Bitcoin & protocoles à blockchain : comprendre l'avènement de la seconde ère numérique / / Jacques Favier, Jean-Samuel Lécrivain et Adli Takkal-Bataille ; préface de Jean-Jacques Quisquater |
Autore | Favier Jacques |
Pubbl/distr/stampa | Bruxelles : , : Mardaga, , [2019] |
Descrizione fisica | 1 online resource (153 pages) : ill |
Disciplina | 332.178 |
Collana | Gestion, Entreprise, Finance |
Soggetto topico |
Bitcoin
virtual currency blockchain |
Soggetto genere / forma | Electronic books. |
Classificazione | 64.16 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Record Nr. | UNINA-9910467322903321 |
Favier Jacques | ||
Bruxelles : , : Mardaga, , [2019] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Bitcoin & protocoles à blockchain : comprendre l'avènement de la seconde ère numérique / / Jacques Favier, Jean-Samuel Lécrivain et Adli Takkal-Bataille ; préface de Jean-Jacques Quisquater |
Autore | Favier Jacques |
Pubbl/distr/stampa | Bruxelles : , : Mardaga, , [2019] |
Descrizione fisica | 1 online resource (153 pages) : ill |
Disciplina | 332.178 |
Collana | Gestion, Entreprise, Finance |
Soggetto topico |
Bitcoin
virtual currency blockchain |
Classificazione | 64.16 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Record Nr. | UNINA-9910793660203321 |
Favier Jacques | ||
Bruxelles : , : Mardaga, , [2019] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Bitcoin & protocoles à blockchain : comprendre l'avènement de la seconde ère numérique / / Jacques Favier, Jean-Samuel Lécrivain et Adli Takkal-Bataille ; préface de Jean-Jacques Quisquater |
Autore | Favier Jacques |
Pubbl/distr/stampa | Bruxelles : , : Mardaga, , [2019] |
Descrizione fisica | 1 online resource (153 pages) : ill |
Disciplina | 332.178 |
Collana | Gestion, Entreprise, Finance |
Soggetto topico |
Bitcoin
virtual currency blockchain |
Classificazione | 64.16 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Record Nr. | UNINA-9910813800303321 |
Favier Jacques | ||
Bruxelles : , : Mardaga, , [2019] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 |
Descrizione fisica | 1 online resource (X, 382 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Management information systems Computer science Computer communication systems Cryptology Operating Systems Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-540-49784-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fixed vs. variable-length patterns for detecting suspicious process behavior -- A tool for pro-active defense against the buffer overrun attack -- A kernelized architecture for multilevel secure application policies -- Dealing with multi-policy security in large open distributed systems -- A flexible method for information system security policy specification -- On the security of some variants of the RSA signature scheme -- Side channel cryptanalysis of product ciphers -- On the security of digital tachographs -- An authorization model and its formal semantics -- Authorization in CORBA security -- Rules for designing multilevel Object-Oriented Databases -- Byte code verification for Java smart cards based on model checking -- Towards formalizing the Java security architecture of JDK 1.2 -- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets -- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video -- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system -- The “ticket” concept for copy control based on embedded signalling -- Panel session: Watermarking -- Authentication and payment in future mobile systems -- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks -- A mix-mediated anonymity service and its payment -- A subjective metric of authentication -- A sound logic for analysing electronic commerce protocols -- Kerberos Version IV: Inductive analysis of the secrecy goals. |
Record Nr. | UNISA-996466151003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security - ESORICS 98 [[electronic resource] ] : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings / / edited by Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 |
Descrizione fisica | 1 online resource (X, 382 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Management information systems Computer science Computer communication systems Cryptology Operating Systems Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-540-49784-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fixed vs. variable-length patterns for detecting suspicious process behavior -- A tool for pro-active defense against the buffer overrun attack -- A kernelized architecture for multilevel secure application policies -- Dealing with multi-policy security in large open distributed systems -- A flexible method for information system security policy specification -- On the security of some variants of the RSA signature scheme -- Side channel cryptanalysis of product ciphers -- On the security of digital tachographs -- An authorization model and its formal semantics -- Authorization in CORBA security -- Rules for designing multilevel Object-Oriented Databases -- Byte code verification for Java smart cards based on model checking -- Towards formalizing the Java security architecture of JDK 1.2 -- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets -- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video -- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system -- The “ticket” concept for copy control based on embedded signalling -- Panel session: Watermarking -- Authentication and payment in future mobile systems -- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks -- A mix-mediated anonymity service and its payment -- A subjective metric of authentication -- A sound logic for analysing electronic commerce protocols -- Kerberos Version IV: Inductive analysis of the secrecy goals. |
Record Nr. | UNINA-9910768472703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks [[electronic resource] ] : Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings / / edited by Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XII, 167 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer security Data structures (Computer science) Coding theory Information theory Computer science—Mathematics Cryptology Computer Communication Networks Systems and Data Security Data Structures and Information Theory Coding and Information Theory Symbolic and Algebraic Manipulation |
ISBN | 3-642-03944-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Mobility -- On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks -- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems -- Privacy-Aware Location Database Service for Granular Queries -- Attacks and Secure Implementations -- Algebraic Attacks on RFID Protocols -- Anti-counterfeiting Using Memory Spots -- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations -- Performance and Security -- Measurement Analysis When Benchmarking Java Card Platforms -- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card -- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks -- Cryptography -- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks -- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure -- PKIX Certificate Status in Hybrid MANETs. |
Record Nr. | UNISA-996465288903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
The New Codebreakers [[electronic resource] ] : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday / / edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 551 p. 135 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Algorithms Application software Cryptology Systems and Data Security Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Information Systems Applications (incl. Internet) |
ISBN | 3-662-49301-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | History -- Mary of Guise’s enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa. . |
Record Nr. | UNISA-996466045503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday / / edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 551 p. 135 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Algorithms Application software Cryptology Systems and Data Security Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Information Systems Applications (incl. Internet) |
ISBN | 3-662-49301-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | History -- Mary of Guise’s enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa. . |
Record Nr. | UNINA-9910483434703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings / / Jean-Jacques Quisquater, Bruce Schneier (eds.) |
Pubbl/distr/stampa | Springer Berlin Heidelberg |
Disciplina | 332.7/6 |
Altri autori (Persone) |
QuisquaterJean-Jacques
SchneierBruce |
Soggetto topico | Smart cards |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466140203316 |
Springer Berlin Heidelberg | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings / / Jean-Jacques Quisquater, Bruce Schneier (eds.) |
Pubbl/distr/stampa | Springer Berlin Heidelberg |
Disciplina | 332.7/6 |
Altri autori (Persone) |
QuisquaterJean-Jacques
SchneierBruce |
Soggetto topico | Smart cards |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910144123603321 |
Springer Berlin Heidelberg | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|