top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008]
Descrizione fisica 1 online resource (XIII, 436 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 3-540-88625-7
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Attestation: Evidence and Trust -- Authentication -- A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat Modelling in User Performed Authentication -- Access with Fast Batch Verifiable Anonymous Credentials -- Side Channel Analysis -- Quantifying Timing Leaks and Cost Optimisation -- Method for Detecting Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements -- Cryptanalysis -- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box -- Analysis of Two Attacks on Reduced-Round Versions of the SMS4 -- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack -- Access Control -- Beyond User-to-User Access Control for Online Social Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application Confinement Policy Abstractions -- Towards Role Based Trust Management without Distributed Searching of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs -- Enhancing Java ME Security Support with Resource Usage Monitoring -- Pseudo-randomness Inside Web Browsers -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data -- Embedding Renewable Cryptographic Keys into Continuous Noisy Data -- Automated Device Pairing for Asymmetric Pairing Scenarios -- Applied Cryptography -- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0. -- Towards an Information Theoretic Analysis of Searchable Encryption -- A Bootstrap Attack on Digital Watermarks in the Frequency Domain -- Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval -- Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study -- Publicly Verifiable Remote Data Integrity.
Record Nr. UNISA-996466243503316
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008]
Descrizione fisica 1 online resource (XIII, 436 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 3-540-88625-7
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Attestation: Evidence and Trust -- Authentication -- A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat Modelling in User Performed Authentication -- Access with Fast Batch Verifiable Anonymous Credentials -- Side Channel Analysis -- Quantifying Timing Leaks and Cost Optimisation -- Method for Detecting Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements -- Cryptanalysis -- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box -- Analysis of Two Attacks on Reduced-Round Versions of the SMS4 -- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack -- Access Control -- Beyond User-to-User Access Control for Online Social Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application Confinement Policy Abstractions -- Towards Role Based Trust Management without Distributed Searching of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs -- Enhancing Java ME Security Support with Resource Usage Monitoring -- Pseudo-randomness Inside Web Browsers -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data -- Embedding Renewable Cryptographic Keys into Continuous Noisy Data -- Automated Device Pairing for Asymmetric Pairing Scenarios -- Applied Cryptography -- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0. -- Towards an Information Theoretic Analysis of Searchable Encryption -- A Bootstrap Attack on Digital Watermarks in the Frequency Domain -- Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval -- Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study -- Publicly Verifiable Remote Data Integrity.
Record Nr. UNINA-9910484185803321
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui