top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information and Communication Security [[electronic resource] ] : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings / / edited by Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu
Information and Communication Security [[electronic resource] ] : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings / / edited by Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIII, 432 p. 86 illus., 47 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Coding theory
Information theory
Computer security
Algorithms
Computer communication systems
Cryptology
Data Structures and Information Theory
Coding and Information Theory
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-642-25243-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465699903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 11th International Conference, ICICS 2009 / / edited by Sihan Qing, Chris J. Mitchell, Guilin Wang
Information and Communications Security [[electronic resource] ] : 11th International Conference, ICICS 2009 / / edited by Sihan Qing, Chris J. Mitchell, Guilin Wang
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 504 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer programming
Data structures (Computer science)
Coding theory
Information theory
Computer security
Cryptology
Computer Communication Networks
Programming Techniques
Data Structures and Information Theory
Coding and Information Theory
Systems and Data Security
Soggetto genere / forma Conference proceedings.
Kongress.
Peking (2009)
ISBN 1-280-38340-2
9786613561329
3-642-11145-9
Classificazione DAT 461f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- How to Steal a Botnet and What Can Happen When You Do -- A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing -- Cryptanalysis -- Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform -- Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher -- Algorithms and Implementations -- The rakaposhi Stream Cipher -- Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes -- Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems -- Public Key Cryptography -- Online/Offline Ring Signature Scheme -- Policy-Controlled Signatures -- Public Key Encryption without Random Oracle Made Truly Practical -- A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate -- Security Applications -- Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks -- Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains -- Biometric-Based Non-transferable Anonymous Credentials -- Software Security -- Secure Remote Execution of Sequential Computations -- Architecture- and OS-Independent Binary-Level Dynamic Test Generation -- System Security -- Measuring Information Flow in Reactive Processes -- Trusted Isolation Environment: An Attestation Architecture with Usage Control Model -- Denial-of-Service Attacks on Host-Based Generic Unpackers -- Network Security -- Predictive Pattern Matching for Scalable Network Intrusion Detection -- Deterministic Finite Automata Characterization for Memory-Based Pattern Matching -- A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold -- User-Assisted Host-Based Detection of Outbound Malware Traffic -- Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence -- Short Papers I -- Using the (Open) Solaris Service Management Facility as a Building Block for System Security -- IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program -- A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper] -- Database Security -- Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining -- GUC-Secure Join Operator in Distributed Relational Database -- Trust Management -- TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics -- Bring Efficient Connotation Expressible Policies to Trust Management -- A User Trust-Based Collaborative Filtering Recommendation Algorithm -- Applied Cryptography -- Fingerprinting Attack on the Tor Anonymity System -- Proactive Verifiable Linear Integer Secret Sharing Scheme -- A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach -- Digital Audio Watermarking Technique Using Pseudo-Zernike Moments -- Short Papers II -- An Image Sanitizing Scheme Using Digital Watermarking -- Adaptive and Composable Oblivious Transfer Protocols (Short Paper) -- Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Record Nr. UNISA-996465509603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings / / edited by Wenbo Mao, Guilin Wang
Information and Communications Security [[electronic resource] ] : 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings / / edited by Wenbo Mao, Guilin Wang
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XIV, 498 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Operating systems (Computers)
Management information systems
Computer science
Computers and civilization
Computer communication systems
Algorithms
Cryptology
Operating Systems
Management of Computing and Information Systems
Computers and Society
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fair Exchange -- An Evenhanded Certified Email System for Contract Signing -- Efficient ID-Based Optimistic Fair Exchange with Provable Security -- On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol -- Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery -- Digital Signatures I -- Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security -- On Delegatability of Four Designated Verifier Signatures -- PIATS: A Partially Sanitizable Signature Scheme -- Cryptographic Protocols -- Ciphertext Comparison, a New Solution to the Millionaire Problem -- Private Itemset Support Counting -- Visual Cryptographic Protocols Using the Trusted Initializer -- Admissible Interference by Typing for Cryptographic Protocols -- Cryptanalysis -- On the Security Bounds of CMC, EME, EME?+? and EME* Modes of Operation -- On the Security of Encryption Modes of MD4, MD5 and HAVAL -- Cryptanalysis of PASS II and MiniPass -- Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves -- Digital Signatures II -- Asymmetric Concurrent Signatures -- Generic Construction of (Identity-Based) Perfect Concurrent Signatures -- Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains -- Network Security -- Session Table Architecture for Defending SYN Flood Attack -- A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks -- Port Scan Behavior Diagnosis by Clustering -- Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG) -- Applied Cryptography -- Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails -- Secure Multicast Using Proxy Encryption -- Efficient and Non-interactive Timed-Release Encryption -- Key Management -- Security Properties of Two Authenticated Conference Key Agreement Protocols -- Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity -- Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment -- Access Control -- Enforce Mandatory Access Control Policy on XML Documents -- Network Access Control for Mobile Ad-Hoc Networks -- Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware -- Applications -- Authenticating Query Results in Data Publishing -- Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream -- Batching SSL/TLS Handshake Improved -- Achieving Efficient Conjunctive Keyword Searches over Encrypted Data -- Watermarking -- Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio -- Reversible Watermark with Large Capacity Using the Predictive Coding -- System Security -- PCAV: Internet Attack Visualization on Parallel Coordinates -- Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA -- D_DIPS: An Intrusion Prevention System for Database Security.
Record Nr. UNISA-996465548203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings / / edited by Mark D. Ryan, Ben Smyth, Guilin Wang
Information Security Practice and Experience [[electronic resource] ] : 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings / / edited by Mark D. Ryan, Ben Smyth, Guilin Wang
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XIII, 406 p. 68 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Information storage and retrieval
Computers and civilization
Management information systems
Computer science
Cryptology
Systems and Data Security
Computer Communication Networks
Information Storage and Retrieval
Computers and Society
Management of Computing and Information Systems
ISBN 3-642-29101-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Pre-computable Signature Scheme with Efficient Verification for RFID / Fuchun Guo, Yi Mu, Willy Susilo and Vijay Varadharajan -- Redactable Signatures for Independent Removal of Structure and Content / Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga and Hermann de Meer -- Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring / Xianhui Lu, Bao Li, Qixiang Mei and Yamin Liu -- Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack / Chong-zhi Gao, Dongqing Xie and Baodian Wei -- Computational Soundness of Indistinguishability Properties without Computable Parsing / Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto and Hideki Sakurada -- New Impossible Differential Attacks on Camellia / Dongxia Bai and Leibo Li -- Impossible Differential Attacks on Reduced-Round LBlock / Ya Liu, Dawu Gu, Zhiqiang Liu and Wei Li -- New Truncated Differential Cryptanalysis on 3D Block Cipher / Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta.
iPIN and mTAN for Secure eID Applications / Johannes Braun, Moritz Horsch and Alexander Wiesmaier -- Secure Distributed Computation of the Square Root and Applications / Manuel Liedel -- Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization / Tian Shuo, He Yeping and Ding Baozeng -- Structure-Based RSA Fault Attacks / Benjamin Michéle, Juliane Krämer and Jean-Pierre Seifert -- Fault Analysis of the KATAN Family of Block Ciphers / Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo and Jennifer Seberry -- Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher / Yanfeng Wang, Wenling Wu and Xiaoli Yu -- On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers / Zhenfei Zhang, Thomas Plantard and Willy Susilo -- Partial Key Exposure on RSA with Private Exponents Larger Than N / Marc Joye and Tancrède Lepoint -- Linear Cryptanalysis of Reduced-Round ICEBERG / Yue Sun and Meiqin Wang -- Overcoming Significant Noise: Correlation-Template-Induction Attack / An Wang, Man Chen, Zongyue Wang and Yaoling Ding.
; Part 1. Spatio (Temporal) Data Modeling and Visualisation -- Usability of Spatio-Temporal Uncertainty Visualisation Methods / Hansi Senaratne, Lydia Gerharz, Edzer Pebesma and Angela Schwering -- Line Simplification in the Presence of Non-Planar Topological Relationships / Padraig Corcoran, Peter Mooney and Michela Bertolotto -- Critical Remarks on the Use of Conceptual Schemas in Geospatial Data Modelling-A Schema Translation Perspective / Tatjana Kutzner and Andreas Donaubauer -- Part 2. Spatial Data Infrastructures, Geo Web Services and Geo Semantic Web -- Towards an Active Directory of Geospatial Web Services / Francisco J. Lopez-Pellicer, Walter Rentería-Agualimpia, Javier Nogueras-Iso, F. Javier Zarazaga-Soria and Pedro R. Muro-Medrano -- Spatial Sensor Web for the Prediction of Electric Power Supply System Behaviour / Miloš Bogdanović, Nataša Veljković and Leonid Stoimenov -- Live Geoinformation with Standardized Geoprocessing Services / Theodor Foerster, Bastian Baranski and Harald Borsutzky -- Interlinking Geospatial Information in the Web of Data / Luis M. Vilches-Blázquez, Víctor Saquicela and Oscar Corcho -- Part 3. Modelling and Management of Uncertainty, Spatio (Temporal) Data Quality and Metadata -- QualESTIM: Interactive Quality Assessment of Socioeconomic Data Using Outlier Detection / Christine Plumejeaud and Marlène Villanova-Oliver -- Distributed Integration of Spatial Data with Different Positional Accuracies / Alberto Belussi and Sara Migliorini -- Through a Fuzzy Spatiotemporal Information System for Handling Excavation Data / Asma Zoghlami, Cyril de Runz, Herman Akdag and Dominique Pargny -- Part 4. Mobility of Persons, Objects and Systems, Transports and Flows -- Using Weather Information to Improve Route Planning / Paul Litzinger, Gerhard Navratil, Åke Sivertun and Daniela Knorr -- Simulation of Laser Attacks against Aircrafts / Václav Talhofer, Teodor Baláž, František Racek, Alois Hofmann and Šárka Hošková-Mayerová -- Automated Traffic Route Identification Through the Shared Nearest Neighbour Algorithm / Maribel Yasmina Santos, Joaquim P. Silva, João Moura-Pires and Monica Wachowicz -- Part 5. Spatial Analysis, Geostatistics, and Geo Information Retrieval -- Comparing Support Vector Regression and Statistical Linear Regression for Predicting Poverty Incidence in Vietnam / Cornelius Senf and Tobia Lakes -- Do Expressive Geographic Queries Lead to Improvement in Retrieval Effectiveness? / Damien Palacio, Christian Sallaberry, Guillaume Cabanac, Gilles Hubert and Mauro Gaio -- The GP-SET Method: A Spatial and Temporal Probabilistic Model for Geoprospective / Stéphane Bourrelly and Christine Voiron-Canicio -- Part 6. Modelling and Spatial Analysis of Urban Dynamics, Urban GIS -- Predicting Spatiotemporal Distribution of Transient Occupants in Urban Areas / Toshihiro Osaragi and Takeshi Hoshino -- Towards Urban Fabrics Characterization Based on Buildings Footprints / Rachid Hamaina, Thomas Leduc and Guillaume Moreau -- The Use of Point Pattern Statistics in UrbanAnalysis / Ioannis Pissourios, Pery Lafazani, Stavros Spyrellis, Anastasia Christodoulou and Myron Myridis -- Part 7. GIS and Spatial Analysis for Global Change Modelling, Impact on Space -- Beach-Dune Morphological Relationships at Youghal Beach, Cork / Sarah Kandrot -- A New Method for Computing the Drainage Network Based on Raising the Level of an Ocean Surrounding the Terrain / Salles V. G. Magalhães, Marcus V. A. Andrade, W. Randolph Franklin and Guilherme C. Pena -- Part 8. Geographic Information Science: Links with other Disciplines and Citizens -- Geographic Information Science as a Common Cause for Interdisciplinary Research / Thomas Blaschke, Josef Strobl, Lothar Schrott, Robert Marschallinger and Franz Neubauer, et al. -- Enhancing the Quality of Volunteered Geographic Information: A Constraint-Based Approach / Olga Yanenko and Christoph Schlieder.
Record Nr. UNISA-996466000903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 5th International Conference, ISPEC 2009 Xi'an, China, April 13-15, 2009 Proceedings / / edited by Feng Bao, Hui Li, Guilin Wang
Information Security Practice and Experience [[electronic resource] ] : 5th International Conference, ISPEC 2009 Xi'an, China, April 13-15, 2009 Proceedings / / edited by Feng Bao, Hui Li, Guilin Wang
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 410 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Computers and civilization
Systems and Data Security
Cryptology
Computer Communication Networks
Computers and Society
ISBN 3-642-00843-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Encryption -- Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes -- A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length -- RSA-Based Certificateless Public Key Encryption -- Digital Signatures -- Strongly Unforgeable ID-Based Signatures without Random Oracles -- On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings -- System Security -- An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems -- Reconstructing a Packed DLL Binary for Static Analysis -- Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework -- Applied Cryptography -- Efficient Concurrent n poly(logn)-Simulatable Argument of Knowledge -- New Constructions for Reusable, Non-erasure and Universally Composable Commitments -- Certificateless Hybrid Signcryption -- On Non-representable Secret Sharing Matroids -- Multimedia Security and DRM -- A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization -- Defending against the Pirate Evolution Attack -- Security Specification for Conversion Technologies of Heterogeneous DRM Systems -- Security Protocols -- Analysing Protocol Implementations -- Measuring Anonymity -- A Hybrid E-Voting Scheme -- Key Exchange and Management -- A Framework for Authenticated Key Exchange in the Standard Model -- Secret Handshake: Strong Anonymity Definition and Construction -- An Extended Authentication and Key Agreement Protocol of UMTS -- Hash-Based Key Management Schemes for MPEG4-FGS -- Hash Functions and MACs -- Twister – A Framework for Secure and Fast Hash Functions -- Preimage Attack on Hash Function RIPEMD -- Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL -- Cryptanalysis -- Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher -- Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2 -- Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard -- On the Correctness of an Approach against Side-Channel Attacks -- Network Security -- Ranking Attack Graphs with Graph Neural Networks -- Implementing IDS Management on Lock-Keeper -- Security Applications -- Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems -- Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing -- Trusted Privacy Domains – Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Record Nr. UNISA-996466021903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security, Practice and Experience [[electronic resource] ] : 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings / / edited by Jin Kwak, Robert H. Deng, Guilin Wang, Yoojae Won
Information Security, Practice and Experience [[electronic resource] ] : 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings / / edited by Jin Kwak, Robert H. Deng, Guilin Wang, Yoojae Won
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 399 p. 68 illus.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Computer security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Systems and Data Security
ISBN 1-280-38641-X
9786613564337
3-642-12827-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis -- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512 -- Integral Attacks on Reduced-Round ARIA Block Cipher -- A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance -- On the Security of NOEKEON against Side Channel Cube Attacks -- Algorithms and Implementations (I) -- On Fast and Approximate Attack Tree Computations -- Width-3 Joint Sparse Form -- Accelerating Inverse of GF(2 n ) with Precomputation -- Algorithms and Implementations (II) -- Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis -- The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups -- A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables -- Network Security -- Host-Based Security Sensor Integrity in Multiprocessing Environments -- Using Purpose Capturing Signatures to Defeat Computer Virus Mutating -- Rate-Based Watermark Traceback: A New Approach -- Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes -- Access Control -- Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk -- A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), -- Identity Management -- A Trustworthy ID Management Mechanism in Open Market -- BioID: Biometric-Based Identity Management -- Trust Management -- Privacy Preserving of Trust Management Credentials Based on Trusted Computing -- Mitigating the Malicious Trust Expansion in Social Network Service -- Public Key Cryptography -- An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification -- Certificateless KEM and Hybrid Signcryption Schemes Revisited -- A Deniable Group Key Establishment Protocol in the Standard Model -- Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting -- Security Applications -- Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis -- Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles -- Attacking and Improving on Lee and Chiu’s Authentication Scheme Using Smart Cards -- Protection Profile for Secure E-Voting Systems.
Record Nr. UNISA-996465890403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Provable Security [[electronic resource] ] : 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings / / edited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu
Provable Security [[electronic resource] ] : 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings / / edited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XIII, 337 p. 11 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Operating systems (Computers)
Application software
Computers and civilization
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Operating Systems
Computer Appl. in Administrative Data Processing
Computers and Society
ISBN 3-642-33272-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security.
Record Nr. UNISA-996465767803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui