top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Information and Computer Security [[electronic resource] ] : 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings / / edited by Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki
Advances in Information and Computer Security [[electronic resource] ] : 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings / / edited by Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 371 p. 83 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico User interfaces (Computer systems)
Computers and civilization
Computer programming
Computer security
Management information systems
Computer science
Data encryption (Computer science)
User Interfaces and Human Computer Interaction
Computers and Society
Programming Techniques
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Soggetto genere / forma Kongress.
ISBN 3-642-16825-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Automating Security Configuration and Administration: An Access Control Perspective -- Security Metrics and Security Investment Models -- Encryption -- Publishing Upper Half of RSA Decryption Exponent -- PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples -- A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model -- An Improvement of Key Generation Algorithm for Gentry’s Homomorphic Encryption Scheme -- Data and Web Security -- Practical Universal Random Sampling -- Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints -- Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel -- Validating Security Policy Conformance with WS-Security Requirements -- Protocols -- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption -- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage -- Group Signature Implies PKE with Non-interactive Opening and Threshold PKE -- Network Security -- A Generic Binary Analysis Method for Malware -- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs -- Securing MANET Multicast Using DIPLOMA -- Block Cipher -- Preimage Attacks against Variants of Very Smooth Hash -- Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification -- Mutual Information Analysis under the View of Higher-Order Statistics -- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter -- Implementation and Real Life Security -- Differential Addition in Generalized Edwards Coordinates -- Efficient Implementation of Pairing on BREW Mobile Phones -- Introducing Mitigation Use Cases to Enhance the Scope of Test Cases -- Optimal Adversary Behavior for the Serial Model of Financial Attack Trees.
Record Nr. UNISA-996466266603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in information and computer security : 5th International Workshop on Security, IWSEC 2010 : Kobe, Japan, November 22-24, 2010 : proceedings / / Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.)
Advances in information and computer security : 5th International Workshop on Security, IWSEC 2010 : Kobe, Japan, November 22-24, 2010 : proceedings / / Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, : Springer, 2010
Descrizione fisica 1 online resource (XIII, 371 p. 83 illus.)
Disciplina 005.8
Altri autori (Persone) EchizenIsao
KunihiroNoboru
SasakiRyoichi
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Computers - Access control
ISBN 3-642-16825-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited talks -- Encryption -- Data and Web security -- Protocols -- Network security -- Block cipher -- Implementation and real life security.
Record Nr. UNINA-9910483784003321
Berlin, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui