Applied Cryptography and Network Security [[electronic resource] ] : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings / / edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 668 p. 110 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Management information systems Computer science Computers Computers and civilization Systems and Data Security Cryptology Computer Communication Networks Management of Computing and Information Systems Theory of Computation Computers and Society |
ISBN | 3-319-39555-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use. |
Record Nr. | UNISA-996465709403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Cryptography and Network Security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings / / edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 668 p. 110 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Management information systems Computer science Computers Computers and civilization Systems and Data Security Cryptology Computer Communication Networks Management of Computing and Information Systems Theory of Computation Computers and Society |
ISBN | 3-319-39555-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use. |
Record Nr. | UNINA-9910483621203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Building Secure Defenses Against Code-Reuse Attacks / / by Lucas Davi, Ahmad-Reza Sadeghi |
Autore | Davi Lucas |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (83 p.) |
Disciplina | 005.8 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Computer security
Computer programming Programming languages (Electronic computers) Computers Systems and Data Security Programming Techniques Programming Languages, Compilers, Interpreters Information Systems and Communication Service |
ISBN | 3-319-25546-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion. |
Record Nr. | UNINA-9910298963803321 |
Davi Lucas | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptology and Network Security [[electronic resource] ] : 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings / / edited by Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XVI, 311 p. 48 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer science—Mathematics Coding theory Information theory Data structures (Computer science) Computer security Cryptology Computer Communication Networks Discrete Mathematics in Computer Science Coding and Information Theory Data Structures and Information Theory Systems and Data Security |
ISBN | 3-642-35404-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory. |
Record Nr. | UNISA-996465945703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Financial Cryptography and Data Security [[electronic resource] ] : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers / / edited by Ahmad-Reza Sadeghi |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XVI, 406 p. 70 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security E-commerce Application software Cryptology Systems and Data Security e-Commerce/e-business Computer Appl. in Administrative Data Processing |
ISBN | 3-642-39884-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote -- Can Nature Help Us Solve Risk Management Issues? Position Paper -- Electronic Payment (Bitcoin) -- Quantitative Analysis of the Full Bitcoin Transaction Graph -- Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk (Short Paper) -- Evaluating User Privacy in Bitcoin -- Usability Aspects -- The Importance of Being Earnest [In Security Warnings] (Short Paper) -- Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing (Short Paper) -- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (Short Paper) -- Secure Computation -- Practical Fully Simulatable Oblivious Transfer with Sublinear Communication -- Unconditionally-Secure Robust Secret Sharing with Minimum Share Size -- A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data -- Passwords -- “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks -- Hey, You, Get Off of My Clipboard: On How Usability Trumps Security in Android Password Managers -- Privacy Primitives and Non-repudiation -- Unique Ring Signatures: A Practical Construction (Short Paper) -- Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency -- Accumulators and U-Prove Revocation (Short Paper) -- Anonymity -- Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy (Short Paper) -- P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems (Short Paper) -- Hardware Security -- Coupon Collector’s Problem for Fault Analysis against AES – High Tolerance for Noisy Fault Injections (Short Paper) -- Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study (Short Paper) -- On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards (Short Paper) -- Secure Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic Searchable Symmetric Encryption -- GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits -- Invited Talk -- The Untapped Potential of Trusted Execution Environments on Mobile Devices: Extended Abstract -- Authentication Attacks and Countermeasures -- Stark: Tamperproof Authentication to Resist Keylogging -- Risks of Offline Verify PIN on Contactless Cards (Short Paper) -- How to Attack Two-Factor Authentication Internet Banking (Short Paper) -- CAge: Taming Certificate Authorities by Inferring Restricted Scopes (Short Paper) -- Privacy of Data and Communication -- Interdependent Privacy: Let Me Share Your Data -- A Secure Submission System for Online Whistle blowing Platforms (Short Paper) -- Securing Anonymous Communication Channels under the Selective DoS Attack (Short Paper) -- Private Data Retrieval -- PIRMAP: Efficient Private Information Retrieval for MapReduce -- Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates (Short Paper) -- Posters -- Three-Factor User Authentication Method Using Biometrics Challenge Response -- Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services -- Onions for Sale: Putting Privacy on the Market -- Searchable Encryption Supporting General Boolean Expression Queries -- A Privacy Preserving E-Payment Architecture -- Communication Services Empowered with a Classical Chaos Based Cryptosystem. |
Record Nr. | UNISA-996465951703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Financial Cryptography and Data Security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers / / edited by Ahmad-Reza Sadeghi |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XVI, 406 p. 70 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security E-commerce Application software Cryptology Systems and Data Security e-Commerce/e-business Computer Appl. in Administrative Data Processing |
ISBN | 3-642-39884-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote -- Can Nature Help Us Solve Risk Management Issues? Position Paper -- Electronic Payment (Bitcoin) -- Quantitative Analysis of the Full Bitcoin Transaction Graph -- Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk (Short Paper) -- Evaluating User Privacy in Bitcoin -- Usability Aspects -- The Importance of Being Earnest [In Security Warnings] (Short Paper) -- Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing (Short Paper) -- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (Short Paper) -- Secure Computation -- Practical Fully Simulatable Oblivious Transfer with Sublinear Communication -- Unconditionally-Secure Robust Secret Sharing with Minimum Share Size -- A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data -- Passwords -- “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks -- Hey, You, Get Off of My Clipboard: On How Usability Trumps Security in Android Password Managers -- Privacy Primitives and Non-repudiation -- Unique Ring Signatures: A Practical Construction (Short Paper) -- Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency -- Accumulators and U-Prove Revocation (Short Paper) -- Anonymity -- Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy (Short Paper) -- P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems (Short Paper) -- Hardware Security -- Coupon Collector’s Problem for Fault Analysis against AES – High Tolerance for Noisy Fault Injections (Short Paper) -- Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study (Short Paper) -- On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards (Short Paper) -- Secure Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic Searchable Symmetric Encryption -- GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits -- Invited Talk -- The Untapped Potential of Trusted Execution Environments on Mobile Devices: Extended Abstract -- Authentication Attacks and Countermeasures -- Stark: Tamperproof Authentication to Resist Keylogging -- Risks of Offline Verify PIN on Contactless Cards (Short Paper) -- How to Attack Two-Factor Authentication Internet Banking (Short Paper) -- CAge: Taming Certificate Authorities by Inferring Restricted Scopes (Short Paper) -- Privacy of Data and Communication -- Interdependent Privacy: Let Me Share Your Data -- A Secure Submission System for Online Whistle blowing Platforms (Short Paper) -- Securing Anonymous Communication Channels under the Selective DoS Attack (Short Paper) -- Private Data Retrieval -- PIRMAP: Efficient Private Information Retrieval for MapReduce -- Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates (Short Paper) -- Posters -- Three-Factor User Authentication Method Using Biometrics Challenge Response -- Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services -- Onions for Sale: Putting Privacy on the Market -- Searchable Encryption Supporting General Boolean Expression Queries -- A Privacy Preserving E-Payment Architecture -- Communication Services Empowered with a Classical Chaos Based Cryptosystem. |
Record Nr. | UNINA-9910483682503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Hiding [[electronic resource] ] : 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers / / edited by Stefan Katzenbeisser, Ahmad-Reza Sadeghi |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (X, 277 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Data structures (Computer science) Computers Law and legislation Coding theory Information theory Computer security Cryptology Data Storage Representation Legal Aspects of Computing Data Structures and Information Theory Coding and Information Theory Systems and Data Security |
Soggetto genere / forma |
Darmstadt (2009)
Kongress. |
ISBN | 3-642-04431-X |
Classificazione |
DAT 450f
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Steganography -- Supraliminal Audio Steganography: Audio Files Tricking Audiophiles -- An Epistemological Approach to Steganography -- Fisher Information Determines Capacity of ?-Secure Steganography -- Fast BCH Syndrome Coding for Steganography -- Steganalysis -- Embedding Ratio Estimating for Each Bit Plane of Image -- Estimating Steganographic Fisher Information in Real Images -- Watermarking -- Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2 -- A Phase Modulation Audio Watermarking Technique -- Forensic Tracking Watermarking against In-theater Piracy -- Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization -- Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain -- Fingerprinting -- An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive -- Estimating the Minimal Length of Tardos Code -- Hiding in Unusual Content, Novel Applications -- Roughness-Adaptive 3D Watermarking of Polygonal Meshes -- Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions -- SVD-Based Ghost Circuitry Detection -- Forensics -- Microphone Classification Using Fourier Coefficients -- Detect Digital Image Splicing with Visual Cues -- Feature-Based Camera Model Identification Works in Practice. |
Record Nr. | UNISA-996465312503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information hiding : 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers / / Stefan Katzenbeisser, Ahmad-Reza Sadeghi (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2009 |
Descrizione fisica | 1 online resource (X, 277 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
KatzenbeisserStefan
SadeghiAhmad-Reza |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Data protection |
ISBN | 3-642-04431-X |
Classificazione |
DAT 450f
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Steganography -- Supraliminal Audio Steganography: Audio Files Tricking Audiophiles -- An Epistemological Approach to Steganography -- Fisher Information Determines Capacity of ?-Secure Steganography -- Fast BCH Syndrome Coding for Steganography -- Steganalysis -- Embedding Ratio Estimating for Each Bit Plane of Image -- Estimating Steganographic Fisher Information in Real Images -- Watermarking -- Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2 -- A Phase Modulation Audio Watermarking Technique -- Forensic Tracking Watermarking against In-theater Piracy -- Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization -- Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain -- Fingerprinting -- An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive -- Estimating the Minimal Length of Tardos Code -- Hiding in Unusual Content, Novel Applications -- Roughness-Adaptive 3D Watermarking of Polygonal Meshes -- Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions -- SVD-Based Ghost Circuitry Detection -- Forensics -- Microphone Classification Using Fourier Coefficients -- Detect Digital Image Splicing with Visual Cues -- Feature-Based Camera Model Identification Works in Practice. |
Altri titoli varianti | IH 2009 |
Record Nr. | UNINA-9910484694203321 |
Berlin ; ; New York, : Springer, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Radio Frequency Identification: Security and Privacy Issues [[electronic resource] ] : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers / / edited by Nitesh Saxena, Ahmad-Reza Sadeghi |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (VIII, 215 p. 62 illus.) |
Disciplina | 621 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems E-commerce Systems and Data Security Cryptology Computer Communication Networks e-Commerce/e-business |
ISBN | 3-319-13066-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts -- High-Speed Dating - Privacy-Preserving Attribute Matching for RFID -- Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags -- PIONEER - A Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag -- SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks -- Cryptanalysis of SIMON Variants with Connections -- Privacy-Preserving Authorized RFID Authentication Protocols -- Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node -- High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers -- Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID Tags -- ePassport: Side Channel in the Basic Access Control -- A Low Area Probing Detector for Power Efficient Security ICs -- Non-Linear Collision Analysis. |
Record Nr. | UNISA-996210532903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Radio Frequency Identification: Security and Privacy Issues : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers / / edited by Nitesh Saxena, Ahmad-Reza Sadeghi |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (VIII, 215 p. 62 illus.) |
Disciplina | 621 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems E-commerce Systems and Data Security Cryptology Computer Communication Networks e-Commerce/e-business |
ISBN | 3-319-13066-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts -- High-Speed Dating - Privacy-Preserving Attribute Matching for RFID -- Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags -- PIONEER - A Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag -- SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks -- Cryptanalysis of SIMON Variants with Connections -- Privacy-Preserving Authorized RFID Authentication Protocols -- Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node -- High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers -- Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID Tags -- ePassport: Side Channel in the Basic Access Control -- A Low Area Probing Detector for Power Efficient Security ICs -- Non-Linear Collision Analysis. |
Record Nr. | UNINA-9910483162503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|