Computer security - ESORICS 2009 : 14th European symposium on research in computer security, Saint-Malo, France, September 21-23, 2009 : proceedings / / Michael Backes, Peng Ning (eds.)
| Computer security - ESORICS 2009 : 14th European symposium on research in computer security, Saint-Malo, France, September 21-23, 2009 : proceedings / / Michael Backes, Peng Ning (eds.) |
| Edizione | [1st ed. 2009.] |
| Pubbl/distr/stampa | Berlin ; ; hHeidelberg, : Springer-Verlag, 2009 |
| Descrizione fisica | 1 online resource (XVI, 706 p.) |
| Disciplina | 005.822gerDNB |
| Altri autori (Persone) |
BackesMichael
NingPeng |
| Collana | Lecture notes in computer science |
| Soggetto topico |
Computer security
Computers - Access control |
| ISBN | 3-642-04444-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Network Security I -- Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones -- User-Centric Handling of Identity Agent Compromise -- The Coremelt Attack -- Type-Based Analysis of PIN Processing APIs -- Declassification with Explicit Reference Points -- Tracking Information Flow in Dynamic Tree Structures -- Network Security II -- Lightweight Opportunistic Tunneling (LOT) -- Hide and Seek in Time — Robust Covert Timing Channels -- Authentic Time-Stamps for Archival Storage -- Towards a Theory of Accountability and Audit -- Reliable Evidence: Auditability by Typing -- PCAL: Language Support for Proof-Carrying Authorization Systems -- Network Security III -- ReFormat: Automatic Reverse Engineering of Encrypted Messages -- Protocol Normalization Using Attribute Grammars -- Automatically Generating Models for Botnet Detection -- Dynamic Enforcement of Abstract Separation of Duty Constraints -- Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging -- Requirements and Protocols for Inference-Proof Interactions in Information Systems -- A Privacy Preservation Model for Facebook-Style Social Network Systems -- New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing -- Secure Pseudonymous Channels -- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing -- Content Delivery Networks: Protection or Threat? -- Model-Checking DoS Amplification for VoIP Session Initiation -- The Wisdom of Crowds: Attacks and Optimal Constructions -- Secure Evaluation of Private Linear Branching Programs with Medical Applications -- Keep a Few: Outsourcing Data While Maintaining Confidentiality -- Data Structures with Unpredictable Timing -- WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance -- Corruption-Localizing Hashing -- Isolating JavaScript with Filters, Rewriting, and Wrappers -- An Effective Method for Combating Malicious Scripts Clickbots -- Client-Side Detection of XSS Worms by Monitoring Payload Propagation -- Formal Indistinguishability Extended to the Random Oracle Model -- Computationally Sound Analysis of a Probabilistic Contract Signing Protocol -- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption -- A Generic Security API for Symmetric Key Management on Cryptographic Devices -- ID-Based Secure Distance Bounding and Localization -- Secure Ownership and Ownership Transfer in RFID Systems -- Cumulative Attestation Kernels for Embedded Systems -- Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries -- Set Covering Problems in Role-Based Access Control. |
| Record Nr. | UNINA-9910483357103321 |
| Berlin ; ; hHeidelberg, : Springer-Verlag, 2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Security -- ESORICS 2009 [[electronic resource] ] : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings / / edited by Michael Backes, Peng Ning
| Computer Security -- ESORICS 2009 [[electronic resource] ] : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings / / edited by Michael Backes, Peng Ning |
| Edizione | [1st ed. 2009.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
| Descrizione fisica | 1 online resource (XVI, 706 p.) |
| Disciplina | 005.822gerDNB |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Data structures (Computer science) Computer science—Mathematics E-commerce Systems and Data Security Cryptology Coding and Information Theory Data Structures and Information Theory Discrete Mathematics in Computer Science e-Commerce/e-business |
| ISBN | 3-642-04444-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Network Security I -- Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones -- User-Centric Handling of Identity Agent Compromise -- The Coremelt Attack -- Type-Based Analysis of PIN Processing APIs -- Declassification with Explicit Reference Points -- Tracking Information Flow in Dynamic Tree Structures -- Network Security II -- Lightweight Opportunistic Tunneling (LOT) -- Hide and Seek in Time — Robust Covert Timing Channels -- Authentic Time-Stamps for Archival Storage -- Towards a Theory of Accountability and Audit -- Reliable Evidence: Auditability by Typing -- PCAL: Language Support for Proof-Carrying Authorization Systems -- Network Security III -- ReFormat: Automatic Reverse Engineering of Encrypted Messages -- Protocol Normalization Using Attribute Grammars -- Automatically Generating Models for Botnet Detection -- Dynamic Enforcement of Abstract Separation of Duty Constraints -- Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging -- Requirements and Protocols for Inference-Proof Interactions in Information Systems -- A Privacy Preservation Model for Facebook-Style Social Network Systems -- New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing -- Secure Pseudonymous Channels -- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing -- Content Delivery Networks: Protection or Threat? -- Model-Checking DoS Amplification for VoIP Session Initiation -- The Wisdom of Crowds: Attacks and Optimal Constructions -- Secure Evaluation of Private Linear Branching Programs with Medical Applications -- Keep a Few: Outsourcing Data While Maintaining Confidentiality -- Data Structures with Unpredictable Timing -- WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance -- Corruption-Localizing Hashing -- Isolating JavaScript with Filters, Rewriting, and Wrappers -- An Effective Method for Combating Malicious Scripts Clickbots -- Client-Side Detection of XSS Worms by Monitoring Payload Propagation -- Formal Indistinguishability Extended to the Random Oracle Model -- Computationally Sound Analysis of a Probabilistic Contract Signing Protocol -- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption -- A Generic Security API for Symmetric Key Management on Cryptographic Devices -- ID-Based Secure Distance Bounding and Localization -- Secure Ownership and Ownership Transfer in RFID Systems -- Cumulative Attestation Kernels for Embedded Systems -- Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries -- Set Covering Problems in Role-Based Access Control. |
| Record Nr. | UNISA-996465663603316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and Communications Security [[electronic resource] ] : 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings / / edited by Peng Ning, Ninghui Li
| Information and Communications Security [[electronic resource] ] : 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings / / edited by Peng Ning, Ninghui Li |
| Edizione | [1st ed. 2006.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
| Descrizione fisica | 1 online resource (XIV, 562 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Computers and civilization Computer communication systems Algorithms Cryptology Systems and Data Security Management of Computing and Information Systems Computers and Society Computer Communication Networks Algorithm Analysis and Problem Complexity |
| ISBN | 3-540-49497-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving Fair Exchange in Byzantine Environments -- A Security Analysis of the Precise Time Protocol (Short Paper) -- Applied Crytography -- An Identity-Based Proxy Signature Scheme from Pairings -- Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper) -- Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper) -- Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size -- Trace-Driven Cache Attacks on AES (Short Paper) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols -- Defining and Measuring Policy Coverage in Testing Access Control Policies -- Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper) -- An Operating System Design for the Security Architecture for Microprocessors -- Privacy and Malicious Code -- Point-Based Trust: Define How Much Privacy Is Worth -- Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets -- Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper) -- An Anonymous Authentication Scheme for Identification Card -- A Wireless Covert Channel on Smart Cards (Short Paper) -- Network Security -- From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution -- Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper) -- Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario -- An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper) -- Systems Security -- Provably Correct Runtime Enforcement of Non-interference Properties -- An Attack on SMC-Based Software Protection -- Modular Behavior Profiles in Systems with Shared Libraries (Short Paper) -- Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic -- Cryptanalysis -- Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards -- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper) -- Seifert’s RSA Fault Attack: Simplified Analysis and Generalizations -- The Fairness of Perfect Concurrent Signatures -- Applied Cryptography and Network Security -- Secure Set Membership Using 3Sat -- Left-to-Right Signed-Bit ?-Adic Representations of n Integers (Short Paper) -- Universal Designated Verifier Signature Without Delegatability -- Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper) -- Security Implementations -- A Fast RSA Implementation on Itanium 2 Processor -- Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) -- Threshold Implementations Against Side-Channel Attacks and Glitches -- Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper). |
| Record Nr. | UNISA-996466121003316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and communications security : 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings / / Peng Ning, Sihan Qing, Ninghui Li (eds.)
| Information and communications security : 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings / / Peng Ning, Sihan Qing, Ninghui Li (eds.) |
| Edizione | [1st ed. 2006.] |
| Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2006 |
| Descrizione fisica | 1 online resource (XIV, 562 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
NingPeng
QingSihan LiNinghui |
| Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
| Soggetto topico |
Computer security
Telecommunication systems - Security measures |
| ISBN | 3-540-49497-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving Fair Exchange in Byzantine Environments -- A Security Analysis of the Precise Time Protocol (Short Paper) -- Applied Crytography -- An Identity-Based Proxy Signature Scheme from Pairings -- Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper) -- Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper) -- Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size -- Trace-Driven Cache Attacks on AES (Short Paper) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols -- Defining and Measuring Policy Coverage in Testing Access Control Policies -- Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper) -- An Operating System Design for the Security Architecture for Microprocessors -- Privacy and Malicious Code -- Point-Based Trust: Define How Much Privacy Is Worth -- Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets -- Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper) -- An Anonymous Authentication Scheme for Identification Card -- A Wireless Covert Channel on Smart Cards (Short Paper) -- Network Security -- From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution -- Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper) -- Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario -- An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper) -- Systems Security -- Provably Correct Runtime Enforcement of Non-interference Properties -- An Attack on SMC-Based Software Protection -- Modular Behavior Profiles in Systems with Shared Libraries (Short Paper) -- Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic -- Cryptanalysis -- Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards -- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper) -- Seifert’s RSA Fault Attack: Simplified Analysis and Generalizations -- The Fairness of Perfect Concurrent Signatures -- Applied Cryptography and Network Security -- Secure Set Membership Using 3Sat -- Left-to-Right Signed-Bit ?-Adic Representations of n Integers (Short Paper) -- Universal Designated Verifier Signature Without Delegatability -- Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper) -- Security Implementations -- A Fast RSA Implementation on Itanium 2 Processor -- Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) -- Threshold Implementations Against Side-Channel Attacks and Glitches -- Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper). |
| Altri titoli varianti | ICICS 2006 |
| Record Nr. | UNINA-9910484642903321 |
| Berlin ; ; New York, : Springer, c2006 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||