top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Bitcoin & protocoles à blockchain : comprendre l'avènement de la seconde ère numérique / / Jacques Favier, Jean-Samuel Lécrivain et Adli Takkal-Bataille ; préface de Jean-Jacques Quisquater
Bitcoin & protocoles à blockchain : comprendre l'avènement de la seconde ère numérique / / Jacques Favier, Jean-Samuel Lécrivain et Adli Takkal-Bataille ; préface de Jean-Jacques Quisquater
Autore Favier Jacques
Pubbl/distr/stampa Bruxelles : , : Mardaga, , [2019]
Descrizione fisica 1 online resource (153 pages) : ill
Disciplina 332.178
Collana Gestion, Entreprise, Finance
Soggetto topico Bitcoin
virtual currency
blockchain
Soggetto genere / forma Electronic books.
Classificazione 64.16
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione fre
Record Nr. UNINA-9910467322903321
Favier Jacques  
Bruxelles : , : Mardaga, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bitcoin & protocoles à blockchain : comprendre l'avènement de la seconde ère numérique / / Jacques Favier, Jean-Samuel Lécrivain et Adli Takkal-Bataille ; préface de Jean-Jacques Quisquater
Bitcoin & protocoles à blockchain : comprendre l'avènement de la seconde ère numérique / / Jacques Favier, Jean-Samuel Lécrivain et Adli Takkal-Bataille ; préface de Jean-Jacques Quisquater
Autore Favier Jacques
Pubbl/distr/stampa Bruxelles : , : Mardaga, , [2019]
Descrizione fisica 1 online resource (153 pages) : ill
Disciplina 332.178
Collana Gestion, Entreprise, Finance
Soggetto topico Bitcoin
virtual currency
blockchain
Classificazione 64.16
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione fre
Record Nr. UNINA-9910793660203321
Favier Jacques  
Bruxelles : , : Mardaga, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bitcoin & protocoles à blockchain : comprendre l'avènement de la seconde ère numérique / / Jacques Favier, Jean-Samuel Lécrivain et Adli Takkal-Bataille ; préface de Jean-Jacques Quisquater
Bitcoin & protocoles à blockchain : comprendre l'avènement de la seconde ère numérique / / Jacques Favier, Jean-Samuel Lécrivain et Adli Takkal-Bataille ; préface de Jean-Jacques Quisquater
Autore Favier Jacques
Pubbl/distr/stampa Bruxelles : , : Mardaga, , [2019]
Descrizione fisica 1 online resource (153 pages) : ill
Disciplina 332.178
Collana Gestion, Entreprise, Finance
Soggetto topico Bitcoin
virtual currency
blockchain
Classificazione 64.16
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione fre
Record Nr. UNINA-9910813800303321
Favier Jacques  
Bruxelles : , : Mardaga, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (X, 382 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Management information systems
Computer science
Computer communication systems
Cryptology
Operating Systems
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-540-49784-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fixed vs. variable-length patterns for detecting suspicious process behavior -- A tool for pro-active defense against the buffer overrun attack -- A kernelized architecture for multilevel secure application policies -- Dealing with multi-policy security in large open distributed systems -- A flexible method for information system security policy specification -- On the security of some variants of the RSA signature scheme -- Side channel cryptanalysis of product ciphers -- On the security of digital tachographs -- An authorization model and its formal semantics -- Authorization in CORBA security -- Rules for designing multilevel Object-Oriented Databases -- Byte code verification for Java smart cards based on model checking -- Towards formalizing the Java security architecture of JDK 1.2 -- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets -- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video -- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system -- The “ticket” concept for copy control based on embedded signalling -- Panel session: Watermarking -- Authentication and payment in future mobile systems -- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks -- A mix-mediated anonymity service and its payment -- A subjective metric of authentication -- A sound logic for analysing electronic commerce protocols -- Kerberos Version IV: Inductive analysis of the secrecy goals.
Record Nr. UNISA-996466151003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (X, 382 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Management information systems
Computer science
Computer communication systems
Cryptology
Operating Systems
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-540-49784-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fixed vs. variable-length patterns for detecting suspicious process behavior -- A tool for pro-active defense against the buffer overrun attack -- A kernelized architecture for multilevel secure application policies -- Dealing with multi-policy security in large open distributed systems -- A flexible method for information system security policy specification -- On the security of some variants of the RSA signature scheme -- Side channel cryptanalysis of product ciphers -- On the security of digital tachographs -- An authorization model and its formal semantics -- Authorization in CORBA security -- Rules for designing multilevel Object-Oriented Databases -- Byte code verification for Java smart cards based on model checking -- Towards formalizing the Java security architecture of JDK 1.2 -- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets -- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video -- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system -- The “ticket” concept for copy control based on embedded signalling -- Panel session: Watermarking -- Authentication and payment in future mobile systems -- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks -- A mix-mediated anonymity service and its payment -- A subjective metric of authentication -- A sound logic for analysing electronic commerce protocols -- Kerberos Version IV: Inductive analysis of the secrecy goals.
Record Nr. UNINA-9910768472703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks [[electronic resource] ] : Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings / / edited by Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks [[electronic resource] ] : Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings / / edited by Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XII, 167 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer security
Data structures (Computer science)
Coding theory
Information theory
Computer science—Mathematics
Cryptology
Computer Communication Networks
Systems and Data Security
Data Structures and Information Theory
Coding and Information Theory
Symbolic and Algebraic Manipulation
ISBN 3-642-03944-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mobility -- On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks -- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems -- Privacy-Aware Location Database Service for Granular Queries -- Attacks and Secure Implementations -- Algebraic Attacks on RFID Protocols -- Anti-counterfeiting Using Memory Spots -- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations -- Performance and Security -- Measurement Analysis When Benchmarking Java Card Platforms -- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card -- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks -- Cryptography -- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks -- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure -- PKIX Certificate Status in Hybrid MANETs.
Record Nr. UNISA-996465288903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The New Codebreakers [[electronic resource] ] : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday / / edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater
The New Codebreakers [[electronic resource] ] : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday / / edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 551 p. 135 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Algorithms
Application software
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
ISBN 3-662-49301-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto History -- Mary of Guise’s enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa. .
Record Nr. UNISA-996466045503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday / / edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater
The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday / / edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 551 p. 135 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Algorithms
Application software
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
ISBN 3-662-49301-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto History -- Mary of Guise’s enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa. .
Record Nr. UNINA-9910483434703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings / / Jean-Jacques Quisquater, Bruce Schneier (eds.)
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings / / Jean-Jacques Quisquater, Bruce Schneier (eds.)
Pubbl/distr/stampa Springer Berlin Heidelberg
Disciplina 332.7/6
Altri autori (Persone) QuisquaterJean-Jacques
SchneierBruce
Soggetto topico Smart cards
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466140203316
Springer Berlin Heidelberg
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings / / Jean-Jacques Quisquater, Bruce Schneier (eds.)
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings / / Jean-Jacques Quisquater, Bruce Schneier (eds.)
Pubbl/distr/stampa Springer Berlin Heidelberg
Disciplina 332.7/6
Altri autori (Persone) QuisquaterJean-Jacques
SchneierBruce
Soggetto topico Smart cards
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910144123603321
Springer Berlin Heidelberg
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui