top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Innovative security solutions for information technology and communications : 13th international conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, revised selected papers / / Diana Maimut, Andrei-George Oprina, Damien Sauveron (editors)
Innovative security solutions for information technology and communications : 13th international conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, revised selected papers / / Diana Maimut, Andrei-George Oprina, Damien Sauveron (editors)
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (X, 303 p. 74 illus., 44 illus. in color.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
ISBN 3-030-69255-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Elementary Attestation of Cryptographically Useful Composite Moduli -- Off -the-Shelf Security Testing Platform for Contactless Systems -- A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption -- New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming -- Secure Card-based Cryptographic Protocols Using Private Operations Against Malicious Players -- Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers -- A Scalable Simulation of the BB84 Protocol Involving Eavesdropping -- Approach to Cryptography from Di erential Geometry with Example -- On using zk-SNARKs and zk-STARKs inblockchain-based identity management -- Manager asks: Which vulnerability must be eliminated first? -- An IND-CCA2 attack against the 1st- and 2nd-round versions of NTS-KEM -- Behaviour-based Biometrics for Continuous User Authentication to Industrial Collaborative Robots -- Secure Speaker Recognition System Using Homomorphic Encryption Reliable RFID Offline Privacy -- Virtualization and Automation for Cybersecurity Training and Experimentation -- Long-Term Secure Deniable Group Key Establishment -- Card-based Covert Lottery -- Hardware-Accelerated Cryptography for Software-Defined Networks -- with P4 -- Security Analysis Using Subjective Attack Trees.
Record Nr. UNISA-996464509103316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Innovative security solutions for information technology and communications : 13th international conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, revised selected papers / / Diana Maimut, Andrei-George Oprina, Damien Sauveron (editors)
Innovative security solutions for information technology and communications : 13th international conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, revised selected papers / / Diana Maimut, Andrei-George Oprina, Damien Sauveron (editors)
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (X, 303 p. 74 illus., 44 illus. in color.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
ISBN 3-030-69255-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Elementary Attestation of Cryptographically Useful Composite Moduli -- Off -the-Shelf Security Testing Platform for Contactless Systems -- A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption -- New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming -- Secure Card-based Cryptographic Protocols Using Private Operations Against Malicious Players -- Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers -- A Scalable Simulation of the BB84 Protocol Involving Eavesdropping -- Approach to Cryptography from Di erential Geometry with Example -- On using zk-SNARKs and zk-STARKs inblockchain-based identity management -- Manager asks: Which vulnerability must be eliminated first? -- An IND-CCA2 attack against the 1st- and 2nd-round versions of NTS-KEM -- Behaviour-based Biometrics for Continuous User Authentication to Industrial Collaborative Robots -- Secure Speaker Recognition System Using Homomorphic Encryption Reliable RFID Offline Privacy -- Virtualization and Automation for Cybersecurity Training and Experimentation -- Long-Term Secure Deniable Group Key Establishment -- Card-based Covert Lottery -- Hardware-Accelerated Cryptography for Software-Defined Networks -- with P4 -- Security Analysis Using Subjective Attack Trees.
Record Nr. UNINA-9910484214703321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui