top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied Cryptography and Network Security [[electronic resource] ] : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings / / edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider
Applied Cryptography and Network Security [[electronic resource] ] : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings / / edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 668 p. 110 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Computers
Computers and civilization
Systems and Data Security
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Theory of Computation
Computers and Society
ISBN 3-319-39555-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use.
Record Nr. UNISA-996465709403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings / / edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider
Applied Cryptography and Network Security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings / / edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 668 p. 110 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Computers
Computers and civilization
Systems and Data Security
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Theory of Computation
Computers and Society
ISBN 3-319-39555-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use.
Record Nr. UNINA-9910483621203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building Secure Defenses Against Code-Reuse Attacks / / by Lucas Davi, Ahmad-Reza Sadeghi
Building Secure Defenses Against Code-Reuse Attacks / / by Lucas Davi, Ahmad-Reza Sadeghi
Autore Davi Lucas
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (83 p.)
Disciplina 005.8
Collana SpringerBriefs in Computer Science
Soggetto topico Computer security
Computer programming
Programming languages (Electronic computers)
Computers
Systems and Data Security
Programming Techniques
Programming Languages, Compilers, Interpreters
Information Systems and Communication Service
ISBN 3-319-25546-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Background and Evolution of Code-Reuse Attacks -- Building Control-Flow Integrity Defenses -- Building Code Randomization Defenses -- Discussion and Conclusion.
Record Nr. UNINA-9910298963803321
Davi Lucas  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptology and Network Security [[electronic resource] ] : 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings / / edited by Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis
Cryptology and Network Security [[electronic resource] ] : 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings / / edited by Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XVI, 311 p. 48 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer science—Mathematics
Coding theory
Information theory
Data structures (Computer science)
Computer security
Cryptology
Computer Communication Networks
Discrete Mathematics in Computer Science
Coding and Information Theory
Data Structures and Information Theory
Systems and Data Security
ISBN 3-642-35404-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory.
Record Nr. UNISA-996465945703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Financial Cryptography and Data Security [[electronic resource] ] : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers / / edited by Ahmad-Reza Sadeghi
Financial Cryptography and Data Security [[electronic resource] ] : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers / / edited by Ahmad-Reza Sadeghi
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 406 p. 70 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
E-commerce
Application software
Cryptology
Systems and Data Security
e-Commerce/e-business
Computer Appl. in Administrative Data Processing
ISBN 3-642-39884-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote -- Can Nature Help Us Solve Risk Management Issues? Position Paper -- Electronic Payment (Bitcoin) -- Quantitative Analysis of the Full Bitcoin Transaction Graph -- Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk (Short Paper) -- Evaluating User Privacy in Bitcoin -- Usability Aspects -- The Importance of Being Earnest [In Security Warnings] (Short Paper) -- Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing (Short Paper) -- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (Short Paper) -- Secure Computation -- Practical Fully Simulatable Oblivious Transfer with Sublinear Communication -- Unconditionally-Secure Robust Secret Sharing with Minimum Share Size -- A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data -- Passwords -- “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks -- Hey, You, Get Off of My Clipboard: On How Usability Trumps Security in Android Password Managers -- Privacy Primitives and Non-repudiation -- Unique Ring Signatures: A Practical Construction (Short Paper) -- Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency -- Accumulators and U-Prove Revocation (Short Paper) -- Anonymity -- Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy (Short Paper) -- P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems (Short Paper) -- Hardware Security -- Coupon Collector’s Problem for Fault Analysis against AES – High Tolerance for Noisy Fault Injections (Short Paper) -- Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study (Short Paper) -- On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards (Short Paper) -- Secure Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic Searchable Symmetric Encryption -- GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits -- Invited Talk -- The Untapped Potential of Trusted Execution Environments on Mobile Devices: Extended Abstract -- Authentication Attacks and Countermeasures -- Stark: Tamperproof Authentication to Resist Keylogging -- Risks of Offline Verify PIN on Contactless Cards (Short Paper) -- How to Attack Two-Factor Authentication Internet Banking (Short Paper) -- CAge: Taming Certificate Authorities by Inferring Restricted Scopes (Short Paper) -- Privacy of Data and Communication -- Interdependent Privacy: Let Me Share Your Data -- A Secure Submission System for Online Whistle blowing Platforms (Short Paper) -- Securing Anonymous Communication Channels under the Selective DoS Attack (Short Paper) -- Private Data Retrieval -- PIRMAP: Efficient Private Information Retrieval for MapReduce -- Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates (Short Paper) -- Posters -- Three-Factor User Authentication Method Using Biometrics Challenge Response -- Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services -- Onions for Sale: Putting Privacy on the Market -- Searchable Encryption Supporting General Boolean Expression Queries -- A Privacy Preserving E-Payment Architecture -- Communication Services Empowered with a Classical Chaos Based Cryptosystem.
Record Nr. UNISA-996465951703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Financial Cryptography and Data Security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers / / edited by Ahmad-Reza Sadeghi
Financial Cryptography and Data Security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers / / edited by Ahmad-Reza Sadeghi
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 406 p. 70 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
E-commerce
Application software
Cryptology
Systems and Data Security
e-Commerce/e-business
Computer Appl. in Administrative Data Processing
ISBN 3-642-39884-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote -- Can Nature Help Us Solve Risk Management Issues? Position Paper -- Electronic Payment (Bitcoin) -- Quantitative Analysis of the Full Bitcoin Transaction Graph -- Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk (Short Paper) -- Evaluating User Privacy in Bitcoin -- Usability Aspects -- The Importance of Being Earnest [In Security Warnings] (Short Paper) -- Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing (Short Paper) -- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (Short Paper) -- Secure Computation -- Practical Fully Simulatable Oblivious Transfer with Sublinear Communication -- Unconditionally-Secure Robust Secret Sharing with Minimum Share Size -- A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data -- Passwords -- “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks -- Hey, You, Get Off of My Clipboard: On How Usability Trumps Security in Android Password Managers -- Privacy Primitives and Non-repudiation -- Unique Ring Signatures: A Practical Construction (Short Paper) -- Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency -- Accumulators and U-Prove Revocation (Short Paper) -- Anonymity -- Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy (Short Paper) -- P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems (Short Paper) -- Hardware Security -- Coupon Collector’s Problem for Fault Analysis against AES – High Tolerance for Noisy Fault Injections (Short Paper) -- Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study (Short Paper) -- On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards (Short Paper) -- Secure Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic Searchable Symmetric Encryption -- GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits -- Invited Talk -- The Untapped Potential of Trusted Execution Environments on Mobile Devices: Extended Abstract -- Authentication Attacks and Countermeasures -- Stark: Tamperproof Authentication to Resist Keylogging -- Risks of Offline Verify PIN on Contactless Cards (Short Paper) -- How to Attack Two-Factor Authentication Internet Banking (Short Paper) -- CAge: Taming Certificate Authorities by Inferring Restricted Scopes (Short Paper) -- Privacy of Data and Communication -- Interdependent Privacy: Let Me Share Your Data -- A Secure Submission System for Online Whistle blowing Platforms (Short Paper) -- Securing Anonymous Communication Channels under the Selective DoS Attack (Short Paper) -- Private Data Retrieval -- PIRMAP: Efficient Private Information Retrieval for MapReduce -- Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates (Short Paper) -- Posters -- Three-Factor User Authentication Method Using Biometrics Challenge Response -- Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services -- Onions for Sale: Putting Privacy on the Market -- Searchable Encryption Supporting General Boolean Expression Queries -- A Privacy Preserving E-Payment Architecture -- Communication Services Empowered with a Classical Chaos Based Cryptosystem.
Record Nr. UNINA-9910483682503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Hiding [[electronic resource] ] : 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers / / edited by Stefan Katzenbeisser, Ahmad-Reza Sadeghi
Information Hiding [[electronic resource] ] : 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers / / edited by Stefan Katzenbeisser, Ahmad-Reza Sadeghi
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 277 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Computers
Law and legislation
Coding theory
Information theory
Computer security
Cryptology
Data Storage Representation
Legal Aspects of Computing
Data Structures and Information Theory
Coding and Information Theory
Systems and Data Security
Soggetto genere / forma Darmstadt (2009)
Kongress.
ISBN 3-642-04431-X
Classificazione DAT 450f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Steganography -- Supraliminal Audio Steganography: Audio Files Tricking Audiophiles -- An Epistemological Approach to Steganography -- Fisher Information Determines Capacity of ?-Secure Steganography -- Fast BCH Syndrome Coding for Steganography -- Steganalysis -- Embedding Ratio Estimating for Each Bit Plane of Image -- Estimating Steganographic Fisher Information in Real Images -- Watermarking -- Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2 -- A Phase Modulation Audio Watermarking Technique -- Forensic Tracking Watermarking against In-theater Piracy -- Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization -- Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain -- Fingerprinting -- An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive -- Estimating the Minimal Length of Tardos Code -- Hiding in Unusual Content, Novel Applications -- Roughness-Adaptive 3D Watermarking of Polygonal Meshes -- Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions -- SVD-Based Ghost Circuitry Detection -- Forensics -- Microphone Classification Using Fourier Coefficients -- Detect Digital Image Splicing with Visual Cues -- Feature-Based Camera Model Identification Works in Practice.
Record Nr. UNISA-996465312503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information hiding : 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers / / Stefan Katzenbeisser, Ahmad-Reza Sadeghi (eds.)
Information hiding : 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers / / Stefan Katzenbeisser, Ahmad-Reza Sadeghi (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2009
Descrizione fisica 1 online resource (X, 277 p.)
Disciplina 005.8
Altri autori (Persone) KatzenbeisserStefan
SadeghiAhmad-Reza
Collana Lecture notes in computer science
Soggetto topico Computer security
Data protection
ISBN 3-642-04431-X
Classificazione DAT 450f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Steganography -- Supraliminal Audio Steganography: Audio Files Tricking Audiophiles -- An Epistemological Approach to Steganography -- Fisher Information Determines Capacity of ?-Secure Steganography -- Fast BCH Syndrome Coding for Steganography -- Steganalysis -- Embedding Ratio Estimating for Each Bit Plane of Image -- Estimating Steganographic Fisher Information in Real Images -- Watermarking -- Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2 -- A Phase Modulation Audio Watermarking Technique -- Forensic Tracking Watermarking against In-theater Piracy -- Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization -- Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain -- Fingerprinting -- An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive -- Estimating the Minimal Length of Tardos Code -- Hiding in Unusual Content, Novel Applications -- Roughness-Adaptive 3D Watermarking of Polygonal Meshes -- Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions -- SVD-Based Ghost Circuitry Detection -- Forensics -- Microphone Classification Using Fourier Coefficients -- Detect Digital Image Splicing with Visual Cues -- Feature-Based Camera Model Identification Works in Practice.
Altri titoli varianti IH 2009
Record Nr. UNINA-9910484694203321
Berlin ; ; New York, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Radio Frequency Identification: Security and Privacy Issues [[electronic resource] ] : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers / / edited by Nitesh Saxena, Ahmad-Reza Sadeghi
Radio Frequency Identification: Security and Privacy Issues [[electronic resource] ] : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers / / edited by Nitesh Saxena, Ahmad-Reza Sadeghi
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (VIII, 215 p. 62 illus.)
Disciplina 621
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
E-commerce
Systems and Data Security
Cryptology
Computer Communication Networks
e-Commerce/e-business
ISBN 3-319-13066-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts -- High-Speed Dating - Privacy-Preserving Attribute Matching for RFID -- Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags -- PIONEER - A Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag -- SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks -- Cryptanalysis of SIMON Variants with Connections -- Privacy-Preserving Authorized RFID Authentication Protocols -- Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node -- High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers -- Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID Tags -- ePassport: Side Channel in the Basic Access Control -- A Low Area Probing Detector for Power Efficient Security ICs -- Non-Linear Collision Analysis.
Record Nr. UNISA-996210532903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Radio Frequency Identification: Security and Privacy Issues : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers / / edited by Nitesh Saxena, Ahmad-Reza Sadeghi
Radio Frequency Identification: Security and Privacy Issues : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers / / edited by Nitesh Saxena, Ahmad-Reza Sadeghi
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (VIII, 215 p. 62 illus.)
Disciplina 621
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
E-commerce
Systems and Data Security
Cryptology
Computer Communication Networks
e-Commerce/e-business
ISBN 3-319-13066-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts -- High-Speed Dating - Privacy-Preserving Attribute Matching for RFID -- Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags -- PIONEER - A Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag -- SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks -- Cryptanalysis of SIMON Variants with Connections -- Privacy-Preserving Authorized RFID Authentication Protocols -- Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node -- High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers -- Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID Tags -- ePassport: Side Channel in the Basic Access Control -- A Low Area Probing Detector for Power Efficient Security ICs -- Non-Linear Collision Analysis.
Record Nr. UNINA-9910483162503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui