top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security - ESORICS 2005 [[electronic resource] ] : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings / / edited by Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann
Computer Security - ESORICS 2005 [[electronic resource] ] : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings / / edited by Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 516 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Database management
Management information systems
Computer science
Computers and civilization
Cryptology
Computer Communication Networks
Operating Systems
Database Management
Management of Computing and Information Systems
Computers and Society
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation in the Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols.
Record Nr. UNISA-996465615003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Privacy Enhancing Technologies [[electronic resource] ] : Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers / / edited by Roger Dingledine, Paul Syverson
Privacy Enhancing Technologies [[electronic resource] ] : Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers / / edited by Roger Dingledine, Paul Syverson
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (VIII, 242 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer communication systems
Data encryption (Computer science)
Computer engineering
Operating systems (Computers)
Information storage and retrieval
Computers and civilization
Computer Communication Networks
Cryptology
Computer Engineering
Operating Systems
Information Storage and Retrieval
Computers and Society
ISBN 3-540-36467-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy-Enhancing Technologies for the Internet, II: Five Years Later -- Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education -- Private Authentication -- Towards an Information Theoretic Metric for Anonymity -- Towards Measuring Anonymity -- Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data -- Privacy Enhancing Profile Disclosure -- Privacy Enhancing Service Architectures -- Dummy Traffic against Long Term Intersection Attacks -- Protecting Privacy during On-Line Trust Negotiation -- Prototyping an Armored Data Vault -- Preventing Interval-Based Inference by Random Data Perturbation -- Fingerprinting Websites Using Traffic Analysis -- A Passive Attack on the Privacy of Web Users Using Standard Log Information -- Covert Messaging through TCP Timestamps -- Almost Optimal Private Information Retrieval -- Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach?.
Record Nr. UNISA-996465572703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Privacy Enhancing Technologies : Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers / / edited by Roger Dingledine, Paul Syverson
Privacy Enhancing Technologies : Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers / / edited by Roger Dingledine, Paul Syverson
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (VIII, 242 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer communication systems
Data encryption (Computer science)
Computer engineering
Operating systems (Computers)
Information storage and retrieval
Computers and civilization
Computer Communication Networks
Cryptology
Computer Engineering
Operating Systems
Information Storage and Retrieval
Computers and Society
ISBN 3-540-36467-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy-Enhancing Technologies for the Internet, II: Five Years Later -- Detecting Web Bugs with Bugnosis: Privacy Advocacy through Education -- Private Authentication -- Towards an Information Theoretic Metric for Anonymity -- Towards Measuring Anonymity -- Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data -- Privacy Enhancing Profile Disclosure -- Privacy Enhancing Service Architectures -- Dummy Traffic against Long Term Intersection Attacks -- Protecting Privacy during On-Line Trust Negotiation -- Prototyping an Armored Data Vault -- Preventing Interval-Based Inference by Random Data Perturbation -- Fingerprinting Websites Using Traffic Analysis -- A Passive Attack on the Privacy of Web Users Using Standard Log Information -- Covert Messaging through TCP Timestamps -- Almost Optimal Private Information Retrieval -- Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach?.
Record Nr. UNINA-9910143898903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui