- 1 Introduction -- 2 Background -- 2.1 E-learning -- 2.2 Situational Awareness -- 2.3 Cyber Security and E-learning -- 3 Methodology -- 3.1 E-learning Situation Monitoring and Warning System -- 4 Evaluation -- 5 Conclusion -- References -- Research on Cross-Project Software Defect Prediction Based on Machine Learning -- 1 Introduction -- 2 Software Defect Prediction Research -- 3 Cross-Project Defect Prediction Research -- 4 Conclusion -- References -- Research on Teaching Reform of Digital Media Technology Under the Background of New Engineering Course Construction -- 1 Introduction -- 2 Content and Development of Digital Media Technology -- 3 The Necessity of Training Digital Media Professionals Under the Background of New Engineering -- 4 New Requirements for Talents Training of Digital Media Technology Majors Under the Background of New Engineering -- 5 Teaching Reform Framework of Digital Media Technology Major Under the Background of New Engineering -- 6 Discussion on the Teaching Reform of Digital Media Technology Specialty Under the Background of New Engineering -- 6.1 Discussion on Professional Knowledge Teaching -- 6.2 Outside the Classroom Practice Discussion -- 6.3 The Discussion of Course Contests -- 6.4 Discussion on Professional Training Bases -- 6.5 Discussion of the Mentor Workshop.
6.6 Discussion on Vacation Practice Platform -- 7 Conclusions -- References -- Author Index.
Record Nr. UNISA-996464394303316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in web-based learning - ICWL 2021 : 20th international conference, ICWL 2021, Macau, China, November 13-14, 2021, proceedings / / edited by Wanlei Zhou and Yi Mu
Advances in web-based learning - ICWL 2021 : 20th international conference, ICWL 2021, Macau, China, November 13-14, 2021, proceedings / / edited by Wanlei Zhou and Yi Mu
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (181 pages)
Disciplina 371.33
Collana Lecture Notes in Computer Science
Soggetto topico Computer engineering
Computer networks
Education - Data processing
ISBN 3-030-90785-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Online Learning Methodologies, Trust, and Analysis -- Decentralized M-Learning Platform with Trusted Execution Environment -- 1 Introduction -- 2 Technologies -- 3 Overview -- 4 Implementation -- 5 Evaluation -- 6 Conclusion -- References -- Scaffolding Teacher Learning During Professional Development with Theory-Driven Learning Analytics -- 1 Introduction -- 2 Related Work -- 2.1 Theory-Driven LA -- 2.2 Aiding Non-technical Users in Data Use -- 3 Research Context -- 4 Understanding Teachers' Data Use During PD -- 4.1 Method -- 4.2 Results -- 5 Designing the Dashboard Prototype -- 6 Evaluating the Dashboard Prototype -- 6.1 Method -- 6.2 Results -- 7 Conclusion -- References -- ImPres: An Immersive 3D Presentation Framework for Mixed Reality Enhanced Learning -- 1 Introduction -- 2 Related Work -- 3 3D Presentation Concept -- 4 Implemented Presentation System -- 4.1 System Architecture -- 4.2 2D Editor -- 4.3 3D Editor -- 4.4 Conducting Presentations Using the System -- 5 Evaluation -- 5.1 Paper Prototype -- 5.2 Software Prototype -- 6 Discussion -- 7 Conclusion and Future Work -- References -- Designing a Virtual Learning Environment Based on a Learner Language Corpus -- 1 Introduction -- 2 Corpora and Virtual Learning Environments in Language Learning -- 3 Methods -- 4 Results -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Is This Fake or Credible? A Virtual Learning Companion Supporting the Judgment of Young Learners Facing Social Media Content -- 1 Introduction -- 2 Learning Companion Systems and ITS -- 3 System Environment and Implementation -- 3.1 Conceptual Architecture -- 3.2 PixelFed and Browser Plugin -- 4 Example Scenario -- 4.1 Example Walkthrough -- 4.2 Preliminary User Study -- 5 Conclusion and Outlook -- References -- Online Learning Environment with Tools.
Extending Narrative Serious Games Using Ad-Hoc Mini-games -- 1 Introduction -- 2 Extending the uAdventure Narrative Model Through Ad-Hoc Mini-games -- 3 Pilots of uAdventure and Ad-Hoc Minigames -- 3.1 Pilot: Serious Game for Airport Protocols Training -- 3.2 Developing an Escape Room Game for Promoting Computational Thinking -- 4 Conclusions and Future Work -- References -- Supplemental Mobile Learner Support Through Moodle-Independent Assessment Bots -- 1 Introduction -- 2 Related Work -- 2.1 Technology-Mediated Learning -- 2.2 Assessments in E-learning -- 2.3 Assessment Bots -- 3 Assessment Chatbot for Computer Science Lectures -- 4 Assessment-Handler-Service -- 5 Evaluation -- 5.1 Participants -- 5.2 Materials and Procedure -- 5.3 Results and Discussion -- 6 Limitations and Future Work -- 7 Conclusion -- A Extracting Content of Quizzes From Moodle -- References -- Exploring the Innovative Blockchain-Based Application of Online Learning System in University -- 1 Introduction -- 2 Related Works -- 3 Overview of Blockchain -- 3.1 Concept of Blockchain -- 3.2 Features of Blockchain -- 4 Innovative Design of Blockchain-Based Applications of Online Learning System in University -- 4.1 Create a Community of Education Chain -- 4.2 Protecting the Sharing and Copyright of Online Education Resources -- 4.3 Using Token Rewards as an Incentive Mechanism -- 4.4 Learner-Centered Recording on Learning Behavior and Process of Students -- 4.5 Setting-Up a Fair and Reasonable Learning Evaluation System -- 5 Conclusion -- References -- Experiential E-Learning: A Creative Prospect for Education in the Built Environment? -- 1 The Context and Problem -- 1.1 Module Context -- 1.2 Pedagogy -- 1.3 The Problem -- 2 Methods -- 3 E-learning Tools and Platforms -- 3.1 Tools and Platforms for Online Teaching -- 3.2 Platforms for Grading of Online Assessment -- 4 Results.
4.1 Module Marks -- 4.2 Student Feedback via Qualtrics Survey -- 4.3 Student Feedback from Focus Group Discussion -- 5 Discussion -- 6 Conclusions -- References -- Strengths and Limitations of Using e-Learning for Chinese Learners on Creative Engagement -- 1 Introduction -- 1.1 A New Era in China's Education -- 2 Literature Review -- 2.1 Benefits and Limitations of e-Learning -- 2.2 e-Learning to Develop Students' Higher Order Thinking -- 2.3 Research Gap -- 3 Study Context -- 4 Discussion -- 4.1 Benefits e-Learning in China -- 4.2 Technology Alignment, Integration and Convergence -- 4.3 TECK - A Framework for Student's Knowledge -- 4.4 Limitations of the Study -- 5 Conclusion -- References -- Online Learning Privacy Issues and Special Tools -- Security and Privacy in E-learning -- 1 Introduction -- 2 Main Threats Facing E-learning -- 2.1 Computer Virus Attacks -- 2.2 Data Leakage of E-learning Platforms -- 2.3 Risks of Online Communication -- 2.4 Illegal Invasion -- 3 Countermeasures -- 3.1 Virus Detection and Removal -- 3.2 Solutions of E-learning Data Security -- 3.3 Communication Security Protocol of E-learning -- 3.4 Intrusion Prevention Technologies -- 4 Suggestions -- References -- Digitalization of Firm's Innovation Process - A Bibliometric Analysis -- 1 Introduction and Motivation -- 2 Theoretical Background -- 2.1 Firm's Innovation Process -- 2.2 Digitalization of Business Processes and Innovation Process -- 3 Research Methods -- 3.1 Data Extraction and Scope Definition -- 3.2 Bibliometric Analysis -- 4 Research and Discussion -- 5 Conclusion -- References -- Entrepreneurship Education and E-Learning in the Greater Bay Area of China -- 1 Introduction -- 2 Entrepreneurship in China -- 3 The Greater Bay Area Context -- 4 Entrepreneurship Education -- 5 E-Learning.
6 How E-Learning Techniques Contribute to the Joint Entrepreneurship Education in the Greater Bay Area -- 6.1 Remote Learning -- 6.2 Continue and Shared Learning -- 6.3 Adaptive Learning -- 6.4 Cross-Language Learning -- 7 Conclusion -- References -- Design and Implementation of Learning System Based on T-LSTM -- 1 Introduction -- 2 Related Theories and Research -- 3 Design of T-LSTM -- 4 Implementation of the Learning System -- 5 Conclusion and Prospect -- References -- Situational Awareness of E-learning System Based on Cyber-Attack and Vulnerability -- 1 Introduction -- 2 Background -- 2.1 E-learning -- 2.2 Situational Awareness -- 2.3 Cyber Security and E-learning -- 3 Methodology -- 3.1 E-learning Situation Monitoring and Warning System -- 4 Evaluation -- 5 Conclusion -- References -- Research on Cross-Project Software Defect Prediction Based on Machine Learning -- 1 Introduction -- 2 Software Defect Prediction Research -- 3 Cross-Project Defect Prediction Research -- 4 Conclusion -- References -- Research on Teaching Reform of Digital Media Technology Under the Background of New Engineering Course Construction -- 1 Introduction -- 2 Content and Development of Digital Media Technology -- 3 The Necessity of Training Digital Media Professionals Under the Background of New Engineering -- 4 New Requirements for Talents Training of Digital Media Technology Majors Under the Background of New Engineering -- 5 Teaching Reform Framework of Digital Media Technology Major Under the Background of New Engineering -- 6 Discussion on the Teaching Reform of Digital Media Technology Specialty Under the Background of New Engineering -- 6.1 Discussion on Professional Knowledge Teaching -- 6.2 Outside the Classroom Practice Discussion -- 6.3 The Discussion of Course Contests -- 6.4 Discussion on Professional Training Bases -- 6.5 Discussion of the Mentor Workshop.
6.6 Discussion on Vacation Practice Platform -- 7 Conclusions -- References -- Author Index.
Record Nr. UNINA-9910508436903321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and communication security : second International Conference, ICICS '99, Sydney, Australia, November 9-11, 1999 : proceedingsity / / Vijay Varadharajan, Yi Mu (editors)
Information and communication security : second International Conference, ICICS '99, Sydney, Australia, November 9-11, 1999 : proceedingsity / / Vijay Varadharajan, Yi Mu (editors)
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer, , [1999]
Descrizione fisica 1 online resource (XII, 328 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 3-540-47942-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- International Cryptography -- Cryptanalysis -- Reaction Attacks against Several Public-Key Cryptosystem -- Cryptanalysis of Some AES Candidate Algorithms -- Language Based Approach to Security -- Issues in the Design of a Language for Role Based Access Control -- Extending Erlang for Safe Mobile Code Execution -- Electronic Commerce and Secret Sharing -- Detachable Electronic Coins -- Linear Secret Sharing with Divisible Shares -- Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery -- Digital Signatures -- Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications -- Signature Scheme for Controlled Environments -- On the Cryptographic Value of the q th Root Problem -- Keynote Speech -- Protecting Critical Information Systems -- Security Protocols -- Delegation Chains Secure Up to Constant Length -- Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks -- Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack -- An Extended Logic for Analyzing Timed-Release Public-Key Protocols -- Applications -- Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project -- User Identification System Based on Biometrics for Keystroke -- Boundary Conditions that Influence Decisions about Log File Formats in Multi-application Smart Cards -- Send Message into a Definite Future -- Cryptography -- Efficient Accumulators without Trapdoor Extended Abstract -- Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes -- Incremental Authentication of Tree-Structured Documents -- Complexity and Security Functions -- Plateaued Functions -- On the Linear Complexity of the Naor-Reingold Pseudo-Random Function -- On the Channel Capacity of Narrow-Band Subliminal Channels.
Record Nr. UNISA-996465601003316
Berlin, Heidelberg : , : Springer, , [1999]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and communication security : second International Conference, ICICS '99, Sydney, Australia, November 9-11, 1999 : proceedingsity / / Vijay Varadharajan, Yi Mu (editors)
Information and communication security : second International Conference, ICICS '99, Sydney, Australia, November 9-11, 1999 : proceedingsity / / Vijay Varadharajan, Yi Mu (editors)
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer, , [1999]
Descrizione fisica 1 online resource (XII, 328 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 3-540-47942-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- International Cryptography -- Cryptanalysis -- Reaction Attacks against Several Public-Key Cryptosystem -- Cryptanalysis of Some AES Candidate Algorithms -- Language Based Approach to Security -- Issues in the Design of a Language for Role Based Access Control -- Extending Erlang for Safe Mobile Code Execution -- Electronic Commerce and Secret Sharing -- Detachable Electronic Coins -- Linear Secret Sharing with Divisible Shares -- Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery -- Digital Signatures -- Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications -- Signature Scheme for Controlled Environments -- On the Cryptographic Value of the q th Root Problem -- Keynote Speech -- Protecting Critical Information Systems -- Security Protocols -- Delegation Chains Secure Up to Constant Length -- Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks -- Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack -- An Extended Logic for Analyzing Timed-Release Public-Key Protocols -- Applications -- Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project -- User Identification System Based on Biometrics for Keystroke -- Boundary Conditions that Influence Decisions about Log File Formats in Multi-application Smart Cards -- Send Message into a Definite Future -- Cryptography -- Efficient Accumulators without Trapdoor Extended Abstract -- Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes -- Incremental Authentication of Tree-Structured Documents -- Complexity and Security Functions -- Plateaued Functions -- On the Linear Complexity of the Naor-Reingold Pseudo-Random Function -- On the Channel Capacity of Narrow-Band Subliminal Channels.
Record Nr. UNINA-9910767571803321
Berlin, Heidelberg : , : Springer, , [1999]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Provable security : first international conference, provsec 2007, wollongong, australia, november 1-2, 2007. Proceedings / / edited by Willy Susilo, Joseph K. Liu, Yi Mu
Provable security : first international conference, provsec 2007, wollongong, australia, november 1-2, 2007. Proceedings / / edited by Willy Susilo, Joseph K. Liu, Yi Mu
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2007]
Descrizione fisica 1 online resource (X, 246 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer systems - Access control
Cryptography
Computer security
ISBN 3-540-75670-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentication -- Stronger Security of Authenticated Key Exchange -- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels -- Asymmetric Encryption -- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks -- Signature -- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function -- Two Notes on the Security of Certificateless Signatures -- A Provably Secure Ring Signature Scheme in Certificateless Cryptography -- Protocol and Proving Technique -- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use -- Does Secure Time-Stamping Imply Collision-Free Hash Functions? -- Formal Proof of Provable Security by Game-Playing in a Proof Assistant -- Authentication and Symmetric Encryption (Short Papers) -- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication -- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security -- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers -- Signature (Short Papers) -- Practical Threshold Signatures Without Random Oracles -- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature -- Asymmetric Encryption (Short Papers) -- Formal Security Treatments for Signatures from Identity-Based Encryption -- Decryptable Searchable Encryption.
Record Nr. UNINA-9910483360103321
Berlin, Germany : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Provable security : first international conference, provsec 2007, wollongong, australia, november 1-2, 2007. Proceedings / / edited by Willy Susilo, Joseph K. Liu, Yi Mu
Provable security : first international conference, provsec 2007, wollongong, australia, november 1-2, 2007. Proceedings / / edited by Willy Susilo, Joseph K. Liu, Yi Mu
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2007]
Descrizione fisica 1 online resource (X, 246 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer systems - Access control
Cryptography
Computer security
ISBN 3-540-75670-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentication -- Stronger Security of Authenticated Key Exchange -- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels -- Asymmetric Encryption -- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks -- Signature -- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function -- Two Notes on the Security of Certificateless Signatures -- A Provably Secure Ring Signature Scheme in Certificateless Cryptography -- Protocol and Proving Technique -- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use -- Does Secure Time-Stamping Imply Collision-Free Hash Functions? -- Formal Proof of Provable Security by Game-Playing in a Proof Assistant -- Authentication and Symmetric Encryption (Short Papers) -- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication -- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security -- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers -- Signature (Short Papers) -- Practical Threshold Signatures Without Random Oracles -- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature -- Asymmetric Encryption (Short Papers) -- Formal Security Treatments for Signatures from Identity-Based Encryption -- Decryptable Searchable Encryption.
Record Nr. UNISA-996465495403316
Berlin, Germany : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui