Cryptography for Security and Privacy in Cloud Computing |
Autore | Rass Stefan |
Pubbl/distr/stampa | Norwood : , : Artech House, , 2013 |
Descrizione fisica | 1 online resource (264 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) | SlamanigDaniel |
Collana | Artech House information security and privacy series |
Soggetto topico |
Computer networks - Security measures
Cloud computing |
Soggetto genere / forma | Electronic books. |
ISBN | 1-60807-576-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cryptography for Security and Privacy in Cloud Computing; Contents; Chapter 1 Introduction; 1.1 MODERN CRYPTOGRAPHY; 1.2 CLOUD COMPUTING; 1.3 DIGITAL IDENTITY, AUTHENTICATION, AND ACCESS CONTROL; 1.4 PRIVACY-ENHANCING TECHNOLOGIES; 1.5 OUTLINE; References; Chapter 2 Fundamentals; 2.1 NUMBER THEORY; 2.1.1 Drawing Random Coprime Elements; 2.1.2 Computing Inverse Elements Modulo a Prime; 2.1.3 Computing Negative Powers Modulo a Prime; 2.1.4 Getting (Large) Primes; 2.1.5 Quadratic Residues, Legendre Symbol, and Jacobi Symbol; 2.2 RINGS, GROUPS, FIELDS, AND LATTICES.
2.2.1 Finding a Generating Element2.2.2 Groups of Quadratic Residues; 2.2.3 Constructing a Subgroup; 2.2.4 Constructing General Finite Fields; 2.2.5 Homomorphy and Isomorphy; 2.2.6 Elliptic Curves; 2.2.7 Pairings; 2.2.8 Lattices; 2.3 CODING; 2.4 COMPUTATIONAL COMPLEXITY; 2.4.1 Computational Intractability; 2.4.2 Factorization-Related Assumptions; 2.4.3 Discrete-Logar. |
Record Nr. | UNINA-9910465187503321 |
Rass Stefan | ||
Norwood : , : Artech House, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography for Security and Privacy in Cloud Computing |
Autore | Rass Stefan |
Pubbl/distr/stampa | Norwood : , : Artech House, , 2013 |
Descrizione fisica | 1 online resource (264 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) | SlamanigDaniel |
Collana | Artech House information security and privacy series |
Soggetto topico |
Computer networks - Security measures
Cloud computing |
ISBN | 1-60807-576-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cryptography for Security and Privacy in Cloud Computing; Contents; Chapter 1 Introduction; 1.1 MODERN CRYPTOGRAPHY; 1.2 CLOUD COMPUTING; 1.3 DIGITAL IDENTITY, AUTHENTICATION, AND ACCESS CONTROL; 1.4 PRIVACY-ENHANCING TECHNOLOGIES; 1.5 OUTLINE; References; Chapter 2 Fundamentals; 2.1 NUMBER THEORY; 2.1.1 Drawing Random Coprime Elements; 2.1.2 Computing Inverse Elements Modulo a Prime; 2.1.3 Computing Negative Powers Modulo a Prime; 2.1.4 Getting (Large) Primes; 2.1.5 Quadratic Residues, Legendre Symbol, and Jacobi Symbol; 2.2 RINGS, GROUPS, FIELDS, AND LATTICES.
2.2.1 Finding a Generating Element2.2.2 Groups of Quadratic Residues; 2.2.3 Constructing a Subgroup; 2.2.4 Constructing General Finite Fields; 2.2.5 Homomorphy and Isomorphy; 2.2.6 Elliptic Curves; 2.2.7 Pairings; 2.2.8 Lattices; 2.3 CODING; 2.4 COMPUTATIONAL COMPLEXITY; 2.4.1 Computational Intractability; 2.4.2 Factorization-Related Assumptions; 2.4.3 Discrete-Logar. |
Record Nr. | UNINA-9910792134903321 |
Rass Stefan | ||
Norwood : , : Artech House, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography for Security and Privacy in Cloud Computing |
Autore | Rass Stefan |
Pubbl/distr/stampa | Norwood : , : Artech House, , 2013 |
Descrizione fisica | 1 online resource (264 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) | SlamanigDaniel |
Collana | Artech House information security and privacy series |
Soggetto topico |
Computer networks - Security measures
Cloud computing |
ISBN | 1-60807-576-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cryptography for Security and Privacy in Cloud Computing; Contents; Chapter 1 Introduction; 1.1 MODERN CRYPTOGRAPHY; 1.2 CLOUD COMPUTING; 1.3 DIGITAL IDENTITY, AUTHENTICATION, AND ACCESS CONTROL; 1.4 PRIVACY-ENHANCING TECHNOLOGIES; 1.5 OUTLINE; References; Chapter 2 Fundamentals; 2.1 NUMBER THEORY; 2.1.1 Drawing Random Coprime Elements; 2.1.2 Computing Inverse Elements Modulo a Prime; 2.1.3 Computing Negative Powers Modulo a Prime; 2.1.4 Getting (Large) Primes; 2.1.5 Quadratic Residues, Legendre Symbol, and Jacobi Symbol; 2.2 RINGS, GROUPS, FIELDS, AND LATTICES.
2.2.1 Finding a Generating Element2.2.2 Groups of Quadratic Residues; 2.2.3 Constructing a Subgroup; 2.2.4 Constructing General Finite Fields; 2.2.5 Homomorphy and Isomorphy; 2.2.6 Elliptic Curves; 2.2.7 Pairings; 2.2.8 Lattices; 2.3 CODING; 2.4 COMPUTATIONAL COMPLEXITY; 2.4.1 Computational Intractability; 2.4.2 Factorization-Related Assumptions; 2.4.3 Discrete-Logar. |
Record Nr. | UNINA-9910820080803321 |
Rass Stefan | ||
Norwood : , : Artech House, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mathematical Aspects of Computer and Information Sciences [[electronic resource] ] : 8th International Conference, MACIS 2019, Gebze, Turkey, November 13–15, 2019, Revised Selected Papers / / edited by Daniel Slamanig, Elias Tsigaridas, Zafeirakis Zafeirakopoulos |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XI, 464 p. 172 illus., 52 illus. in color.) |
Disciplina | 004.0151 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer science—Mathematics
Computer engineering Computer networks Artificial intelligence Computer science Mathematics of Computing Computer Engineering and Networks Artificial Intelligence Computer Communication Networks Theory of Computation |
ISBN | 3-030-43120-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Algorithms and Foundations -- Security and Cryptography -- Combinatorics, Codes, Designs and Graphs -- Data Modeling and Machine Learning -- Tools and Software Track. |
Record Nr. | UNISA-996418217503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Mathematical Aspects of Computer and Information Sciences : 8th International Conference, MACIS 2019, Gebze, Turkey, November 13–15, 2019, Revised Selected Papers / / edited by Daniel Slamanig, Elias Tsigaridas, Zafeirakis Zafeirakopoulos |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XI, 464 p. 172 illus., 52 illus. in color.) |
Disciplina | 004.0151 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer science—Mathematics
Computer engineering Computer networks Artificial intelligence Computer science Mathematics of Computing Computer Engineering and Networks Artificial Intelligence Computer Communication Networks Theory of Computation |
ISBN | 3-030-43120-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Algorithms and Foundations -- Security and Cryptography -- Combinatorics, Codes, Designs and Graphs -- Data Modeling and Machine Learning -- Tools and Software Track. |
Record Nr. | UNINA-9910409679903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers / / edited by Eleni Kosta, Jo Pierson, Daniel Slamanig, Simone Fischer-Hübner, Stephan Krenn |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 291 p. 175 illus., 29 illus. in color.) |
Disciplina | 005.8 |
Collana | IFIP AICT Tutorials |
Soggetto topico |
Computer security
Computers Application software User interfaces (Computer systems) Artificial intelligence Systems and Data Security Computing Milieux Information Systems Applications (incl. Internet) User Interfaces and Human Computer Interaction Computer Appl. in Social and Behavioral Sciences Artificial Intelligence |
ISBN | 3-030-16744-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Causal Bayesian Networks Viewpoint on Fairness -- Sharing is caring, a boundary object approach to mapping and discussing personal data processing -- Who You Gonna Call When There's Something Wrong in Your Processing? Risk Assessment and Data Breach Notications in Practice -- Design and Security Assessment of Usable Multi-Factor Authentication and Single Sign-On Solutions for Mobile Applications: A Workshop Experience Report -- Towards Empowering the Human for Privacy Online -- Trust and Distrust: On Sense and Nonsense in Big Data -- GDPR transparency requirements and data privacy vocabularies -- Glycos: the basis for a peer-to-peer, private online social network -- GDPR and the Concept of Risk: The Role of risk, the Scope of risk and the technology involved -- Privacy Patterns for Pseudonymity -- Implementing GDPR in the Charity Sector: A Case Study -- Me and My Robot! Sharing Information with a New Friend -- chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change -- Is Privacy Controllable? -- Assessing Theories for Research on Personal Data Transparency -- Data Protection by Design for cross-border electronic identication: does the eIDAS Interoperability Framework need to be modernised? -- Risk proling by law enforcement agencies in the Big Data era: Is there a need for transparency? |
Record Nr. | UNINA-9910337860503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|