top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied Cryptography and Network Security [[electronic resource] ] : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / / edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
Applied Cryptography and Network Security [[electronic resource] ] : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / / edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 698 p. 152 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Computers
Computers and civilization
Systems and Data Security
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Theory of Computation
Computers and Society
ISBN 3-319-28166-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness.
Record Nr. UNISA-996466370003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / / edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
Applied Cryptography and Network Security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers / / edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 698 p. 152 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Computers
Computers and civilization
Systems and Data Security
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Theory of Computation
Computers and Society
ISBN 3-319-28166-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness.
Record Nr. UNINA-9910483660403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 412 p. 114 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Operating systems (Computers)
Computers
Law and legislation
Computers and civilization
Application software
Data encryption (Computer science)
Systems and Data Security
Operating Systems
Legal Aspects of Computing
Computers and Society
Information Systems Applications (incl. Internet)
Cryptology
ISBN 3-319-60876-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security.
Record Nr. UNISA-996466460303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier
Detection of Intrusions and Malware, and Vulnerability Assessment : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 412 p. 114 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Operating systems (Computers)
Computers
Law and legislation
Computers and civilization
Application software
Data encryption (Computer science)
Systems and Data Security
Operating Systems
Legal Aspects of Computing
Computers and Society
Information Systems Applications (incl. Internet)
Cryptology
ISBN 3-319-60876-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security.
Record Nr. UNINA-9910484228403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings / / edited by Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis
Information Security [[electronic resource] ] : 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings / / edited by Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XI, 488 p. 247 illus., 99 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer networks - Security measures
Computer communication systems
Software engineering
Computers
Systems and Data Security
Mobile and Network Security
Computer Communication Networks
Software Engineering/Programming and Operating Systems
Information Systems and Communication Service
ISBN 3-030-30215-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attacks and Cryptanalysis -- Crypto I: Secure Computation and Storage -- Machine Learning and Security -- Crypto II: Zero-Knowledge Proofs -- Defenses -- Web Security -- Side Channels -- Malware Analysis -- Crypto III: Signatures and Authentication.
Record Nr. UNISA-996466441203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security : 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings / / edited by Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis
Information Security : 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings / / edited by Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XI, 488 p. 247 illus., 99 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer networks - Security measures
Computer communication systems
Software engineering
Computers
Systems and Data Security
Mobile and Network Security
Computer Communication Networks
Software Engineering/Programming and Operating Systems
Information Systems and Communication Service
ISBN 3-030-30215-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attacks and Cryptanalysis -- Crypto I: Secure Computation and Storage -- Machine Learning and Security -- Crypto II: Zero-Knowledge Proofs -- Defenses -- Web Security -- Side Channels -- Malware Analysis -- Crypto III: Signatures and Authentication.
Record Nr. UNINA-9910349300203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Research in Attacks, Intrusions, and Defenses [[electronic resource] ] : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings / / edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis
Research in Attacks, Intrusions, and Defenses [[electronic resource] ] : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings / / edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 496 p. 115 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Operating systems (Computers)
Systems and Data Security
Security
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
Operating Systems
ISBN 3-319-66332-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices -- Static Program Analysis as a Fuzzing Aid -- Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit -- Lens on the endpoint: Hunting for malicious software through endpoint data analysis -- Redemption: Real-time Protection Against Ransomware at End-Hosts -- ILAB: An Interactive Labelling Strategy for Intrusion Detection -- Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps -- Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level -- Android Malware Clustering through Malicious Payload Mining -- Stealth Loader: Trace-free Program Loading for API Obfuscation -- LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization -- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers            -- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises -- BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems -- Trapped by the UI: The Android case -- Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults -- Secure In-Cache Execution -- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage -- Linking Amplification DDoS Attacks to Booter Services -- Practical and Accurate Runtime Application Protection against DoS Attacks -- Exploring the ecosystem of malicious domain registrations in the .eu TLD.
Record Nr. UNISA-996465562803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Research in Attacks, Intrusions, and Defenses : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings / / edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis
Research in Attacks, Intrusions, and Defenses : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings / / edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 496 p. 115 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Operating systems (Computers)
Systems and Data Security
Security
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
Operating Systems
ISBN 3-319-66332-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices -- Static Program Analysis as a Fuzzing Aid -- Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit -- Lens on the endpoint: Hunting for malicious software through endpoint data analysis -- Redemption: Real-time Protection Against Ransomware at End-Hosts -- ILAB: An Interactive Labelling Strategy for Intrusion Detection -- Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps -- Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level -- Android Malware Clustering through Malicious Payload Mining -- Stealth Loader: Trace-free Program Loading for API Obfuscation -- LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization -- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers            -- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises -- BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems -- Trapped by the UI: The Android case -- Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults -- Secure In-Cache Execution -- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage -- Linking Amplification DDoS Attacks to Booter Services -- Practical and Accurate Runtime Application Protection against DoS Attacks -- Exploring the ecosystem of malicious domain registrations in the .eu TLD.
Record Nr. UNINA-9910484794103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui