top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Financial Cryptography and Data Security [[electronic resource] ] : 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion
Financial Cryptography and Data Security [[electronic resource] ] : 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XII, 432p. 77 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Cryptology
ISBN 1-280-38809-9
9786613566010
3-642-14577-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Constructive Cryptography – A Primer -- Security Mechanisms with Selfish Players in Wireless Networks -- Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory -- Multichannel Protocols to Prevent Relay Attacks -- A Traceability Attack against e-Passports -- Secure Computation with Fixed-Point Numbers -- Implementing a High-Assurance Smart-Card OS -- Unlinkable Priced Oblivious Transfer with Rechargeable Wallets -- Multiple Denominations in E-cash with Compact Transaction Data -- What’s in a Name? -- Cryptographic Protocol Analysis of AN.ON -- A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys -- Practical Private Set Intersection Protocols with Linear Complexity -- Design and Implementation of a Key-Lifecycle Management System -- Measuring the Perpetrators and Funders of Typosquatting -- A Learning-Based Approach to Reactive Security -- Embedded SFE: Offloading Server and Network Using Hardware Tokens -- The Phish-Market Protocol: Securely Sharing Attack Data between Competitors -- Building Incentives into Tor -- Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections -- Automatically Preparing Safe SQL Queries -- PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure -- Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy -- Designing for Audit: A Voting Machine with a Tiny TCB -- Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits -- Security Applications of Diodes with Unique Current-Voltage Characteristics -- Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication -- All You Can Eat or Breaking a Real-World Contactless Payment System -- Shoulder-Surfing Safe Login in a Partially Observable Attacker Model -- Using Sphinx to Improve Onion Routing Circuit Construction -- Secure Multiparty AES -- Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis -- On Robust Key Agreement Based on Public Key Authentication -- A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing -- Signatures of Reputation -- Intention-Disguised Algorithmic Trading -- When Information Improves Information Security -- BetterThanPin: Empowering Users to Fight Phishing (Poster) -- Certification Intermediaries and the Alternative (Poster) -- SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs -- Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks -- Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols -- hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers.
Record Nr. UNISA-996465789603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Financial Cryptography and Data Security [[electronic resource] ] : FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé
Financial Cryptography and Data Security [[electronic resource] ] : FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XII, 256 p.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Computer engineering
E-commerce
Management information systems
Computer science
Computers and civilization
Computer Communication Networks
Cryptology
Computer Engineering
e-Commerce/e-business
Management of Computing and Information Systems
Computers and Society
Soggetto genere / forma Conference proceedings.
Kongress
ISBN 3-642-14992-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto WLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: “Be Reasonable”.
Record Nr. UNISA-996466280603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Financial Cryptography and Data Security : 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion
Financial Cryptography and Data Security : 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XII, 432p. 77 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Cryptology
ISBN 1-280-38809-9
9786613566010
3-642-14577-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Constructive Cryptography – A Primer -- Security Mechanisms with Selfish Players in Wireless Networks -- Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory -- Multichannel Protocols to Prevent Relay Attacks -- A Traceability Attack against e-Passports -- Secure Computation with Fixed-Point Numbers -- Implementing a High-Assurance Smart-Card OS -- Unlinkable Priced Oblivious Transfer with Rechargeable Wallets -- Multiple Denominations in E-cash with Compact Transaction Data -- What’s in a Name? -- Cryptographic Protocol Analysis of AN.ON -- A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys -- Practical Private Set Intersection Protocols with Linear Complexity -- Design and Implementation of a Key-Lifecycle Management System -- Measuring the Perpetrators and Funders of Typosquatting -- A Learning-Based Approach to Reactive Security -- Embedded SFE: Offloading Server and Network Using Hardware Tokens -- The Phish-Market Protocol: Securely Sharing Attack Data between Competitors -- Building Incentives into Tor -- Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections -- Automatically Preparing Safe SQL Queries -- PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure -- Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy -- Designing for Audit: A Voting Machine with a Tiny TCB -- Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits -- Security Applications of Diodes with Unique Current-Voltage Characteristics -- Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication -- All You Can Eat or Breaking a Real-World Contactless Payment System -- Shoulder-Surfing Safe Login in a Partially Observable Attacker Model -- Using Sphinx to Improve Onion Routing Circuit Construction -- Secure Multiparty AES -- Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis -- On Robust Key Agreement Based on Public Key Authentication -- A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing -- Signatures of Reputation -- Intention-Disguised Algorithmic Trading -- When Information Improves Information Security -- BetterThanPin: Empowering Users to Fight Phishing (Poster) -- Certification Intermediaries and the Alternative (Poster) -- SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs -- Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks -- Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols -- hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers.
Record Nr. UNINA-9910484260903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Financial Cryptography and Data Security : FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé
Financial Cryptography and Data Security : FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XII, 256 p.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Computer engineering
E-commerce
Management information systems
Computer science
Computers and civilization
Computer Communication Networks
Cryptology
Computer Engineering
e-Commerce/e-business
Management of Computing and Information Systems
Computers and Society
Soggetto genere / forma Conference proceedings.
Kongress
ISBN 3-642-14992-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto WLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: “Be Reasonable”.
Record Nr. UNINA-9910483448603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2009 Acm Workshop on Cloud Computing Security
Proceedings of the 2009 Acm Workshop on Cloud Computing Security
Pubbl/distr/stampa [Place of publication not identified] : , : Association for Computing Machinery, , 2009
Descrizione fisica 1 online resource (144 pages)
Collana ACM Conferences.
Soggetto topico Information Technology - Computer Science (Hardware & Networks)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti CCSW '09
Record Nr. UNINA-9910376065503321
[Place of publication not identified] : , : Association for Computing Machinery, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2010
Descrizione fisica 1 online resource (110 pages)
Collana ACM Conferences
Soggetto topico Electrical & Computer Engineering
Engineering & Applied Sciences
Telecommunications
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti CCSW '10
Record Nr. UNINA-9910376005103321
[Place of publication not identified], : ACM, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop : November 9, 2020, Virtual Event, USA / / Yinqian Zhang, Radu Sion
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop : November 9, 2020, Virtual Event, USA / / Yinqian Zhang, Radu Sion
Autore Zhang Yinqian
Pubbl/distr/stampa New York : , : Association for Computing Machinery, , [2020]
Descrizione fisica 1 online resource (176 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910510476303321
Zhang Yinqian  
New York : , : Association for Computing Machinery, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui