top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology - ASIACRYPT 2000 [[electronic resource] ] : 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000 Proceedings / / edited by Tatsuaki Okamoto
Advances in Cryptology - ASIACRYPT 2000 [[electronic resource] ] : 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000 Proceedings / / edited by Tatsuaki Okamoto
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (XII, 636 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Algorithms
Management information systems
Computer science
Computer communication systems
Cryptology
Mathematics of Computing
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-540-44448-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis I -- Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers -- Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt ’99 -- Why Textbook ElGamal and RSA Encryption Are Insecure -- Cryptanalysis of the TTM Cryptosystem -- Attacking and Repairing Batch Verification Schemes -- IACR Distinguished Lecture -- Cryptography Everywhere -- Digital Signatures -- Security of Signed ElGamal Encryption -- From Fixed-Length to Arbitrary-Length RSA Padding Schemes -- Towards Signature-Only Signature Schemes -- A New Forward-Secure Digital Signature Scheme -- Unconditionally Secure Digital Signature Schemes Admitting Transferability -- Protocols I -- Efficient Secure Multi-party Computation -- Mix and Match: Secure Function Evaluation via Ciphertexts -- A Length-Invariant Hybrid Mix -- Attack for Flash MIX -- Distributed Oblivious Transfer -- Number Theoretic Algorithms -- Key Improvements to XTR -- Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders -- Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three -- Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems -- Symmetric-Key Schemes I -- Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis -- On the Pseudorandomness of Top-Level Schemes of Block Ciphers -- Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers -- Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography -- Protocols II -- Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes -- Addition of El Gamal Plaintexts -- Improved Methods to Perform Threshold RSA -- Commital Deniable Proofs and Electronic Campaign Finance -- Provably Secure Metering Scheme -- Invited Lecture -- CRYPTREC Project Cryptographic Evaluation Project for the Japanese Electronic Government -- Fingerprinting -- Anonymous Fingerprinting with Direct Non-repudiation -- Efficient Anonymous Fingerprinting with Group Signatures -- Zero-Knowledge and Provable Security -- Increasing the Power of the Dealer in Non-interactive Zero-Knowledge Proof Systems -- Zero-Knowledge and Code Obfuscation -- A Note on Security Proofs in the Generic Model -- Boolean Functions -- On Relationships among Avalanche, Nonlinearity, and Correlation Immunity -- Cryptanalysis II -- Cryptanalysis of the Yi-Lam Hash -- Power Analysis, What Is Now Possible... -- Pseudorandomness -- Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications -- Symmetric-Key Schemes II -- The Security of Chaffing and Winnowing -- Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm -- Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques -- Proofs of Security for the Unix Password Hashing Algorithm -- Public-Key Encryption and Key Distribution -- Trapdooring Discrete Logarithms on Elliptic Curves over Rings -- Strengthening McEliece Cryptosystem -- Password-Authenticated Key Exchange Based on RSA -- Round-Efficient Conference Key Agreement Protocols with Provable Security.
Record Nr. UNISA-996466009303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology - ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000 Proceedings / / edited by Tatsuaki Okamoto
Advances in Cryptology - ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000 Proceedings / / edited by Tatsuaki Okamoto
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (XII, 636 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Algorithms
Management information systems
Computer science
Computer communication systems
Cryptology
Mathematics of Computing
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-540-44448-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis I -- Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers -- Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt ’99 -- Why Textbook ElGamal and RSA Encryption Are Insecure -- Cryptanalysis of the TTM Cryptosystem -- Attacking and Repairing Batch Verification Schemes -- IACR Distinguished Lecture -- Cryptography Everywhere -- Digital Signatures -- Security of Signed ElGamal Encryption -- From Fixed-Length to Arbitrary-Length RSA Padding Schemes -- Towards Signature-Only Signature Schemes -- A New Forward-Secure Digital Signature Scheme -- Unconditionally Secure Digital Signature Schemes Admitting Transferability -- Protocols I -- Efficient Secure Multi-party Computation -- Mix and Match: Secure Function Evaluation via Ciphertexts -- A Length-Invariant Hybrid Mix -- Attack for Flash MIX -- Distributed Oblivious Transfer -- Number Theoretic Algorithms -- Key Improvements to XTR -- Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders -- Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three -- Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems -- Symmetric-Key Schemes I -- Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis -- On the Pseudorandomness of Top-Level Schemes of Block Ciphers -- Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers -- Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography -- Protocols II -- Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes -- Addition of El Gamal Plaintexts -- Improved Methods to Perform Threshold RSA -- Commital Deniable Proofs and Electronic Campaign Finance -- Provably Secure Metering Scheme -- Invited Lecture -- CRYPTREC Project Cryptographic Evaluation Project for the Japanese Electronic Government -- Fingerprinting -- Anonymous Fingerprinting with Direct Non-repudiation -- Efficient Anonymous Fingerprinting with Group Signatures -- Zero-Knowledge and Provable Security -- Increasing the Power of the Dealer in Non-interactive Zero-Knowledge Proof Systems -- Zero-Knowledge and Code Obfuscation -- A Note on Security Proofs in the Generic Model -- Boolean Functions -- On Relationships among Avalanche, Nonlinearity, and Correlation Immunity -- Cryptanalysis II -- Cryptanalysis of the Yi-Lam Hash -- Power Analysis, What Is Now Possible... -- Pseudorandomness -- Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications -- Symmetric-Key Schemes II -- The Security of Chaffing and Winnowing -- Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm -- Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques -- Proofs of Security for the Unix Password Hashing Algorithm -- Public-Key Encryption and Key Distribution -- Trapdooring Discrete Logarithms on Elliptic Curves over Rings -- Strengthening McEliece Cryptosystem -- Password-Authenticated Key Exchange Based on RSA -- Round-Efficient Conference Key Agreement Protocols with Provable Security.
Record Nr. UNINA-9910143608003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Financial Cryptography and Data Security [[electronic resource] ] : 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers / / edited by Rainer Böhme, Tatsuaki Okamoto
Financial Cryptography and Data Security [[electronic resource] ] : 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers / / edited by Rainer Böhme, Tatsuaki Okamoto
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIV, 574 p. 119 illus.)
Disciplina 332.178
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
E-commerce
Application software
Computer communication systems
Cryptology
Systems and Data Security
e-Commerce/e-business
Computer Appl. in Administrative Data Processing
Computer Communication Networks
ISBN 3-662-47854-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Sidechannels -- Cryptography in the cloud -- Payment and fraud detection -- Authentication and access control -- Cryptographic primitives -- Mobile security; privacy and incentives -- Applications and attacks -- Authenticated data structures.
Record Nr. UNISA-996215840403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Financial Cryptography and Data Security : 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers / / edited by Rainer Böhme, Tatsuaki Okamoto
Financial Cryptography and Data Security : 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers / / edited by Rainer Böhme, Tatsuaki Okamoto
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIV, 574 p. 119 illus.)
Disciplina 332.178
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
E-commerce
Application software
Computer communication systems
Cryptology
Systems and Data Security
e-Commerce/e-business
Computer Appl. in Administrative Data Processing
Computer Communication Networks
ISBN 3-662-47854-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Sidechannels -- Cryptography in the cloud -- Payment and fraud detection -- Authentication and access control -- Cryptographic primitives -- Mobile security; privacy and incentives -- Applications and attacks -- Authenticated data structures.
Record Nr. UNINA-9910483649203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings / / edited by Tatsuaki Okamoto, Jianying Zhou
Information and Communications Security [[electronic resource] ] : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings / / edited by Tatsuaki Okamoto, Jianying Zhou
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (XIV, 510 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Management information systems
Computer science
Information technology
Business—Data processing
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
IT in Business
ISBN 3-540-45600-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security of Blind Discrete Log Signatures against Interactive Attacks -- An Intelligent Intruder Model for Security Protocol Analysis -- Primitive Polynomials over GF(2) — A Cryptologic Approach -- Unconditionally-Secure Oblivious Transfer -- Cryptanalysis of the Improved User Efficient Blind Signatures -- Towards the Forgery of a Group Signature without Knowing the Group Center's Secret -- Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain -- A Cyclic Window Algorithm for ECC Defined over Extension Fields -- Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves -- Attacks on Two Digital Signature Schemes Based on Error Correcting Codes -- A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce -- A New Approach for Secure Multicast Routing in a Large Scale Network -- A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems -- Dealing with Uncertainties in Risk Analysis Using Belief Functions -- RBAC for XML Document Stores -- Cheating Immune Secret Sharing -- Encryption Sticks (Randomats) -- Applying NCP Logic to the Analysis of SSL 3.0 -- Performance of WTLS and Its Impact on an M-commerce Transaction -- Enforcing Obligation with Security Monitors -- Efficient Software Implementation for Finite Field Multiplication in Normal Basis -- Playing Lottery on the Internet -- Privacy Protection for Transactions of Digital Goods -- Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions -- Threshold Undeniable RSA Signature Scheme -- Two Simple Batch Verifying Multiple Digital Signatures -- Square Attack on Reduced Camellia Cipher -- Generalization of Elliptic Curve Digital Signature Schemes -- Reasoning about Accountability within Delegation -- A Novel Data Hiding Method for Two-Color Images -- An Identification Scheme Provably Secure against Reset Attack -- Estimating the Scalability of the Internet Key Exchange -- An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes -- Defeating Denial-of-Service Attacks on the Internet -- A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications -- A Unified Methodology for Verification and Synthesis of Firewall Configurations -- Quantifying Network Denial of Service: A Location Service Case Study -- A Public Key Cryptosystem Based on the Subgroup Membership Problem -- On a Network Security Model for the Secure Information Flow on Multilevel Secure Network -- NIDS Research Based on Artificial Immunology -- AMBAR Protocol: Access Management Based on Authorization Reduction -- Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication -- Dispatching Mobile Agents with Secure Routes in Parallel -- TH-SMS: Security Management System in Advanced Computational Infrastructure -- Cryptography and Middleware Security -- Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes -- A Role-Based Model for Access Control in Database Federations -- A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls -- A Digital Nominative Proxy Signature Scheme for Mobile Communication -- Hierarchical Simulation Model with Animation for Large Network Security -- Fair Electronic Cash Based on a Group Signature Scheme -- Fair Exchange of Digital Signatures with Offline Trusted Third Party -- SECUSIM: A Tool for the Cyber-Attack Simulation -- A New Semantics of Authentication Logic -- Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles -- Redundancy, Obscurity, Self-Containment & Independence.
Record Nr. UNISA-996465913503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings / / edited by Tatsuaki Okamoto, Jianying Zhou
Information and Communications Security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings / / edited by Tatsuaki Okamoto, Jianying Zhou
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (XIV, 510 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Management information systems
Computer science
Information technology
Business—Data processing
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
IT in Business
ISBN 3-540-45600-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security of Blind Discrete Log Signatures against Interactive Attacks -- An Intelligent Intruder Model for Security Protocol Analysis -- Primitive Polynomials over GF(2) — A Cryptologic Approach -- Unconditionally-Secure Oblivious Transfer -- Cryptanalysis of the Improved User Efficient Blind Signatures -- Towards the Forgery of a Group Signature without Knowing the Group Center's Secret -- Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain -- A Cyclic Window Algorithm for ECC Defined over Extension Fields -- Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves -- Attacks on Two Digital Signature Schemes Based on Error Correcting Codes -- A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce -- A New Approach for Secure Multicast Routing in a Large Scale Network -- A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems -- Dealing with Uncertainties in Risk Analysis Using Belief Functions -- RBAC for XML Document Stores -- Cheating Immune Secret Sharing -- Encryption Sticks (Randomats) -- Applying NCP Logic to the Analysis of SSL 3.0 -- Performance of WTLS and Its Impact on an M-commerce Transaction -- Enforcing Obligation with Security Monitors -- Efficient Software Implementation for Finite Field Multiplication in Normal Basis -- Playing Lottery on the Internet -- Privacy Protection for Transactions of Digital Goods -- Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions -- Threshold Undeniable RSA Signature Scheme -- Two Simple Batch Verifying Multiple Digital Signatures -- Square Attack on Reduced Camellia Cipher -- Generalization of Elliptic Curve Digital Signature Schemes -- Reasoning about Accountability within Delegation -- A Novel Data Hiding Method for Two-Color Images -- An Identification Scheme Provably Secure against Reset Attack -- Estimating the Scalability of the Internet Key Exchange -- An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes -- Defeating Denial-of-Service Attacks on the Internet -- A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications -- A Unified Methodology for Verification and Synthesis of Firewall Configurations -- Quantifying Network Denial of Service: A Location Service Case Study -- A Public Key Cryptosystem Based on the Subgroup Membership Problem -- On a Network Security Model for the Secure Information Flow on Multilevel Secure Network -- NIDS Research Based on Artificial Immunology -- AMBAR Protocol: Access Management Based on Authorization Reduction -- Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication -- Dispatching Mobile Agents with Secure Routes in Parallel -- TH-SMS: Security Management System in Advanced Computational Infrastructure -- Cryptography and Middleware Security -- Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes -- A Role-Based Model for Access Control in Database Federations -- A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls -- A Digital Nominative Proxy Signature Scheme for Mobile Communication -- Hierarchical Simulation Model with Animation for Large Network Security -- Fair Electronic Cash Based on a Group Signature Scheme -- Fair Exchange of Digital Signatures with Offline Trusted Third Party -- SECUSIM: A Tool for the Cyber-Attack Simulation -- A New Semantics of Authentication Logic -- Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles -- Redundancy, Obscurity, Self-Containment & Independence.
Record Nr. UNINA-9910143613103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings
Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings
Pubbl/distr/stampa [Place of publication not identified], : Springer, 1997
Disciplina 005.8
Collana Lecture notes in computer science Information and communications security
Soggetto topico Computer security - Congresses
Telecommunication systems - Security measures - Congresses
Computer Science
Engineering & Applied Sciences
ISBN 978-3-540-69628-5
3-540-63696-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465740203316
[Place of publication not identified], : Springer, 1997
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings
Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings
Pubbl/distr/stampa [Place of publication not identified], : Springer, 1997
Disciplina 005.8
Collana Lecture notes in computer science Information and communications security
Soggetto topico Computer security - Congresses
Telecommunication systems - Security measures - Congresses
Computer Science
Engineering & Applied Sciences
ISBN 978-3-540-69628-5
3-540-63696-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484736903321
[Place of publication not identified], : Springer, 1997
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Provable Security [[electronic resource] ] : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / / edited by Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li
Provable Security [[electronic resource] ] : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / / edited by Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 508 p. 37 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Application software
Management information systems
Computer science
Algorithms
Cryptology
Systems and Data Security
Computers and Society
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
ISBN 3-319-68637-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure Cloud Storage and Computing -- Digital Signature and Authentication -- Authenticated Encryption and Key Exchange.- Security Models -- Lattice and Post-Quantum Cryptography -- Public Key Encryption and Signcryption -- Proxy Re-encryption and Functional Encryption -- Protocols.
Record Nr. UNISA-996465291403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / / edited by Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li
Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / / edited by Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 508 p. 37 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Application software
Management information systems
Computer science
Algorithms
Cryptology
Systems and Data Security
Computers and Society
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
ISBN 3-319-68637-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure Cloud Storage and Computing -- Digital Signature and Authentication -- Authenticated Encryption and Key Exchange.- Security Models -- Lattice and Post-Quantum Cryptography -- Public Key Encryption and Signcryption -- Proxy Re-encryption and Functional Encryption -- Protocols.
Record Nr. UNINA-9910484168403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui