Applied Cryptography and Network Security [[electronic resource] ] : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / / edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVIII, 698 p. 152 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Management information systems Computer science Computers Computers and civilization Systems and Data Security Cryptology Computer Communication Networks Management of Computing and Information Systems Theory of Computation Computers and Society |
ISBN | 3-319-28166-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness. |
Record Nr. | UNISA-996466370003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Cryptography and Network Security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / / edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVIII, 698 p. 152 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Management information systems Computer science Computers Computers and civilization Systems and Data Security Cryptology Computer Communication Networks Management of Computing and Information Systems Theory of Computation Computers and Society |
ISBN | 3-319-28166-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness. |
Record Nr. | UNINA-9910483660403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 412 p. 114 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Operating systems (Computers) Computers Law and legislation Computers and civilization Application software Data encryption (Computer science) Systems and Data Security Operating Systems Legal Aspects of Computing Computers and Society Information Systems Applications (incl. Internet) Cryptology |
ISBN | 3-319-60876-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security. |
Record Nr. | UNISA-996466460303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 412 p. 114 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Operating systems (Computers) Computers Law and legislation Computers and civilization Application software Data encryption (Computer science) Systems and Data Security Operating Systems Legal Aspects of Computing Computers and Society Information Systems Applications (incl. Internet) Cryptology |
ISBN | 3-319-60876-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security. |
Record Nr. | UNINA-9910484228403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security [[electronic resource] ] : 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings / / edited by Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XI, 488 p. 247 illus., 99 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer networks - Security measures Computer communication systems Software engineering Computers Systems and Data Security Mobile and Network Security Computer Communication Networks Software Engineering/Programming and Operating Systems Information Systems and Communication Service |
ISBN | 3-030-30215-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Attacks and Cryptanalysis -- Crypto I: Secure Computation and Storage -- Machine Learning and Security -- Crypto II: Zero-Knowledge Proofs -- Defenses -- Web Security -- Side Channels -- Malware Analysis -- Crypto III: Signatures and Authentication. |
Record Nr. | UNISA-996466441203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security : 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings / / edited by Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XI, 488 p. 247 illus., 99 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer networks - Security measures Computer communication systems Software engineering Computers Systems and Data Security Mobile and Network Security Computer Communication Networks Software Engineering/Programming and Operating Systems Information Systems and Communication Service |
ISBN | 3-030-30215-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Attacks and Cryptanalysis -- Crypto I: Secure Computation and Storage -- Machine Learning and Security -- Crypto II: Zero-Knowledge Proofs -- Defenses -- Web Security -- Side Channels -- Malware Analysis -- Crypto III: Signatures and Authentication. |
Record Nr. | UNINA-9910349300203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Research in Attacks, Intrusions, and Defenses [[electronic resource] ] : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings / / edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 496 p. 115 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data protection Data encryption (Computer science) Management information systems Computer science Computer communication systems Operating systems (Computers) Systems and Data Security Security Cryptology Management of Computing and Information Systems Computer Communication Networks Operating Systems |
ISBN | 3-319-66332-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices -- Static Program Analysis as a Fuzzing Aid -- Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit -- Lens on the endpoint: Hunting for malicious software through endpoint data analysis -- Redemption: Real-time Protection Against Ransomware at End-Hosts -- ILAB: An Interactive Labelling Strategy for Intrusion Detection -- Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps -- Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level -- Android Malware Clustering through Malicious Payload Mining -- Stealth Loader: Trace-free Program Loading for API Obfuscation -- LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization -- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers -- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises -- BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems -- Trapped by the UI: The Android case -- Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults -- Secure In-Cache Execution -- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage -- Linking Amplification DDoS Attacks to Booter Services -- Practical and Accurate Runtime Application Protection against DoS Attacks -- Exploring the ecosystem of malicious domain registrations in the .eu TLD. |
Record Nr. | UNISA-996465562803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Research in Attacks, Intrusions, and Defenses : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings / / edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 496 p. 115 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data protection Data encryption (Computer science) Management information systems Computer science Computer communication systems Operating systems (Computers) Systems and Data Security Security Cryptology Management of Computing and Information Systems Computer Communication Networks Operating Systems |
ISBN | 3-319-66332-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices -- Static Program Analysis as a Fuzzing Aid -- Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit -- Lens on the endpoint: Hunting for malicious software through endpoint data analysis -- Redemption: Real-time Protection Against Ransomware at End-Hosts -- ILAB: An Interactive Labelling Strategy for Intrusion Detection -- Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps -- Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level -- Android Malware Clustering through Malicious Payload Mining -- Stealth Loader: Trace-free Program Loading for API Obfuscation -- LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization -- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers -- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises -- BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems -- Trapped by the UI: The Android case -- Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults -- Secure In-Cache Execution -- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage -- Linking Amplification DDoS Attacks to Booter Services -- Practical and Accurate Runtime Application Protection against DoS Attacks -- Exploring the ecosystem of malicious domain registrations in the .eu TLD. |
Record Nr. | UNINA-9910484794103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|