top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Innovative Security Solutions for Information Technology and Communications [[electronic resource] ] : 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers / / edited by Ion Bica, Reza Reyhanitabar
Innovative Security Solutions for Information Technology and Communications [[electronic resource] ] : 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers / / edited by Ion Bica, Reza Reyhanitabar
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 287 p. 86 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Information storage and retrieval
Application software
Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Systems and Data Security
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-319-47238-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Circular Security Reconsidered -- Visual Cryptography: Models, Issues, Applications and New Directions -- Paper Tigers: An Endless Fight -- Security of Identity-based Encryption Schemes from Quadratic Residues -- Long-Term Secure One-Round Group Key Establishment from Multilinear Mappings -- RSA Weak Public Keys Available on the Internet -- A Tweak for a PRF Mode of a Compression Function and Its Applications -- May-Ozerov Algorithm for Nearest-Neighbor Problem over mathbb{F}_qandIts Application to Information Set Decoding -- A Cryptographic Approach for Implementing Semantic Web's Trust Layer -- Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret -- Homomorphic Encryption Based On Group Algebras and Goldwasser-Micali Scheme -- Increasing the Robustness of the Montgomery kP-Algorithm against SCA by Modifying its Initialization -- When Pythons Bite -- Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations -- Pushing the Optimization Limits of Ring Oscillator-based True Random Number Generators -- TOR - Didactic Pluggable Transport -- Preparation of SCA Attacks: Successfully Decapsulating BGA Packages -- Comparative Analysis of Security Operations Center Architectures; Proposals and Architectural Considerations for Frameworks and Operating Models -- Secure Transaction Authentication Protocol -- Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing. .
Record Nr. UNISA-996465661303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Innovative Security Solutions for Information Technology and Communications : 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers / / edited by Ion Bica, Reza Reyhanitabar
Innovative Security Solutions for Information Technology and Communications : 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers / / edited by Ion Bica, Reza Reyhanitabar
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 287 p. 86 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Information storage and retrieval
Application software
Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Systems and Data Security
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-319-47238-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Circular Security Reconsidered -- Visual Cryptography: Models, Issues, Applications and New Directions -- Paper Tigers: An Endless Fight -- Security of Identity-based Encryption Schemes from Quadratic Residues -- Long-Term Secure One-Round Group Key Establishment from Multilinear Mappings -- RSA Weak Public Keys Available on the Internet -- A Tweak for a PRF Mode of a Compression Function and Its Applications -- May-Ozerov Algorithm for Nearest-Neighbor Problem over mathbb{F}_qandIts Application to Information Set Decoding -- A Cryptographic Approach for Implementing Semantic Web's Trust Layer -- Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret -- Homomorphic Encryption Based On Group Algebras and Goldwasser-Micali Scheme -- Increasing the Robustness of the Montgomery kP-Algorithm against SCA by Modifying its Initialization -- When Pythons Bite -- Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations -- Pushing the Optimization Limits of Ring Oscillator-based True Random Number Generators -- TOR - Didactic Pluggable Transport -- Preparation of SCA Attacks: Successfully Decapsulating BGA Packages -- Comparative Analysis of Security Operations Center Architectures; Proposals and Architectural Considerations for Frameworks and Operating Models -- Secure Transaction Authentication Protocol -- Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing. .
Record Nr. UNINA-9910484220403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Provable Security [[electronic resource] ] : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings / / edited by Willy Susilo, Reza Reyhanitabar
Provable Security [[electronic resource] ] : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings / / edited by Willy Susilo, Reza Reyhanitabar
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 347 p. 36 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
E-commerce
Application software
Computer science
Cryptology
Systems and Data Security
Computers and Society
e-Commerce/e-business
Computer Appl. in Administrative Data Processing
Computer Science, general
ISBN 3-642-41227-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme.
Record Nr. UNISA-996465754303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings / / edited by Willy Susilo, Reza Reyhanitabar
Provable Security : 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings / / edited by Willy Susilo, Reza Reyhanitabar
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 347 p. 36 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
E-commerce
Application software
Computer science
Cryptology
Systems and Data Security
Computers and Society
e-Commerce/e-business
Computer Appl. in Administrative Data Processing
Computer Science, general
ISBN 3-642-41227-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme.
Record Nr. UNINA-9910484398803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui