top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer security - ESORICS 2009 : 14th European symposium on research in computer security, Saint-Malo, France, September 21-23, 2009 : proceedings / / Michael Backes, Peng Ning (eds.)
Computer security - ESORICS 2009 : 14th European symposium on research in computer security, Saint-Malo, France, September 21-23, 2009 : proceedings / / Michael Backes, Peng Ning (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; hHeidelberg, : Springer-Verlag, 2009
Descrizione fisica 1 online resource (XVI, 706 p.)
Disciplina 005.822gerDNB
Altri autori (Persone) BackesMichael
NingPeng
Collana Lecture notes in computer science
Soggetto topico Computer security
Computers - Access control
ISBN 3-642-04444-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Security I -- Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones -- User-Centric Handling of Identity Agent Compromise -- The Coremelt Attack -- Type-Based Analysis of PIN Processing APIs -- Declassification with Explicit Reference Points -- Tracking Information Flow in Dynamic Tree Structures -- Network Security II -- Lightweight Opportunistic Tunneling (LOT) -- Hide and Seek in Time — Robust Covert Timing Channels -- Authentic Time-Stamps for Archival Storage -- Towards a Theory of Accountability and Audit -- Reliable Evidence: Auditability by Typing -- PCAL: Language Support for Proof-Carrying Authorization Systems -- Network Security III -- ReFormat: Automatic Reverse Engineering of Encrypted Messages -- Protocol Normalization Using Attribute Grammars -- Automatically Generating Models for Botnet Detection -- Dynamic Enforcement of Abstract Separation of Duty Constraints -- Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging -- Requirements and Protocols for Inference-Proof Interactions in Information Systems -- A Privacy Preservation Model for Facebook-Style Social Network Systems -- New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing -- Secure Pseudonymous Channels -- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing -- Content Delivery Networks: Protection or Threat? -- Model-Checking DoS Amplification for VoIP Session Initiation -- The Wisdom of Crowds: Attacks and Optimal Constructions -- Secure Evaluation of Private Linear Branching Programs with Medical Applications -- Keep a Few: Outsourcing Data While Maintaining Confidentiality -- Data Structures with Unpredictable Timing -- WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance -- Corruption-Localizing Hashing -- Isolating JavaScript with Filters, Rewriting, and Wrappers -- An Effective Method for Combating Malicious Scripts Clickbots -- Client-Side Detection of XSS Worms by Monitoring Payload Propagation -- Formal Indistinguishability Extended to the Random Oracle Model -- Computationally Sound Analysis of a Probabilistic Contract Signing Protocol -- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption -- A Generic Security API for Symmetric Key Management on Cryptographic Devices -- ID-Based Secure Distance Bounding and Localization -- Secure Ownership and Ownership Transfer in RFID Systems -- Cumulative Attestation Kernels for Embedded Systems -- Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries -- Set Covering Problems in Role-Based Access Control.
Record Nr. UNINA-9910483357103321
Berlin ; ; hHeidelberg, : Springer-Verlag, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security -- ESORICS 2009 [[electronic resource] ] : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings / / edited by Michael Backes, Peng Ning
Computer Security -- ESORICS 2009 [[electronic resource] ] : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings / / edited by Michael Backes, Peng Ning
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XVI, 706 p.)
Disciplina 005.822gerDNB
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Data structures (Computer science)
Computer science—Mathematics
E-commerce
Systems and Data Security
Cryptology
Coding and Information Theory
Data Structures and Information Theory
Discrete Mathematics in Computer Science
e-Commerce/e-business
ISBN 3-642-04444-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Security I -- Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones -- User-Centric Handling of Identity Agent Compromise -- The Coremelt Attack -- Type-Based Analysis of PIN Processing APIs -- Declassification with Explicit Reference Points -- Tracking Information Flow in Dynamic Tree Structures -- Network Security II -- Lightweight Opportunistic Tunneling (LOT) -- Hide and Seek in Time — Robust Covert Timing Channels -- Authentic Time-Stamps for Archival Storage -- Towards a Theory of Accountability and Audit -- Reliable Evidence: Auditability by Typing -- PCAL: Language Support for Proof-Carrying Authorization Systems -- Network Security III -- ReFormat: Automatic Reverse Engineering of Encrypted Messages -- Protocol Normalization Using Attribute Grammars -- Automatically Generating Models for Botnet Detection -- Dynamic Enforcement of Abstract Separation of Duty Constraints -- Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging -- Requirements and Protocols for Inference-Proof Interactions in Information Systems -- A Privacy Preservation Model for Facebook-Style Social Network Systems -- New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing -- Secure Pseudonymous Channels -- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing -- Content Delivery Networks: Protection or Threat? -- Model-Checking DoS Amplification for VoIP Session Initiation -- The Wisdom of Crowds: Attacks and Optimal Constructions -- Secure Evaluation of Private Linear Branching Programs with Medical Applications -- Keep a Few: Outsourcing Data While Maintaining Confidentiality -- Data Structures with Unpredictable Timing -- WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance -- Corruption-Localizing Hashing -- Isolating JavaScript with Filters, Rewriting, and Wrappers -- An Effective Method for Combating Malicious Scripts Clickbots -- Client-Side Detection of XSS Worms by Monitoring Payload Propagation -- Formal Indistinguishability Extended to the Random Oracle Model -- Computationally Sound Analysis of a Probabilistic Contract Signing Protocol -- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption -- A Generic Security API for Symmetric Key Management on Cryptographic Devices -- ID-Based Secure Distance Bounding and Localization -- Secure Ownership and Ownership Transfer in RFID Systems -- Cumulative Attestation Kernels for Embedded Systems -- Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries -- Set Covering Problems in Role-Based Access Control.
Record Nr. UNISA-996465663603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings / / edited by Peng Ning, Ninghui Li
Information and Communications Security [[electronic resource] ] : 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings / / edited by Peng Ning, Ninghui Li
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 562 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Computers and civilization
Computer communication systems
Algorithms
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Computers and Society
Computer Communication Networks
Algorithm Analysis and Problem Complexity
ISBN 3-540-49497-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving Fair Exchange in Byzantine Environments -- A Security Analysis of the Precise Time Protocol (Short Paper) -- Applied Crytography -- An Identity-Based Proxy Signature Scheme from Pairings -- Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper) -- Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper) -- Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size -- Trace-Driven Cache Attacks on AES (Short Paper) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols -- Defining and Measuring Policy Coverage in Testing Access Control Policies -- Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper) -- An Operating System Design for the Security Architecture for Microprocessors -- Privacy and Malicious Code -- Point-Based Trust: Define How Much Privacy Is Worth -- Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets -- Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper) -- An Anonymous Authentication Scheme for Identification Card -- A Wireless Covert Channel on Smart Cards (Short Paper) -- Network Security -- From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution -- Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper) -- Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario -- An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper) -- Systems Security -- Provably Correct Runtime Enforcement of Non-interference Properties -- An Attack on SMC-Based Software Protection -- Modular Behavior Profiles in Systems with Shared Libraries (Short Paper) -- Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic -- Cryptanalysis -- Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards -- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper) -- Seifert’s RSA Fault Attack: Simplified Analysis and Generalizations -- The Fairness of Perfect Concurrent Signatures -- Applied Cryptography and Network Security -- Secure Set Membership Using 3Sat -- Left-to-Right Signed-Bit ?-Adic Representations of n Integers (Short Paper) -- Universal Designated Verifier Signature Without Delegatability -- Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper) -- Security Implementations -- A Fast RSA Implementation on Itanium 2 Processor -- Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) -- Threshold Implementations Against Side-Channel Attacks and Glitches -- Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper).
Record Nr. UNISA-996466121003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and communications security : 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings / / Peng Ning, Sihan Qing, Ninghui Li (eds.)
Information and communications security : 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings / / Peng Ning, Sihan Qing, Ninghui Li (eds.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2006
Descrizione fisica 1 online resource (XIV, 562 p.)
Disciplina 005.8
Altri autori (Persone) NingPeng
QingSihan
LiNinghui
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 3-540-49497-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving Fair Exchange in Byzantine Environments -- A Security Analysis of the Precise Time Protocol (Short Paper) -- Applied Crytography -- An Identity-Based Proxy Signature Scheme from Pairings -- Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper) -- Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper) -- Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size -- Trace-Driven Cache Attacks on AES (Short Paper) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols -- Defining and Measuring Policy Coverage in Testing Access Control Policies -- Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper) -- An Operating System Design for the Security Architecture for Microprocessors -- Privacy and Malicious Code -- Point-Based Trust: Define How Much Privacy Is Worth -- Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets -- Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper) -- An Anonymous Authentication Scheme for Identification Card -- A Wireless Covert Channel on Smart Cards (Short Paper) -- Network Security -- From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution -- Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper) -- Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario -- An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper) -- Systems Security -- Provably Correct Runtime Enforcement of Non-interference Properties -- An Attack on SMC-Based Software Protection -- Modular Behavior Profiles in Systems with Shared Libraries (Short Paper) -- Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic -- Cryptanalysis -- Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards -- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper) -- Seifert’s RSA Fault Attack: Simplified Analysis and Generalizations -- The Fairness of Perfect Concurrent Signatures -- Applied Cryptography and Network Security -- Secure Set Membership Using 3Sat -- Left-to-Right Signed-Bit ?-Adic Representations of n Integers (Short Paper) -- Universal Designated Verifier Signature Without Delegatability -- Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper) -- Security Implementations -- A Fast RSA Implementation on Itanium 2 Processor -- Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) -- Threshold Implementations Against Side-Channel Attacks and Glitches -- Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper).
Altri titoli varianti ICICS 2006
Record Nr. UNINA-9910484642903321
Berlin ; ; New York, : Springer, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui