Information and Communication Security [[electronic resource] ] : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings / / edited by Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XIII, 432 p. 86 illus., 47 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Data structures (Computer science) Coding theory Information theory Computer security Algorithms Computer communication systems Cryptology Data Structures and Information Theory Coding and Information Theory Systems and Data Security Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN | 3-642-25243-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465699903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information and Communications Security [[electronic resource] ] : 11th International Conference, ICICS 2009 / / edited by Sihan Qing, Chris J. Mitchell, Guilin Wang |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIV, 504 p.) |
Disciplina | 004n/a |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer programming Data structures (Computer science) Coding theory Information theory Computer security Cryptology Computer Communication Networks Programming Techniques Data Structures and Information Theory Coding and Information Theory Systems and Data Security |
Soggetto genere / forma |
Conference proceedings.
Kongress. Peking (2009) |
ISBN |
1-280-38340-2
9786613561329 3-642-11145-9 |
Classificazione |
DAT 461f
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- How to Steal a Botnet and What Can Happen When You Do -- A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing -- Cryptanalysis -- Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform -- Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher -- Algorithms and Implementations -- The rakaposhi Stream Cipher -- Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes -- Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems -- Public Key Cryptography -- Online/Offline Ring Signature Scheme -- Policy-Controlled Signatures -- Public Key Encryption without Random Oracle Made Truly Practical -- A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate -- Security Applications -- Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks -- Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains -- Biometric-Based Non-transferable Anonymous Credentials -- Software Security -- Secure Remote Execution of Sequential Computations -- Architecture- and OS-Independent Binary-Level Dynamic Test Generation -- System Security -- Measuring Information Flow in Reactive Processes -- Trusted Isolation Environment: An Attestation Architecture with Usage Control Model -- Denial-of-Service Attacks on Host-Based Generic Unpackers -- Network Security -- Predictive Pattern Matching for Scalable Network Intrusion Detection -- Deterministic Finite Automata Characterization for Memory-Based Pattern Matching -- A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold -- User-Assisted Host-Based Detection of Outbound Malware Traffic -- Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence -- Short Papers I -- Using the (Open) Solaris Service Management Facility as a Building Block for System Security -- IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program -- A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper] -- Database Security -- Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining -- GUC-Secure Join Operator in Distributed Relational Database -- Trust Management -- TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics -- Bring Efficient Connotation Expressible Policies to Trust Management -- A User Trust-Based Collaborative Filtering Recommendation Algorithm -- Applied Cryptography -- Fingerprinting Attack on the Tor Anonymity System -- Proactive Verifiable Linear Integer Secret Sharing Scheme -- A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach -- Digital Audio Watermarking Technique Using Pseudo-Zernike Moments -- Short Papers II -- An Image Sanitizing Scheme Using Digital Watermarking -- Adaptive and Composable Oblivious Transfer Protocols (Short Paper) -- Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. |
Record Nr. | UNISA-996465509603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information and Communications Security [[electronic resource] ] : 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings / / edited by Wenbo Mao, Guilin Wang |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XIV, 498 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Management information systems Computer science Computers and civilization Computer communication systems Algorithms Cryptology Operating Systems Management of Computing and Information Systems Computers and Society Computer Communication Networks Algorithm Analysis and Problem Complexity |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fair Exchange -- An Evenhanded Certified Email System for Contract Signing -- Efficient ID-Based Optimistic Fair Exchange with Provable Security -- On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol -- Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery -- Digital Signatures I -- Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security -- On Delegatability of Four Designated Verifier Signatures -- PIATS: A Partially Sanitizable Signature Scheme -- Cryptographic Protocols -- Ciphertext Comparison, a New Solution to the Millionaire Problem -- Private Itemset Support Counting -- Visual Cryptographic Protocols Using the Trusted Initializer -- Admissible Interference by Typing for Cryptographic Protocols -- Cryptanalysis -- On the Security Bounds of CMC, EME, EME?+? and EME* Modes of Operation -- On the Security of Encryption Modes of MD4, MD5 and HAVAL -- Cryptanalysis of PASS II and MiniPass -- Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves -- Digital Signatures II -- Asymmetric Concurrent Signatures -- Generic Construction of (Identity-Based) Perfect Concurrent Signatures -- Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains -- Network Security -- Session Table Architecture for Defending SYN Flood Attack -- A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks -- Port Scan Behavior Diagnosis by Clustering -- Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG) -- Applied Cryptography -- Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails -- Secure Multicast Using Proxy Encryption -- Efficient and Non-interactive Timed-Release Encryption -- Key Management -- Security Properties of Two Authenticated Conference Key Agreement Protocols -- Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity -- Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment -- Access Control -- Enforce Mandatory Access Control Policy on XML Documents -- Network Access Control for Mobile Ad-Hoc Networks -- Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware -- Applications -- Authenticating Query Results in Data Publishing -- Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream -- Batching SSL/TLS Handshake Improved -- Achieving Efficient Conjunctive Keyword Searches over Encrypted Data -- Watermarking -- Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio -- Reversible Watermark with Large Capacity Using the Predictive Coding -- System Security -- PCAV: Internet Attack Visualization on Parallel Coordinates -- Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA -- D_DIPS: An Intrusion Prevention System for Database Security. |
Record Nr. | UNISA-996465548203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security Practice and Experience [[electronic resource] ] : 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings / / edited by Mark D. Ryan, Ben Smyth, Guilin Wang |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XIII, 406 p. 68 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Information storage and retrieval Computers and civilization Management information systems Computer science Cryptology Systems and Data Security Computer Communication Networks Information Storage and Retrieval Computers and Society Management of Computing and Information Systems |
ISBN | 3-642-29101-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
A Pre-computable Signature Scheme with Efficient Verification for RFID / Fuchun Guo, Yi Mu, Willy Susilo and Vijay Varadharajan -- Redactable Signatures for Independent Removal of Structure and Content / Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga and Hermann de Meer -- Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring / Xianhui Lu, Bao Li, Qixiang Mei and Yamin Liu -- Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack / Chong-zhi Gao, Dongqing Xie and Baodian Wei -- Computational Soundness of Indistinguishability Properties without Computable Parsing / Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto and Hideki Sakurada -- New Impossible Differential Attacks on Camellia / Dongxia Bai and Leibo Li -- Impossible Differential Attacks on Reduced-Round LBlock / Ya Liu, Dawu Gu, Zhiqiang Liu and Wei Li -- New Truncated Differential Cryptanalysis on 3D Block Cipher / Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta.
iPIN and mTAN for Secure eID Applications / Johannes Braun, Moritz Horsch and Alexander Wiesmaier -- Secure Distributed Computation of the Square Root and Applications / Manuel Liedel -- Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization / Tian Shuo, He Yeping and Ding Baozeng -- Structure-Based RSA Fault Attacks / Benjamin Michéle, Juliane Krämer and Jean-Pierre Seifert -- Fault Analysis of the KATAN Family of Block Ciphers / Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo and Jennifer Seberry -- Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher / Yanfeng Wang, Wenling Wu and Xiaoli Yu -- On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers / Zhenfei Zhang, Thomas Plantard and Willy Susilo -- Partial Key Exposure on RSA with Private Exponents Larger Than N / Marc Joye and Tancrède Lepoint -- Linear Cryptanalysis of Reduced-Round ICEBERG / Yue Sun and Meiqin Wang -- Overcoming Significant Noise: Correlation-Template-Induction Attack / An Wang, Man Chen, Zongyue Wang and Yaoling Ding. ; Part 1. Spatio (Temporal) Data Modeling and Visualisation -- Usability of Spatio-Temporal Uncertainty Visualisation Methods / Hansi Senaratne, Lydia Gerharz, Edzer Pebesma and Angela Schwering -- Line Simplification in the Presence of Non-Planar Topological Relationships / Padraig Corcoran, Peter Mooney and Michela Bertolotto -- Critical Remarks on the Use of Conceptual Schemas in Geospatial Data Modelling-A Schema Translation Perspective / Tatjana Kutzner and Andreas Donaubauer -- Part 2. Spatial Data Infrastructures, Geo Web Services and Geo Semantic Web -- Towards an Active Directory of Geospatial Web Services / Francisco J. Lopez-Pellicer, Walter Rentería-Agualimpia, Javier Nogueras-Iso, F. Javier Zarazaga-Soria and Pedro R. Muro-Medrano -- Spatial Sensor Web for the Prediction of Electric Power Supply System Behaviour / Miloš Bogdanović, Nataša Veljković and Leonid Stoimenov -- Live Geoinformation with Standardized Geoprocessing Services / Theodor Foerster, Bastian Baranski and Harald Borsutzky -- Interlinking Geospatial Information in the Web of Data / Luis M. Vilches-Blázquez, Víctor Saquicela and Oscar Corcho -- Part 3. Modelling and Management of Uncertainty, Spatio (Temporal) Data Quality and Metadata -- QualESTIM: Interactive Quality Assessment of Socioeconomic Data Using Outlier Detection / Christine Plumejeaud and Marlène Villanova-Oliver -- Distributed Integration of Spatial Data with Different Positional Accuracies / Alberto Belussi and Sara Migliorini -- Through a Fuzzy Spatiotemporal Information System for Handling Excavation Data / Asma Zoghlami, Cyril de Runz, Herman Akdag and Dominique Pargny -- Part 4. Mobility of Persons, Objects and Systems, Transports and Flows -- Using Weather Information to Improve Route Planning / Paul Litzinger, Gerhard Navratil, Åke Sivertun and Daniela Knorr -- Simulation of Laser Attacks against Aircrafts / Václav Talhofer, Teodor Baláž, František Racek, Alois Hofmann and Šárka Hošková-Mayerová -- Automated Traffic Route Identification Through the Shared Nearest Neighbour Algorithm / Maribel Yasmina Santos, Joaquim P. Silva, João Moura-Pires and Monica Wachowicz -- Part 5. Spatial Analysis, Geostatistics, and Geo Information Retrieval -- Comparing Support Vector Regression and Statistical Linear Regression for Predicting Poverty Incidence in Vietnam / Cornelius Senf and Tobia Lakes -- Do Expressive Geographic Queries Lead to Improvement in Retrieval Effectiveness? / Damien Palacio, Christian Sallaberry, Guillaume Cabanac, Gilles Hubert and Mauro Gaio -- The GP-SET Method: A Spatial and Temporal Probabilistic Model for Geoprospective / Stéphane Bourrelly and Christine Voiron-Canicio -- Part 6. Modelling and Spatial Analysis of Urban Dynamics, Urban GIS -- Predicting Spatiotemporal Distribution of Transient Occupants in Urban Areas / Toshihiro Osaragi and Takeshi Hoshino -- Towards Urban Fabrics Characterization Based on Buildings Footprints / Rachid Hamaina, Thomas Leduc and Guillaume Moreau -- The Use of Point Pattern Statistics in UrbanAnalysis / Ioannis Pissourios, Pery Lafazani, Stavros Spyrellis, Anastasia Christodoulou and Myron Myridis -- Part 7. GIS and Spatial Analysis for Global Change Modelling, Impact on Space -- Beach-Dune Morphological Relationships at Youghal Beach, Cork / Sarah Kandrot -- A New Method for Computing the Drainage Network Based on Raising the Level of an Ocean Surrounding the Terrain / Salles V. G. Magalhães, Marcus V. A. Andrade, W. Randolph Franklin and Guilherme C. Pena -- Part 8. Geographic Information Science: Links with other Disciplines and Citizens -- Geographic Information Science as a Common Cause for Interdisciplinary Research / Thomas Blaschke, Josef Strobl, Lothar Schrott, Robert Marschallinger and Franz Neubauer, et al. -- Enhancing the Quality of Volunteered Geographic Information: A Constraint-Based Approach / Olga Yanenko and Christoph Schlieder. |
Record Nr. | UNISA-996466000903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security Practice and Experience [[electronic resource] ] : 5th International Conference, ISPEC 2009 Xi'an, China, April 13-15, 2009 Proceedings / / edited by Feng Bao, Hui Li, Guilin Wang |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIV, 410 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Computers and civilization Systems and Data Security Cryptology Computer Communication Networks Computers and Society |
ISBN | 3-642-00843-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public Key Encryption -- Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes -- A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length -- RSA-Based Certificateless Public Key Encryption -- Digital Signatures -- Strongly Unforgeable ID-Based Signatures without Random Oracles -- On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings -- System Security -- An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems -- Reconstructing a Packed DLL Binary for Static Analysis -- Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework -- Applied Cryptography -- Efficient Concurrent n poly(logn)-Simulatable Argument of Knowledge -- New Constructions for Reusable, Non-erasure and Universally Composable Commitments -- Certificateless Hybrid Signcryption -- On Non-representable Secret Sharing Matroids -- Multimedia Security and DRM -- A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization -- Defending against the Pirate Evolution Attack -- Security Specification for Conversion Technologies of Heterogeneous DRM Systems -- Security Protocols -- Analysing Protocol Implementations -- Measuring Anonymity -- A Hybrid E-Voting Scheme -- Key Exchange and Management -- A Framework for Authenticated Key Exchange in the Standard Model -- Secret Handshake: Strong Anonymity Definition and Construction -- An Extended Authentication and Key Agreement Protocol of UMTS -- Hash-Based Key Management Schemes for MPEG4-FGS -- Hash Functions and MACs -- Twister – A Framework for Secure and Fast Hash Functions -- Preimage Attack on Hash Function RIPEMD -- Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL -- Cryptanalysis -- Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher -- Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2 -- Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard -- On the Correctness of an Approach against Side-Channel Attacks -- Network Security -- Ranking Attack Graphs with Graph Neural Networks -- Implementing IDS Management on Lock-Keeper -- Security Applications -- Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems -- Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing -- Trusted Privacy Domains – Challenges for Trusted Computing in Privacy-Protecting Information Sharing. |
Record Nr. | UNISA-996466021903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security, Practice and Experience [[electronic resource] ] : 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings / / edited by Jin Kwak, Robert H. Deng, Guilin Wang, Yoojae Won |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIII, 399 p. 68 illus.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Computer security Computer Communication Networks Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Systems and Data Security |
ISBN |
1-280-38641-X
9786613564337 3-642-12827-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis -- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512 -- Integral Attacks on Reduced-Round ARIA Block Cipher -- A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance -- On the Security of NOEKEON against Side Channel Cube Attacks -- Algorithms and Implementations (I) -- On Fast and Approximate Attack Tree Computations -- Width-3 Joint Sparse Form -- Accelerating Inverse of GF(2 n ) with Precomputation -- Algorithms and Implementations (II) -- Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis -- The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups -- A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables -- Network Security -- Host-Based Security Sensor Integrity in Multiprocessing Environments -- Using Purpose Capturing Signatures to Defeat Computer Virus Mutating -- Rate-Based Watermark Traceback: A New Approach -- Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes -- Access Control -- Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk -- A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), -- Identity Management -- A Trustworthy ID Management Mechanism in Open Market -- BioID: Biometric-Based Identity Management -- Trust Management -- Privacy Preserving of Trust Management Credentials Based on Trusted Computing -- Mitigating the Malicious Trust Expansion in Social Network Service -- Public Key Cryptography -- An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification -- Certificateless KEM and Hybrid Signcryption Schemes Revisited -- A Deniable Group Key Establishment Protocol in the Standard Model -- Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting -- Security Applications -- Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis -- Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles -- Attacking and Improving on Lee and Chiu’s Authentication Scheme Using Smart Cards -- Protection Profile for Secure E-Voting Systems. |
Record Nr. | UNISA-996465890403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Provable Security [[electronic resource] ] : 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings / / edited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XIII, 337 p. 11 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Operating systems (Computers) Application software Computers and civilization Cryptology Systems and Data Security Management of Computing and Information Systems Operating Systems Computer Appl. in Administrative Data Processing Computers and Society |
ISBN | 3-642-33272-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security. |
Record Nr. | UNISA-996465767803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|