top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security – ESORICS 2019 [[electronic resource] ] : 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I / / edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan
Computer Security – ESORICS 2019 [[electronic resource] ] : 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I / / edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XXV, 811 p. 628 illus., 132 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Computers
Artificial intelligence
Application software
Software engineering
Systems and Data Security
Computer Systems Organization and Communication Networks
Computing Milieux
Artificial Intelligence
Information Systems Applications (incl. Internet)
Software Engineering/Programming and Operating Systems
ISBN 3-030-29959-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine Learning -- Privacy-Enhanced Machine Learning with Functional Encryption -- Towards Secure and Efficient Outsourcing of Machine Learning Classification -- Confidential Boosting with Random Linear Classifiers for Outsourced User-generated Data -- BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks -- Information Leakage -- The Leakage-Resilience Dilemma -- A Taxonomy of Attacks using BGP Blackholing -- Local Obfuscation Mechanisms for Hiding Probability Distributions -- A First Look into Privacy Leakage in 3D Mixed Reality Data -- Signatures and Re-encryption -- Flexible Signatures: Making Authentication Suitable for Real-Time Environments -- A Dynamic & Revocable Group Merkle Signature -- Puncturable Proxy Re-Encryption supporting to Group Messaging Service -- Generic Traceable Proxy Re-Encryption and Accountable Extension in Consensus Network -- Side Channels -- Side-Channel Aware Fuzzing -- NetSpectre: Read Arbitrary Memory over Network -- maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults -- Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems -- Formal Modelling and Verification -- A Formal Model for Checking Cryptographic API Usage in JavaScript -- Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification -- Symbolic Analysis of Terrorist Fraud Resistance -- Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC -- Attacks -- Where to Look for What You See Is What You Sign? User Confusion in Transaction Security -- On the Security and Applicability of Fragile Camera Fingerprints -- Attacking Speaker Recognition Systems with Phoneme Morphing -- Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks -- A Framework for Evaluating Security in the Presence of Signal Injection Attacks -- Secure Protocols -- Formalizing and Proving Privacy Properties of Voting Protocols using Alpha-Beta Privacy -- ProCSA: Protecting Privacy in Crowdsourced Spectrum Allocation -- Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity -- Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing -- Useful Tools -- Finding Flaws from Password Authentication Code in Android Apps -- Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution -- iCAT: An Interactive Customizable Anonymization Tool -- Monitoring the GDPR -- Blockchain and Smart Contracts -- Incentives for Harvesting Attack in Proof of Work mining pools -- A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses -- Annotary: A Concolic Execution System for Developing Secure Smart Contracts -- PDFS: Practical Data Feed Service for Smart Contracts -- Towards a Marketplace for Secure Outsourced Computations.
Record Nr. UNISA-996466314903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2019 [[electronic resource] ] : 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II / / edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan
Computer Security – ESORICS 2019 [[electronic resource] ] : 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II / / edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XXVI, 627 p. 803 illus., 71 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Computers
Artificial intelligence
Application software
Software engineering
Systems and Data Security
Computer Systems Organization and Communication Networks
Computing Milieux
Artificial Intelligence
Information Systems Applications (incl. Internet)
Software Engineering
ISBN 3-030-29962-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software Security -- Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs -- Uncovering Information Flow Policy Violations in C Programs -- BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning -- Static Detection of Uninitialized Stack Variables in Binary Code -- Towards Automated Application-Specific Software Stacks -- Cryptographic Protocols -- Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices -- Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails -- Feistel Structures for MPC, and More -- Arithmetic Garbling from Bilinear Maps -- Security Models -- SEPD: An Access Control Model for Resource Sharing in an IoT Environment -- Nighthawk: Transparent System Introspection from Ring -3 -- Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement -- Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics -- Searchable Encryption -- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy -- Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption -- Generic Multi-keyword Ranked Search on Encrypted Cloud Data -- An Efficiently Searchable Encrypted Data Structure for Range Queries -- Privacy -- GDPiRated - Stealing Personal Information On- and Offline -- Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation -- OCRAM-assisted Sensitive Data Protection on ARM-based Platform -- Privacy-Preserving Collaborative Medical Time Series Analysis based on Dynamic Time Warping -- Key Exchange Protocols -- IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key Cryptography -- Strongly Secure Identity-Based Key Exchange with Single Pairing Operation -- A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope -- Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids -- Web Security -- The Risks of WebGL: Analysis, Evaluation and Detection -- Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks -- Fingerprint Surface-Based Detection of Web Bot Detectors -- Testing for Integrity Flaws in Web Sessions.
Record Nr. UNISA-996466314003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2019 : 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II / / edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan
Computer Security – ESORICS 2019 : 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II / / edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XXVI, 627 p. 803 illus., 71 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Computers
Artificial intelligence
Application software
Software engineering
Systems and Data Security
Computer Systems Organization and Communication Networks
Computing Milieux
Artificial Intelligence
Information Systems Applications (incl. Internet)
Software Engineering
ISBN 3-030-29962-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software Security -- Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs -- Uncovering Information Flow Policy Violations in C Programs -- BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning -- Static Detection of Uninitialized Stack Variables in Binary Code -- Towards Automated Application-Specific Software Stacks -- Cryptographic Protocols -- Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices -- Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails -- Feistel Structures for MPC, and More -- Arithmetic Garbling from Bilinear Maps -- Security Models -- SEPD: An Access Control Model for Resource Sharing in an IoT Environment -- Nighthawk: Transparent System Introspection from Ring -3 -- Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement -- Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics -- Searchable Encryption -- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy -- Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption -- Generic Multi-keyword Ranked Search on Encrypted Cloud Data -- An Efficiently Searchable Encrypted Data Structure for Range Queries -- Privacy -- GDPiRated - Stealing Personal Information On- and Offline -- Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation -- OCRAM-assisted Sensitive Data Protection on ARM-based Platform -- Privacy-Preserving Collaborative Medical Time Series Analysis based on Dynamic Time Warping -- Key Exchange Protocols -- IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key Cryptography -- Strongly Secure Identity-Based Key Exchange with Single Pairing Operation -- A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope -- Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids -- Web Security -- The Risks of WebGL: Analysis, Evaluation and Detection -- Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks -- Fingerprint Surface-Based Detection of Web Bot Detectors -- Testing for Integrity Flaws in Web Sessions.
Record Nr. UNINA-9910349298403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2019 : 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I / / edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan
Computer Security – ESORICS 2019 : 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I / / edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XXV, 811 p. 628 illus., 132 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Computers
Artificial intelligence
Application software
Software engineering
Systems and Data Security
Computer Systems Organization and Communication Networks
Computing Milieux
Artificial Intelligence
Information Systems Applications (incl. Internet)
Software Engineering/Programming and Operating Systems
ISBN 3-030-29959-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine Learning -- Privacy-Enhanced Machine Learning with Functional Encryption -- Towards Secure and Efficient Outsourcing of Machine Learning Classification -- Confidential Boosting with Random Linear Classifiers for Outsourced User-generated Data -- BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks -- Information Leakage -- The Leakage-Resilience Dilemma -- A Taxonomy of Attacks using BGP Blackholing -- Local Obfuscation Mechanisms for Hiding Probability Distributions -- A First Look into Privacy Leakage in 3D Mixed Reality Data -- Signatures and Re-encryption -- Flexible Signatures: Making Authentication Suitable for Real-Time Environments -- A Dynamic & Revocable Group Merkle Signature -- Puncturable Proxy Re-Encryption supporting to Group Messaging Service -- Generic Traceable Proxy Re-Encryption and Accountable Extension in Consensus Network -- Side Channels -- Side-Channel Aware Fuzzing -- NetSpectre: Read Arbitrary Memory over Network -- maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults -- Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems -- Formal Modelling and Verification -- A Formal Model for Checking Cryptographic API Usage in JavaScript -- Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification -- Symbolic Analysis of Terrorist Fraud Resistance -- Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC -- Attacks -- Where to Look for What You See Is What You Sign? User Confusion in Transaction Security -- On the Security and Applicability of Fragile Camera Fingerprints -- Attacking Speaker Recognition Systems with Phoneme Morphing -- Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks -- A Framework for Evaluating Security in the Presence of Signal Injection Attacks -- Secure Protocols -- Formalizing and Proving Privacy Properties of Voting Protocols using Alpha-Beta Privacy -- ProCSA: Protecting Privacy in Crowdsourced Spectrum Allocation -- Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity -- Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing -- Useful Tools -- Finding Flaws from Password Authentication Code in Android Apps -- Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution -- iCAT: An Interactive Customizable Anonymization Tool -- Monitoring the GDPR -- Blockchain and Smart Contracts -- Incentives for Harvesting Attack in Proof of Work mining pools -- A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses -- Annotary: A Concolic Execution System for Developing Secure Smart Contracts -- PDFS: Practical Data Feed Service for Smart Contracts -- Towards a Marketplace for Secure Outsourced Computations.
Record Nr. UNINA-9910349298503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-Voting and Identity [[electronic resource] ] : Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings / / edited by Peter Y. A. Ryan, Berry Schoenmakers
E-Voting and Identity [[electronic resource] ] : Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings / / edited by Peter Y. A. Ryan, Berry Schoenmakers
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (IX, 191 p.)
Disciplina 324.6/3
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Computer communication systems
Special purpose computers
Application software
Cryptology
Systems and Data Security
Computers and Society
Computer Communication Networks
Special Purpose and Application-Based Systems
Computer Appl. in Administrative Data Processing
ISBN 3-642-04135-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Not-So Hidden Information: -- Masked Ballot Voting for Receipt-Free Online Elections -- Improving and Simplifying a Variant of Prêt à Voter -- Implications of Graphics on Usability and Accessibility for the Voter -- Assessing Voters’ Attitudes towards Electronic Voting in Latin America: Evidence from Colombia’s 2007 E-Voting Pilot -- Developing a Legal Framework for Remote Electronic Voting -- VeryVote: A Voter Verifiable Code Voting System -- Minimum Disclosure Counting for the Alternative Vote -- A Design of Secure Preferential E-Voting -- RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code -- Combatting Electoral Traces: The Dutch Tempest Discussion and Beyond.
Record Nr. UNISA-996465631803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Electronic Voting [[electronic resource] ] : 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings / / edited by Melanie Volkamer, David Duenas-Cid, Peter Rønne, Peter Y. A. Ryan, Jurlind Budurushi, Oksana Kulyk, Adrià Rodriguez Pérez, Iuliia Spycher-Krivonosova
Electronic Voting [[electronic resource] ] : 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings / / edited by Melanie Volkamer, David Duenas-Cid, Peter Rønne, Peter Y. A. Ryan, Jurlind Budurushi, Oksana Kulyk, Adrià Rodriguez Pérez, Iuliia Spycher-Krivonosova
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XI, 157 p. 18 illus., 13 illus. in color.)
Disciplina 005.824
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Application software
Artificial intelligence
Computer networks - Security measures
Data protection
Computer networks
Cryptology
Computer and Information Systems Applications
Artificial Intelligence
Mobile and Network Security
Data and Information Security
Computer Communication Networks
ISBN 3-031-43756-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Investigating transparency dimensions for Internet voting -- OpenVoting: Recoverability from Failures in Dual Voting -- Adaptively Weighted Audits of Instant-Runoff Voting Elections: AWAIRE -- Online Voting in Ontario Municipalities: A Standards-based Review -- Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study -- Verifiability Experiences in Ontario’s 2022 Online Elections -- Pretty Good Strategies for Benaloh Challenge -- CAISED: A Protocol for Cast-as-Intended Verifiability with a Second Device -- Estimating carbon footprint of paper and Internet voting.
Record Nr. UNISA-996550545103316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Electronic Voting : 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings / / edited by Melanie Volkamer, David Duenas-Cid, Peter Rønne, Peter Y. A. Ryan, Jurlind Budurushi, Oksana Kulyk, Adrià Rodriguez Pérez, Iuliia Spycher-Krivonosova
Electronic Voting : 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings / / edited by Melanie Volkamer, David Duenas-Cid, Peter Rønne, Peter Y. A. Ryan, Jurlind Budurushi, Oksana Kulyk, Adrià Rodriguez Pérez, Iuliia Spycher-Krivonosova
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XI, 157 p. 18 illus., 13 illus. in color.)
Disciplina 005.824
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Application software
Artificial intelligence
Computer networks - Security measures
Data protection
Computer networks
Cryptology
Computer and Information Systems Applications
Artificial Intelligence
Mobile and Network Security
Data and Information Security
Computer Communication Networks
ISBN 3-031-43756-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Investigating transparency dimensions for Internet voting -- OpenVoting: Recoverability from Failures in Dual Voting -- Adaptively Weighted Audits of Instant-Runoff Voting Elections: AWAIRE -- Online Voting in Ontario Municipalities: A Standards-based Review -- Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study -- Verifiability Experiences in Ontario’s 2022 Online Elections -- Pretty Good Strategies for Benaloh Challenge -- CAISED: A Protocol for Cast-as-Intended Verifiability with a Second Device -- Estimating carbon footprint of paper and Internet voting.
Record Nr. UNINA-9910745584103321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic Voting [[electronic resource] ] : First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings / / edited by Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole Goodman, Peter Y. A. Ryan, Vanessa Teague
Electronic Voting [[electronic resource] ] : First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings / / edited by Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole Goodman, Peter Y. A. Ryan, Vanessa Teague
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 233 p. 32 illus.)
Disciplina 324.63
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Special purpose computers
Application software
Computers and civilization
Cryptology
Systems and Data Security
Computer Communication Networks
Special Purpose and Application-Based Systems
Computer Appl. in Administrative Data Processing
Computers and Society
ISBN 3-319-52240-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Different voting settings -- Polling stations -- Remote voting -- Mobile voging -- Case studies.
Record Nr. UNISA-996465758203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Electronic Voting : First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings / / edited by Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole Goodman, Peter Y. A. Ryan, Vanessa Teague
Electronic Voting : First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings / / edited by Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole Goodman, Peter Y. A. Ryan, Vanessa Teague
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 233 p. 32 illus.)
Disciplina 324.63
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Special purpose computers
Application software
Computers and civilization
Cryptology
Systems and Data Security
Computer Communication Networks
Special Purpose and Application-Based Systems
Computer Appl. in Administrative Data Processing
Computers and Society
ISBN 3-319-52240-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Different voting settings -- Polling stations -- Remote voting -- Mobile voging -- Case studies.
Record Nr. UNINA-9910484127603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The New Codebreakers [[electronic resource] ] : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday / / edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater
The New Codebreakers [[electronic resource] ] : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday / / edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 551 p. 135 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Algorithms
Application software
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
ISBN 3-662-49301-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto History -- Mary of Guise’s enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa. .
Record Nr. UNISA-996466045503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui