Applied Cryptography and Network Security [[electronic resource] ] : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings / / edited by Feng Bao, Pierangela Samarati, Jianying Zhou |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XIV, 580 p. 107 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Computer communication systems Coding theory Information theory Data structures (Computer science) Systems and Data Security Cryptology Management of Computing and Information Systems Computer Communication Networks Coding and Information Theory Data Structures |
ISBN | 3-642-31284-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465750103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security - ESORICS 2004 [[electronic resource] ] : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (X, 457 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Database management Computers and civilization Management information systems Computer science Cryptology Computer Communication Networks Operating Systems Database Management Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-30108-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Incorporating Dynamic Constraints in the Flexible Authorization Framework -- Access-Condition-Table-Driven Access Control for XML Databases -- An Algebra for Composing Enterprise Privacy Policies -- Deriving, Attacking and Defending the GDOI Protocol -- Better Privacy for Trusted Computing Platforms -- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol -- A Formalization of Anonymity and Onion Routing -- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics -- Comparison Between Two Practical Mix Designs -- Signature Bouquets: Immutability for Aggregated/Condensed Signatures -- Towards a Theory of Data Entanglement -- Portable and Flexible Document Access Control Mechanisms -- Possibilistic Information Flow Control in the Presence of Encrypted Communication -- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage -- Security Property Based Administrative Controls -- A Vector Model of Trust for Developing Trustworthy Systems -- Parameterized Authentication -- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks -- Hindering Eavesdropping via IPv6 Opportunistic Encryption -- On the Role of Key Schedules in Attacks on Iterated Ciphers -- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts -- A Host Intrusion Prevention System for Windows Operating Systems -- Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table -- ARCHERR: Runtime Environment Driven Program Safety -- Sets, Bags, and Rock and Roll -- Redundancy and Diversity in Security -- Discovering Novel Attack Strategies from INFOSEC Alerts. |
Record Nr. | UNISA-996465392303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security - ESORICS 2004 : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (X, 457 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Database management Computers and civilization Management information systems Computer science Cryptology Computer Communication Networks Operating Systems Database Management Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-30108-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Incorporating Dynamic Constraints in the Flexible Authorization Framework -- Access-Condition-Table-Driven Access Control for XML Databases -- An Algebra for Composing Enterprise Privacy Policies -- Deriving, Attacking and Defending the GDOI Protocol -- Better Privacy for Trusted Computing Platforms -- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol -- A Formalization of Anonymity and Onion Routing -- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics -- Comparison Between Two Practical Mix Designs -- Signature Bouquets: Immutability for Aggregated/Condensed Signatures -- Towards a Theory of Data Entanglement -- Portable and Flexible Document Access Control Mechanisms -- Possibilistic Information Flow Control in the Presence of Encrypted Communication -- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage -- Security Property Based Administrative Controls -- A Vector Model of Trust for Developing Trustworthy Systems -- Parameterized Authentication -- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks -- Hindering Eavesdropping via IPv6 Opportunistic Encryption -- On the Role of Key Schedules in Attacks on Iterated Ciphers -- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts -- A Host Intrusion Prevention System for Windows Operating Systems -- Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table -- ARCHERR: Runtime Environment Driven Program Safety -- Sets, Bags, and Rock and Roll -- Redundancy and Diversity in Security -- Discovering Novel Attack Strategies from INFOSEC Alerts. |
Record Nr. | UNINA-9910768178503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data and Applications Security and Privacy XXIX [[electronic resource] ] : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings / / edited by Pierangela Samarati |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XI, 364 p. 60 illus.) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computer security
Database management Management information systems Computer science Application software Computer communication systems Systems and Data Security Database Management Management of Computing and Information Systems Information Systems Applications (incl. Internet) Computer Communication Networks |
ISBN | 3-319-20810-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce -- Towards Collaborative Query Planning in Multi-party Database Networks -- Privacy-Preserving Range Queries from Keyword Queries -- An Administrative Model for Relationship-Based Access Control -- Migrating from DAC to RBAC -- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios -- Privacy Preserving Record Matching Using Automated Semi-trusted Broker -- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid -- Privacy-Preserving Public Transport Ticketing System -- Expiration and Revocation of Keys for Attribute-Based Signatures -- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis -- Constructing Inference-Proof Belief Mediators -- Personalized Composition of Trustful Reputation Systems -- FamilyID: A Hybrid Approach to Identify Family Information from Microblogs -- Sanitization of Call Detail Records via Differentially-Private Bloom Filters -- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System -- Integrating Attributes into Role-Based Access Control -- Automated Translation of End User Policies for Usage Control Enforcement -- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks -- A Topology Based Flow Model for Computing Domain Reputation -- FPGuard: Detection and Prevention of Browser Fingerprinting -- Stream Processing with Secure Information Flow Constraints -- Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data. |
Record Nr. | UNISA-996198513803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data and Applications Security and Privacy XXIX : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings / / edited by Pierangela Samarati |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XI, 364 p. 60 illus.) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computer security
Database management Management information systems Computer science Application software Computer communication systems Systems and Data Security Database Management Management of Computing and Information Systems Information Systems Applications (incl. Internet) Computer Communication Networks |
ISBN | 3-319-20810-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce -- Towards Collaborative Query Planning in Multi-party Database Networks -- Privacy-Preserving Range Queries from Keyword Queries -- An Administrative Model for Relationship-Based Access Control -- Migrating from DAC to RBAC -- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios -- Privacy Preserving Record Matching Using Automated Semi-trusted Broker -- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid -- Privacy-Preserving Public Transport Ticketing System -- Expiration and Revocation of Keys for Attribute-Based Signatures -- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis -- Constructing Inference-Proof Belief Mediators -- Personalized Composition of Trustful Reputation Systems -- FamilyID: A Hybrid Approach to Identify Family Information from Microblogs -- Sanitization of Call Detail Records via Differentially-Private Bloom Filters -- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System -- Integrating Attributes into Role-Based Access Control -- Automated Translation of End User Policies for Usage Control Enforcement -- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks -- A Topology Based Flow Model for Computing Domain Reputation -- FPGuard: Detection and Prevention of Browser Fingerprinting -- Stream Processing with Secure Information Flow Constraints -- Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data. |
Record Nr. | UNINA-9910483928503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
E-Business and Telecommunications [[electronic resource] ] : 19th International Conference, ICSBT 2022, Lisbon, Portugal, July 14–16, 2022, and 19th International Conference, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers / / edited by Marten Van Sinderen, Fons Wijnhoven, Slimane Hammoudi, Pierangela Samarati, Sabrina De Capitani di Vimercati |
Autore | Van Sinderen Marten |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (189 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
WijnhovenFons
HammoudiSlimane SamaratiPierangela VimercatiSabrina De Capitani di |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer networks
Application software Computer networks - Security measures Cryptography Data encryption (Computer science) Computer systems Computer Communication Networks Computer and Information Systems Applications Mobile and Network Security Cryptology Computer System Implementation |
ISBN | 3-031-45137-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information -- Blind side channel on the Elephant LFSR Extended version -- Stacked Ensemble Models Evaluation on DL Based SCA -- Explaining the Use of Cryptographic API in Android Malware -- Explaining the Use of Cryptographic API in Android Malware -- Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and their Mitigation -- Compressing Big OLAP Data Cubes in Big Data Analytics Systems: New Paradigms, a Reference Architecture, and Future Research Perspectives. |
Record Nr. | UNISA-996552462203316 |
Van Sinderen Marten
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
E-Business and Telecommunications : 19th International Conference, ICSBT 2022, Lisbon, Portugal, July 14–16, 2022, and 19th International Conference, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers / / edited by Marten Van Sinderen, Fons Wijnhoven, Slimane Hammoudi, Pierangela Samarati, Sabrina De Capitani di Vimercati |
Autore | Van Sinderen Marten |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (189 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
WijnhovenFons
HammoudiSlimane SamaratiPierangela VimercatiSabrina De Capitani di |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer networks
Application software Computer networks - Security measures Cryptography Data encryption (Computer science) Computer systems Computer Communication Networks Computer and Information Systems Applications Mobile and Network Security Cryptology Computer System Implementation |
ISBN | 3-031-45137-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information -- Blind side channel on the Elephant LFSR Extended version -- Stacked Ensemble Models Evaluation on DL Based SCA -- Explaining the Use of Cryptographic API in Android Malware -- Explaining the Use of Cryptographic API in Android Malware -- Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and their Mitigation -- Compressing Big OLAP Data Cubes in Big Data Analytics Systems: New Paradigms, a Reference Architecture, and Future Research Perspectives. |
Record Nr. | UNINA-9910746957403321 |
Van Sinderen Marten
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
E-Business and Telecommunications [[electronic resource] ] : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers / / edited by Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (422 pages) |
Disciplina | 658.872 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer networks
Application software Data protection Computer networks - Security measures Cryptography Data encryption (Computer science) Computer systems Computer Communication Networks Computer and Information Systems Applications Data and Information Security Mobile and Network Security Cryptology Computer System Implementation |
ISBN | 3-031-36840-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | e-Business -- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions -- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective -- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices -- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password -- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment -- Digital Transformation and Management of Transfer in University Platforms -- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques -- Security and Cryptography -- A Classification of Software-architectural Uncertainty regarding Confidentiality -- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications -- Improving Time Complexity and Utility of k-anonymous Microaggregation -- Extended Formal Analysis of the EDHOC Protocol in Tamarin -- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies -- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction -- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics -- On Applying Boolean Masking to Exponents -- Trusted Implementation and Enforcement of Application-specific Security Policies -- Selective Encryption for Owners' Control in Digital Data Markets. |
Record Nr. | UNISA-996546843903316 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers / / edited by Pierangela Samarati, Marten van Sinderen, Sabrina De Capitani di Vimercati, Fons Wijnhoven |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (422 pages) |
Disciplina | 658.872 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer networks
Application software Data protection Computer networks - Security measures Cryptography Data encryption (Computer science) Computer systems Computer Communication Networks Computer and Information Systems Applications Data and Information Security Mobile and Network Security Cryptology Computer System Implementation |
ISBN | 3-031-36840-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | e-Business -- The Digital Content Formation Labor Costs for Electronic Libraries and Examples of the Formation of Virtual Exhibitions -- An Analysis of Cultural Content on Short Video Platforms: Cultural Protection Perspective -- Technology Transfer and Valuation Methods in Use by University Technology Transfer Offices -- Improved Protection of User Data through the Use of a Traceable Anonymous One Time Password -- Gamified Self-paced E-Learning: Two Iterations of an Educational Design Experiment -- Digital Transformation and Management of Transfer in University Platforms -- A Method for Bottleneck Detection, Prediction, and Recommendation using Process Mining Techniques -- Security and Cryptography -- A Classification of Software-architectural Uncertainty regarding Confidentiality -- Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications -- Improving Time Complexity and Utility of k-anonymous Microaggregation -- Extended Formal Analysis of the EDHOC Protocol in Tamarin -- Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies -- Evaluating Defensive Countermeasures for Software-based Hardware Abstraction -- Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics -- On Applying Boolean Masking to Exponents -- Trusted Implementation and Enforcement of Application-specific Security Policies -- Selective Encryption for Owners' Control in Digital Data Markets. |
Record Nr. | UNINA-9910735789503321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Encyclopedia of Cryptography, Security and Privacy [[electronic resource] /] / edited by Sushil Jajodia, Pierangela Samarati, Moti Yung |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 2000 p.) |
Disciplina | 005.73 |
Soggetto topico |
Data structures (Computer science)
Data encryption (Computer science) Coding theory Information theory Applied mathematics Engineering mathematics Computational complexity Data Structures and Information Theory Cryptology Coding and Information Theory Mathematical and Computational Engineering Applications of Mathematics Complexity |
ISBN | 3-642-27739-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910767514603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|