Computer Security – ESORICS 2019 [[electronic resource] ] : 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I / / edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XXV, 811 p. 628 illus., 132 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer organization Computers Artificial intelligence Application software Software engineering Systems and Data Security Computer Systems Organization and Communication Networks Computing Milieux Artificial Intelligence Information Systems Applications (incl. Internet) Software Engineering/Programming and Operating Systems |
ISBN | 3-030-29959-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine Learning -- Privacy-Enhanced Machine Learning with Functional Encryption -- Towards Secure and Efficient Outsourcing of Machine Learning Classification -- Confidential Boosting with Random Linear Classifiers for Outsourced User-generated Data -- BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks -- Information Leakage -- The Leakage-Resilience Dilemma -- A Taxonomy of Attacks using BGP Blackholing -- Local Obfuscation Mechanisms for Hiding Probability Distributions -- A First Look into Privacy Leakage in 3D Mixed Reality Data -- Signatures and Re-encryption -- Flexible Signatures: Making Authentication Suitable for Real-Time Environments -- A Dynamic & Revocable Group Merkle Signature -- Puncturable Proxy Re-Encryption supporting to Group Messaging Service -- Generic Traceable Proxy Re-Encryption and Accountable Extension in Consensus Network -- Side Channels -- Side-Channel Aware Fuzzing -- NetSpectre: Read Arbitrary Memory over Network -- maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults -- Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems -- Formal Modelling and Verification -- A Formal Model for Checking Cryptographic API Usage in JavaScript -- Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification -- Symbolic Analysis of Terrorist Fraud Resistance -- Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC -- Attacks -- Where to Look for What You See Is What You Sign? User Confusion in Transaction Security -- On the Security and Applicability of Fragile Camera Fingerprints -- Attacking Speaker Recognition Systems with Phoneme Morphing -- Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks -- A Framework for Evaluating Security in the Presence of Signal Injection Attacks -- Secure Protocols -- Formalizing and Proving Privacy Properties of Voting Protocols using Alpha-Beta Privacy -- ProCSA: Protecting Privacy in Crowdsourced Spectrum Allocation -- Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity -- Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing -- Useful Tools -- Finding Flaws from Password Authentication Code in Android Apps -- Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution -- iCAT: An Interactive Customizable Anonymization Tool -- Monitoring the GDPR -- Blockchain and Smart Contracts -- Incentives for Harvesting Attack in Proof of Work mining pools -- A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses -- Annotary: A Concolic Execution System for Developing Secure Smart Contracts -- PDFS: Practical Data Feed Service for Smart Contracts -- Towards a Marketplace for Secure Outsourced Computations. |
Record Nr. | UNISA-996466314903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security – ESORICS 2019 [[electronic resource] ] : 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II / / edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XXVI, 627 p. 803 illus., 71 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer organization Computers Artificial intelligence Application software Software engineering Systems and Data Security Computer Systems Organization and Communication Networks Computing Milieux Artificial Intelligence Information Systems Applications (incl. Internet) Software Engineering |
ISBN | 3-030-29962-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Software Security -- Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs -- Uncovering Information Flow Policy Violations in C Programs -- BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning -- Static Detection of Uninitialized Stack Variables in Binary Code -- Towards Automated Application-Specific Software Stacks -- Cryptographic Protocols -- Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices -- Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails -- Feistel Structures for MPC, and More -- Arithmetic Garbling from Bilinear Maps -- Security Models -- SEPD: An Access Control Model for Resource Sharing in an IoT Environment -- Nighthawk: Transparent System Introspection from Ring -3 -- Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement -- Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics -- Searchable Encryption -- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy -- Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption -- Generic Multi-keyword Ranked Search on Encrypted Cloud Data -- An Efficiently Searchable Encrypted Data Structure for Range Queries -- Privacy -- GDPiRated - Stealing Personal Information On- and Offline -- Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation -- OCRAM-assisted Sensitive Data Protection on ARM-based Platform -- Privacy-Preserving Collaborative Medical Time Series Analysis based on Dynamic Time Warping -- Key Exchange Protocols -- IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key Cryptography -- Strongly Secure Identity-Based Key Exchange with Single Pairing Operation -- A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope -- Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids -- Web Security -- The Risks of WebGL: Analysis, Evaluation and Detection -- Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks -- Fingerprint Surface-Based Detection of Web Bot Detectors -- Testing for Integrity Flaws in Web Sessions. |
Record Nr. | UNISA-996466314003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security – ESORICS 2019 : 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II / / edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XXVI, 627 p. 803 illus., 71 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer organization Computers Artificial intelligence Application software Software engineering Systems and Data Security Computer Systems Organization and Communication Networks Computing Milieux Artificial Intelligence Information Systems Applications (incl. Internet) Software Engineering |
ISBN | 3-030-29962-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Software Security -- Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs -- Uncovering Information Flow Policy Violations in C Programs -- BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning -- Static Detection of Uninitialized Stack Variables in Binary Code -- Towards Automated Application-Specific Software Stacks -- Cryptographic Protocols -- Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices -- Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails -- Feistel Structures for MPC, and More -- Arithmetic Garbling from Bilinear Maps -- Security Models -- SEPD: An Access Control Model for Resource Sharing in an IoT Environment -- Nighthawk: Transparent System Introspection from Ring -3 -- Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement -- Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics -- Searchable Encryption -- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy -- Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption -- Generic Multi-keyword Ranked Search on Encrypted Cloud Data -- An Efficiently Searchable Encrypted Data Structure for Range Queries -- Privacy -- GDPiRated - Stealing Personal Information On- and Offline -- Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation -- OCRAM-assisted Sensitive Data Protection on ARM-based Platform -- Privacy-Preserving Collaborative Medical Time Series Analysis based on Dynamic Time Warping -- Key Exchange Protocols -- IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key Cryptography -- Strongly Secure Identity-Based Key Exchange with Single Pairing Operation -- A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope -- Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids -- Web Security -- The Risks of WebGL: Analysis, Evaluation and Detection -- Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks -- Fingerprint Surface-Based Detection of Web Bot Detectors -- Testing for Integrity Flaws in Web Sessions. |
Record Nr. | UNINA-9910349298403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security – ESORICS 2019 : 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I / / edited by Kazue Sako, Steve Schneider, Peter Y. A. Ryan |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XXV, 811 p. 628 illus., 132 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer organization Computers Artificial intelligence Application software Software engineering Systems and Data Security Computer Systems Organization and Communication Networks Computing Milieux Artificial Intelligence Information Systems Applications (incl. Internet) Software Engineering/Programming and Operating Systems |
ISBN | 3-030-29959-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine Learning -- Privacy-Enhanced Machine Learning with Functional Encryption -- Towards Secure and Efficient Outsourcing of Machine Learning Classification -- Confidential Boosting with Random Linear Classifiers for Outsourced User-generated Data -- BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks -- Information Leakage -- The Leakage-Resilience Dilemma -- A Taxonomy of Attacks using BGP Blackholing -- Local Obfuscation Mechanisms for Hiding Probability Distributions -- A First Look into Privacy Leakage in 3D Mixed Reality Data -- Signatures and Re-encryption -- Flexible Signatures: Making Authentication Suitable for Real-Time Environments -- A Dynamic & Revocable Group Merkle Signature -- Puncturable Proxy Re-Encryption supporting to Group Messaging Service -- Generic Traceable Proxy Re-Encryption and Accountable Extension in Consensus Network -- Side Channels -- Side-Channel Aware Fuzzing -- NetSpectre: Read Arbitrary Memory over Network -- maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults -- Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems -- Formal Modelling and Verification -- A Formal Model for Checking Cryptographic API Usage in JavaScript -- Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification -- Symbolic Analysis of Terrorist Fraud Resistance -- Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC -- Attacks -- Where to Look for What You See Is What You Sign? User Confusion in Transaction Security -- On the Security and Applicability of Fragile Camera Fingerprints -- Attacking Speaker Recognition Systems with Phoneme Morphing -- Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks -- A Framework for Evaluating Security in the Presence of Signal Injection Attacks -- Secure Protocols -- Formalizing and Proving Privacy Properties of Voting Protocols using Alpha-Beta Privacy -- ProCSA: Protecting Privacy in Crowdsourced Spectrum Allocation -- Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity -- Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing -- Useful Tools -- Finding Flaws from Password Authentication Code in Android Apps -- Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution -- iCAT: An Interactive Customizable Anonymization Tool -- Monitoring the GDPR -- Blockchain and Smart Contracts -- Incentives for Harvesting Attack in Proof of Work mining pools -- A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses -- Annotary: A Concolic Execution System for Developing Secure Smart Contracts -- PDFS: Practical Data Feed Service for Smart Contracts -- Towards a Marketplace for Secure Outsourced Computations. |
Record Nr. | UNINA-9910349298503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
E-Voting and Identity [[electronic resource] ] : Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings / / edited by Peter Y. A. Ryan, Berry Schoenmakers |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (IX, 191 p.) |
Disciplina | 324.6/3 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computers and civilization Computer communication systems Special purpose computers Application software Cryptology Systems and Data Security Computers and Society Computer Communication Networks Special Purpose and Application-Based Systems Computer Appl. in Administrative Data Processing |
ISBN | 3-642-04135-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Not-So Hidden Information: -- Masked Ballot Voting for Receipt-Free Online Elections -- Improving and Simplifying a Variant of Prêt à Voter -- Implications of Graphics on Usability and Accessibility for the Voter -- Assessing Voters’ Attitudes towards Electronic Voting in Latin America: Evidence from Colombia’s 2007 E-Voting Pilot -- Developing a Legal Framework for Remote Electronic Voting -- VeryVote: A Voter Verifiable Code Voting System -- Minimum Disclosure Counting for the Alternative Vote -- A Design of Secure Preferential E-Voting -- RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code -- Combatting Electoral Traces: The Dutch Tempest Discussion and Beyond. |
Record Nr. | UNISA-996465631803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Electronic Voting [[electronic resource] ] : 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings / / edited by Melanie Volkamer, David Duenas-Cid, Peter Rønne, Peter Y. A. Ryan, Jurlind Budurushi, Oksana Kulyk, Adrià Rodriguez Pérez, Iuliia Spycher-Krivonosova |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (XI, 157 p. 18 illus., 13 illus. in color.) |
Disciplina | 005.824 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Data encryption (Computer science) Application software Artificial intelligence Computer networks - Security measures Data protection Computer networks Cryptology Computer and Information Systems Applications Artificial Intelligence Mobile and Network Security Data and Information Security Computer Communication Networks |
ISBN | 3-031-43756-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Investigating transparency dimensions for Internet voting -- OpenVoting: Recoverability from Failures in Dual Voting -- Adaptively Weighted Audits of Instant-Runoff Voting Elections: AWAIRE -- Online Voting in Ontario Municipalities: A Standards-based Review -- Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study -- Verifiability Experiences in Ontario’s 2022 Online Elections -- Pretty Good Strategies for Benaloh Challenge -- CAISED: A Protocol for Cast-as-Intended Verifiability with a Second Device -- Estimating carbon footprint of paper and Internet voting. |
Record Nr. | UNISA-996550545103316 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Electronic Voting : 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings / / edited by Melanie Volkamer, David Duenas-Cid, Peter Rønne, Peter Y. A. Ryan, Jurlind Budurushi, Oksana Kulyk, Adrià Rodriguez Pérez, Iuliia Spycher-Krivonosova |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (XI, 157 p. 18 illus., 13 illus. in color.) |
Disciplina | 005.824 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Data encryption (Computer science) Application software Artificial intelligence Computer networks - Security measures Data protection Computer networks Cryptology Computer and Information Systems Applications Artificial Intelligence Mobile and Network Security Data and Information Security Computer Communication Networks |
ISBN | 3-031-43756-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Investigating transparency dimensions for Internet voting -- OpenVoting: Recoverability from Failures in Dual Voting -- Adaptively Weighted Audits of Instant-Runoff Voting Elections: AWAIRE -- Online Voting in Ontario Municipalities: A Standards-based Review -- Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study -- Verifiability Experiences in Ontario’s 2022 Online Elections -- Pretty Good Strategies for Benaloh Challenge -- CAISED: A Protocol for Cast-as-Intended Verifiability with a Second Device -- Estimating carbon footprint of paper and Internet voting. |
Record Nr. | UNINA-9910745584103321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Electronic Voting [[electronic resource] ] : First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings / / edited by Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole Goodman, Peter Y. A. Ryan, Vanessa Teague |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 233 p. 32 illus.) |
Disciplina | 324.63 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Special purpose computers Application software Computers and civilization Cryptology Systems and Data Security Computer Communication Networks Special Purpose and Application-Based Systems Computer Appl. in Administrative Data Processing Computers and Society |
ISBN | 3-319-52240-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Different voting settings -- Polling stations -- Remote voting -- Mobile voging -- Case studies. |
Record Nr. | UNISA-996465758203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Electronic Voting : First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings / / edited by Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole Goodman, Peter Y. A. Ryan, Vanessa Teague |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 233 p. 32 illus.) |
Disciplina | 324.63 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Special purpose computers Application software Computers and civilization Cryptology Systems and Data Security Computer Communication Networks Special Purpose and Application-Based Systems Computer Appl. in Administrative Data Processing Computers and Society |
ISBN | 3-319-52240-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Different voting settings -- Polling stations -- Remote voting -- Mobile voging -- Case studies. |
Record Nr. | UNINA-9910484127603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The New Codebreakers [[electronic resource] ] : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday / / edited by Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 551 p. 135 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Algorithms Application software Cryptology Systems and Data Security Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Information Systems Applications (incl. Internet) |
ISBN | 3-662-49301-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | History -- Mary of Guise’s enciphered letters -- About Professionalisation in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945) -- Myths and legends -- The One-Time Pad and the Index of Coincidence -- Technology - Past, Present, Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed and Energy -- Double-Speed Barrett Moduli -- Treachery and Perfidy -- Failure is Also an Option -- How to (Carefully) Breach a Service Contract? -- Information Security -- SpoofKiller: You can teach people how to pay, but not how to pay attention -- Cyber-Physical Systems Security -- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud -- Cryptanalysis -- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack -- Dual EC: A Standardized Back Door -- An Improved Differential Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side-Channel Attacks -- Polynomial Evaluation and Side Channel Analysis -- Photonic Power Firewalls -- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard -- Improving the Big Mac attack on Elliptic Curve Cryptography -- Randomness -- Randomness testing: result interpretation and speed -- A fully-digital Chaos-based Random Bit Generator -- Embedded System Security -- Secure Application Execution in Mobile Devices -- Hardware-enforced Protection against Buffer Overflow using Masked Program Counter -- Public-Key Cryptography -- Hierarchical Identities from Group Signatures and Pseudonymous Signatures -- Secure ElGamal-type Cryptosystems Without Message Encoding -- Safe-Errors on SPA Protected implementations with the Atomicity Technique -- Models and Protocols -- Clever Arbiters versus Malicious Adversaries: On the Gap between Known-Input Security and Chosen-Input Security -- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol -- Crypto Santa. . |
Record Nr. | UNISA-996466045503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|