Information Security Practice and Experience [[electronic resource] ] : 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings / / edited by Mark D. Ryan, Ben Smyth, Guilin Wang |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XIII, 406 p. 68 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Information storage and retrieval Computers and civilization Management information systems Computer science Cryptology Systems and Data Security Computer Communication Networks Information Storage and Retrieval Computers and Society Management of Computing and Information Systems |
ISBN | 3-642-29101-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
A Pre-computable Signature Scheme with Efficient Verification for RFID / Fuchun Guo, Yi Mu, Willy Susilo and Vijay Varadharajan -- Redactable Signatures for Independent Removal of Structure and Content / Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga and Hermann de Meer -- Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring / Xianhui Lu, Bao Li, Qixiang Mei and Yamin Liu -- Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack / Chong-zhi Gao, Dongqing Xie and Baodian Wei -- Computational Soundness of Indistinguishability Properties without Computable Parsing / Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto and Hideki Sakurada -- New Impossible Differential Attacks on Camellia / Dongxia Bai and Leibo Li -- Impossible Differential Attacks on Reduced-Round LBlock / Ya Liu, Dawu Gu, Zhiqiang Liu and Wei Li -- New Truncated Differential Cryptanalysis on 3D Block Cipher / Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta.
iPIN and mTAN for Secure eID Applications / Johannes Braun, Moritz Horsch and Alexander Wiesmaier -- Secure Distributed Computation of the Square Root and Applications / Manuel Liedel -- Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization / Tian Shuo, He Yeping and Ding Baozeng -- Structure-Based RSA Fault Attacks / Benjamin Michéle, Juliane Krämer and Jean-Pierre Seifert -- Fault Analysis of the KATAN Family of Block Ciphers / Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo and Jennifer Seberry -- Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher / Yanfeng Wang, Wenling Wu and Xiaoli Yu -- On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers / Zhenfei Zhang, Thomas Plantard and Willy Susilo -- Partial Key Exposure on RSA with Private Exponents Larger Than N / Marc Joye and Tancrède Lepoint -- Linear Cryptanalysis of Reduced-Round ICEBERG / Yue Sun and Meiqin Wang -- Overcoming Significant Noise: Correlation-Template-Induction Attack / An Wang, Man Chen, Zongyue Wang and Yaoling Ding. ; Part 1. Spatio (Temporal) Data Modeling and Visualisation -- Usability of Spatio-Temporal Uncertainty Visualisation Methods / Hansi Senaratne, Lydia Gerharz, Edzer Pebesma and Angela Schwering -- Line Simplification in the Presence of Non-Planar Topological Relationships / Padraig Corcoran, Peter Mooney and Michela Bertolotto -- Critical Remarks on the Use of Conceptual Schemas in Geospatial Data Modelling-A Schema Translation Perspective / Tatjana Kutzner and Andreas Donaubauer -- Part 2. Spatial Data Infrastructures, Geo Web Services and Geo Semantic Web -- Towards an Active Directory of Geospatial Web Services / Francisco J. Lopez-Pellicer, Walter Rentería-Agualimpia, Javier Nogueras-Iso, F. Javier Zarazaga-Soria and Pedro R. Muro-Medrano -- Spatial Sensor Web for the Prediction of Electric Power Supply System Behaviour / Miloš Bogdanović, Nataša Veljković and Leonid Stoimenov -- Live Geoinformation with Standardized Geoprocessing Services / Theodor Foerster, Bastian Baranski and Harald Borsutzky -- Interlinking Geospatial Information in the Web of Data / Luis M. Vilches-Blázquez, Víctor Saquicela and Oscar Corcho -- Part 3. Modelling and Management of Uncertainty, Spatio (Temporal) Data Quality and Metadata -- QualESTIM: Interactive Quality Assessment of Socioeconomic Data Using Outlier Detection / Christine Plumejeaud and Marlène Villanova-Oliver -- Distributed Integration of Spatial Data with Different Positional Accuracies / Alberto Belussi and Sara Migliorini -- Through a Fuzzy Spatiotemporal Information System for Handling Excavation Data / Asma Zoghlami, Cyril de Runz, Herman Akdag and Dominique Pargny -- Part 4. Mobility of Persons, Objects and Systems, Transports and Flows -- Using Weather Information to Improve Route Planning / Paul Litzinger, Gerhard Navratil, Åke Sivertun and Daniela Knorr -- Simulation of Laser Attacks against Aircrafts / Václav Talhofer, Teodor Baláž, František Racek, Alois Hofmann and Šárka Hošková-Mayerová -- Automated Traffic Route Identification Through the Shared Nearest Neighbour Algorithm / Maribel Yasmina Santos, Joaquim P. Silva, João Moura-Pires and Monica Wachowicz -- Part 5. Spatial Analysis, Geostatistics, and Geo Information Retrieval -- Comparing Support Vector Regression and Statistical Linear Regression for Predicting Poverty Incidence in Vietnam / Cornelius Senf and Tobia Lakes -- Do Expressive Geographic Queries Lead to Improvement in Retrieval Effectiveness? / Damien Palacio, Christian Sallaberry, Guillaume Cabanac, Gilles Hubert and Mauro Gaio -- The GP-SET Method: A Spatial and Temporal Probabilistic Model for Geoprospective / Stéphane Bourrelly and Christine Voiron-Canicio -- Part 6. Modelling and Spatial Analysis of Urban Dynamics, Urban GIS -- Predicting Spatiotemporal Distribution of Transient Occupants in Urban Areas / Toshihiro Osaragi and Takeshi Hoshino -- Towards Urban Fabrics Characterization Based on Buildings Footprints / Rachid Hamaina, Thomas Leduc and Guillaume Moreau -- The Use of Point Pattern Statistics in UrbanAnalysis / Ioannis Pissourios, Pery Lafazani, Stavros Spyrellis, Anastasia Christodoulou and Myron Myridis -- Part 7. GIS and Spatial Analysis for Global Change Modelling, Impact on Space -- Beach-Dune Morphological Relationships at Youghal Beach, Cork / Sarah Kandrot -- A New Method for Computing the Drainage Network Based on Raising the Level of an Ocean Surrounding the Terrain / Salles V. G. Magalhães, Marcus V. A. Andrade, W. Randolph Franklin and Guilherme C. Pena -- Part 8. Geographic Information Science: Links with other Disciplines and Citizens -- Geographic Information Science as a Common Cause for Interdisciplinary Research / Thomas Blaschke, Josef Strobl, Lothar Schrott, Robert Marschallinger and Franz Neubauer, et al. -- Enhancing the Quality of Volunteered Geographic Information: A Constraint-Based Approach / Olga Yanenko and Christoph Schlieder. |
Record Nr. | UNISA-996466000903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Modeling and Verification of Parallel Processes [[electronic resource] ] : 4th Summer School, MOVEP 2000, Nantes, France, June 19-23, 2000. Revised Tutorial Lectures / / edited by Franck Cassez, Claude Jard, Brigitte Rozoy, Mark D. Ryan |
Edizione | [1st ed. 2001.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 |
Descrizione fisica | 1 online resource (X, 234 p.) |
Disciplina | 004/.358 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Software engineering
Computers Software Engineering Theory of Computation |
ISBN | 3-540-45510-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Tutorials and Papers -- Model Checking: A Tutorial Overview -- Theorem Proving for Verification -- Composition and Abstraction -- UPPAAL - Now, Next, and Future -- HMSCs as Partial Specifications...with PNs as Completions -- Industrial Applications of Model Checking -- Formal Methods in Practice: The Missing Links. A Perspective from the Security Area -- Annotated Bibliographies -- Verification of Systems with an Infinite State Space -- Testing Transition Systems: An Annotated Bibliography -- Fault Model-Driven Test Derivation from Finite State Models: Annotated Bibliography -- Mobile Processes: A Commented Bibliography. |
Record Nr. | UNISA-996465885303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Modeling and Verification of Parallel Processes : 4th Summer School, MOVEP 2000, Nantes, France, June 19-23, 2000. Revised Tutorial Lectures / / edited by Franck Cassez, Claude Jard, Brigitte Rozoy, Mark D. Ryan |
Edizione | [1st ed. 2001.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 |
Descrizione fisica | 1 online resource (X, 234 p.) |
Disciplina | 004/.358 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Software engineering
Computers Software Engineering Theory of Computation |
ISBN | 3-540-45510-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Tutorials and Papers -- Model Checking: A Tutorial Overview -- Theorem Proving for Verification -- Composition and Abstraction -- UPPAAL - Now, Next, and Future -- HMSCs as Partial Specifications...with PNs as Completions -- Industrial Applications of Model Checking -- Formal Methods in Practice: The Missing Links. A Perspective from the Security Area -- Annotated Bibliographies -- Verification of Systems with an Infinite State Space -- Testing Transition Systems: An Annotated Bibliography -- Fault Model-Driven Test Derivation from Finite State Models: Annotated Bibliography -- Mobile Processes: A Commented Bibliography. |
Record Nr. | UNINA-9910143601403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy vs. Security / / by Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan |
Autore | Stalla-Bourdillon Sophie |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | London : , : Springer London : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (124 p.) |
Disciplina | 323.448 |
Collana | SpringerBriefs in Cybersecurity |
Soggetto topico |
Computers
Law and legislation Mass media Law Computer security Computers and civilization Legal Aspects of Computing IT Law, Media Law, Intellectual Property Systems and Data Security Computers and Society |
ISBN | 1-4471-6530-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Privacy vs. Security… Are we done yet? -- A Future for Privacy. |
Record Nr. | UNINA-9910298974403321 |
Stalla-Bourdillon Sophie
![]() |
||
London : , : Springer London : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Trustworthy Global Computing [[electronic resource] ] : 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers / / edited by Catuscia Palamidessi, Mark D. Ryan |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 213 p. 37 illus.) |
Disciplina | 005.8 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Electronic data processing—Management Algorithms Software engineering Coding theory Information theory Cryptology Computer Communication Networks IT Operations Software Engineering Coding and Information Theory |
ISBN | 3-642-41157-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | From Rational Number Reconstruction to Set Reconciliation and File Synchronization -- Affine Refinement Types for Authentication and Authorization -- Seamless Distributed Computing from the Geometry of Interaction -- A Beginner’s Guide to the DeadLock Analysis Model -- Formal Modeling and Reasoning about the Android Security Framework -- A Type System for Flexible Role Assignment in Multiparty Communicating Systems -- A Multiparty Multi-session Logic -- LTS Semantics for Compensation-Based Processes -- Linking Unlinkability -- Towards Quantitative Analysis of Opacity -- An Algebra for Symbolic Diffie-Hellman Protocol Analysis -- Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability -- Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus. |
Record Nr. | UNISA-996465552703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trustworthy Global Computing : 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers / / edited by Catuscia Palamidessi, Mark D. Ryan |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 213 p. 37 illus.) |
Disciplina | 005.8 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Electronic data processing—Management Algorithms Software engineering Coding theory Information theory Cryptology Computer Communication Networks IT Operations Software Engineering Coding and Information Theory |
ISBN | 3-642-41157-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | From Rational Number Reconstruction to Set Reconciliation and File Synchronization -- Affine Refinement Types for Authentication and Authorization -- Seamless Distributed Computing from the Geometry of Interaction -- A Beginner’s Guide to the DeadLock Analysis Model -- Formal Modeling and Reasoning about the Android Security Framework -- A Type System for Flexible Role Assignment in Multiparty Communicating Systems -- A Multiparty Multi-session Logic -- LTS Semantics for Compensation-Based Processes -- Linking Unlinkability -- Towards Quantitative Analysis of Opacity -- An Algebra for Symbolic Diffie-Hellman Protocol Analysis -- Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability -- Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus. |
Record Nr. | UNINA-9910482992403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|