top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information and communications security : 11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings / / Sihan Qing, Chris J. Mitchell, Guilin Wang (eds.)
Information and communications security : 11th international conference, ICICS 2009, Beijing, China, December 14-17, 2009 : proceedings / / Sihan Qing, Chris J. Mitchell, Guilin Wang (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; Heidelberg, : Springer-Verlag, c2009
Descrizione fisica 1 online resource (XIV, 504 p.)
Disciplina 004n/a
Altri autori (Persone) QingSihan
MitchellChris
WangGuilin, Dr.
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 1-280-38340-2
9786613561329
3-642-11145-9
Classificazione DAT 461f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- How to Steal a Botnet and What Can Happen When You Do -- A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing -- Cryptanalysis -- Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform -- Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher -- Algorithms and Implementations -- The rakaposhi Stream Cipher -- Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes -- Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems -- Public Key Cryptography -- Online/Offline Ring Signature Scheme -- Policy-Controlled Signatures -- Public Key Encryption without Random Oracle Made Truly Practical -- A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate -- Security Applications -- Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks -- Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains -- Biometric-Based Non-transferable Anonymous Credentials -- Software Security -- Secure Remote Execution of Sequential Computations -- Architecture- and OS-Independent Binary-Level Dynamic Test Generation -- System Security -- Measuring Information Flow in Reactive Processes -- Trusted Isolation Environment: An Attestation Architecture with Usage Control Model -- Denial-of-Service Attacks on Host-Based Generic Unpackers -- Network Security -- Predictive Pattern Matching for Scalable Network Intrusion Detection -- Deterministic Finite Automata Characterization for Memory-Based Pattern Matching -- A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold -- User-Assisted Host-Based Detection of Outbound Malware Traffic -- Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence -- Short Papers I -- Using the (Open) Solaris Service Management Facility as a Building Block for System Security -- IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program -- A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper] -- Database Security -- Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining -- GUC-Secure Join Operator in Distributed Relational Database -- Trust Management -- TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics -- Bring Efficient Connotation Expressible Policies to Trust Management -- A User Trust-Based Collaborative Filtering Recommendation Algorithm -- Applied Cryptography -- Fingerprinting Attack on the Tor Anonymity System -- Proactive Verifiable Linear Integer Secret Sharing Scheme -- A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach -- Digital Audio Watermarking Technique Using Pseudo-Zernike Moments -- Short Papers II -- An Image Sanitizing Scheme Using Digital Watermarking -- Adaptive and Composable Oblivious Transfer Protocols (Short Paper) -- Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Altri titoli varianti ICICS 2009
Record Nr. UNINA-9910483214003321
Berlin ; ; Heidelberg, : Springer-Verlag, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008]
Descrizione fisica 1 online resource (XIII, 436 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 3-540-88625-7
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Attestation: Evidence and Trust -- Authentication -- A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat Modelling in User Performed Authentication -- Access with Fast Batch Verifiable Anonymous Credentials -- Side Channel Analysis -- Quantifying Timing Leaks and Cost Optimisation -- Method for Detecting Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements -- Cryptanalysis -- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box -- Analysis of Two Attacks on Reduced-Round Versions of the SMS4 -- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack -- Access Control -- Beyond User-to-User Access Control for Online Social Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application Confinement Policy Abstractions -- Towards Role Based Trust Management without Distributed Searching of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs -- Enhancing Java ME Security Support with Resource Usage Monitoring -- Pseudo-randomness Inside Web Browsers -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data -- Embedding Renewable Cryptographic Keys into Continuous Noisy Data -- Automated Device Pairing for Asymmetric Pairing Scenarios -- Applied Cryptography -- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0. -- Towards an Information Theoretic Analysis of Searchable Encryption -- A Bootstrap Attack on Digital Watermarks in the Frequency Domain -- Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval -- Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study -- Publicly Verifiable Remote Data Integrity.
Record Nr. UNISA-996466243503316
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008]
Descrizione fisica 1 online resource (XIII, 436 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 3-540-88625-7
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Attestation: Evidence and Trust -- Authentication -- A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat Modelling in User Performed Authentication -- Access with Fast Batch Verifiable Anonymous Credentials -- Side Channel Analysis -- Quantifying Timing Leaks and Cost Optimisation -- Method for Detecting Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements -- Cryptanalysis -- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box -- Analysis of Two Attacks on Reduced-Round Versions of the SMS4 -- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack -- Access Control -- Beyond User-to-User Access Control for Online Social Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application Confinement Policy Abstractions -- Towards Role Based Trust Management without Distributed Searching of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs -- Enhancing Java ME Security Support with Resource Usage Monitoring -- Pseudo-randomness Inside Web Browsers -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data -- Embedding Renewable Cryptographic Keys into Continuous Noisy Data -- Automated Device Pairing for Asymmetric Pairing Scenarios -- Applied Cryptography -- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0. -- Towards an Information Theoretic Analysis of Searchable Encryption -- A Bootstrap Attack on Digital Watermarks in the Frequency Domain -- Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval -- Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study -- Publicly Verifiable Remote Data Integrity.
Record Nr. UNINA-9910484185803321
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings / / Sihan Qing, Hideki Imai, Guilin Wang (editors)
Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings / / Sihan Qing, Hideki Imai, Guilin Wang (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 514 p.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 3-540-77048-8
Classificazione 004
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentication and Key Exchange -- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures -- New Construction of Group Secret Handshakes Based on Pairings -- nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords -- An Efficient Password-Only Two-Server Authenticated Key Exchange System -- Digital Signatures -- Formal Definition and Construction of Nominative Signature -- Short Group Signature Without Random Oracles -- (Convertible) Undeniable Signatures Without Random Oracles -- Applications -- A New Dynamic Accumulator for Batch Updates -- Preventing Unofficial Information Propagation -- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction -- Privacy Protection on Multiple Sensitive Attributes -- Watermarking -- Audio Watermarking Algorithm Based on Centroid and Statistical Features -- A Semi-blind Watermarking Based on Discrete Wavelet Transform -- Fast Implementations -- On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme -- High Speed Modular Divider Based on GCD Algorithm -- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set -- Compact and Secure Design of Masked AES S-Box -- Applied Cryptography -- Boudot’s Range-Bounded Commitment Scheme Revisited -- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions -- Secure Multiparty Computation of DNF -- Cryptanalysis -- Square Like Attack on Camellia -- Differential Fault Analysis on CLEFIA -- Extending FORK-256 Attack to the Full Hash Function -- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard -- Formal Analysis -- A Framework for Game-Based Security Proofs -- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security -- Modeling Agreement Problems in the Universal Composability Framework -- System Security I -- A System Architecture for History-Based Access Control for XML Documents -- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing -- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies -- System Security II -- A Novel Approach for Untrusted Code Execution -- Detection and Diagnosis of Control Interception -- BIOS Security Analysis and a Kind of Trusted BIOS -- Collecting Autonomous Spreading Malware Using High-Interaction Honeypots -- Network Security -- DDoS Attack Detection Algorithms Based on Entropy Computing -- Firewall for Dynamic IP Address in Mobile IPv6 -- Application of the PageRank Algorithm to Alarm Graphs -- Drive-By Pharming.
Record Nr. UNINA-9910484761003321
Berlin ; ; Heidelberg : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings / / Sihan Qing, Hideki Imai, Guilin Wang (editors)
Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings / / Sihan Qing, Hideki Imai, Guilin Wang (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 514 p.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 3-540-77048-8
Classificazione 004
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentication and Key Exchange -- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures -- New Construction of Group Secret Handshakes Based on Pairings -- nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords -- An Efficient Password-Only Two-Server Authenticated Key Exchange System -- Digital Signatures -- Formal Definition and Construction of Nominative Signature -- Short Group Signature Without Random Oracles -- (Convertible) Undeniable Signatures Without Random Oracles -- Applications -- A New Dynamic Accumulator for Batch Updates -- Preventing Unofficial Information Propagation -- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction -- Privacy Protection on Multiple Sensitive Attributes -- Watermarking -- Audio Watermarking Algorithm Based on Centroid and Statistical Features -- A Semi-blind Watermarking Based on Discrete Wavelet Transform -- Fast Implementations -- On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme -- High Speed Modular Divider Based on GCD Algorithm -- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set -- Compact and Secure Design of Masked AES S-Box -- Applied Cryptography -- Boudot’s Range-Bounded Commitment Scheme Revisited -- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions -- Secure Multiparty Computation of DNF -- Cryptanalysis -- Square Like Attack on Camellia -- Differential Fault Analysis on CLEFIA -- Extending FORK-256 Attack to the Full Hash Function -- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard -- Formal Analysis -- A Framework for Game-Based Security Proofs -- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security -- Modeling Agreement Problems in the Universal Composability Framework -- System Security I -- A System Architecture for History-Based Access Control for XML Documents -- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing -- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies -- System Security II -- A Novel Approach for Untrusted Code Execution -- Detection and Diagnosis of Control Interception -- BIOS Security Analysis and a Kind of Trusted BIOS -- Collecting Autonomous Spreading Malware Using High-Interaction Honeypots -- Network Security -- DDoS Attack Detection Algorithms Based on Entropy Computing -- Firewall for Dynamic IP Address in Mobile IPv6 -- Application of the PageRank Algorithm to Alarm Graphs -- Drive-By Pharming.
Record Nr. UNISA-996466253403316
Berlin ; ; Heidelberg : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information security practice and experience : 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 ; proceedings / / Feng Bao, Hui Li, Guilin Wang (eds.)
Information security practice and experience : 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 ; proceedings / / Feng Bao, Hui Li, Guilin Wang (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, : Springer, 2009
Descrizione fisica 1 online resource (XIV, 410 p.)
Disciplina 005.8
Altri autori (Persone) BaoFeng
LiHui <1968->
WangGuilin, Dr.
Collana Lecture notes in computer science
Soggetto topico Computer security
Data protection
ISBN 3-642-00843-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Encryption -- Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes -- A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length -- RSA-Based Certificateless Public Key Encryption -- Digital Signatures -- Strongly Unforgeable ID-Based Signatures without Random Oracles -- On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings -- System Security -- An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems -- Reconstructing a Packed DLL Binary for Static Analysis -- Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework -- Applied Cryptography -- Efficient Concurrent n poly(logn)-Simulatable Argument of Knowledge -- New Constructions for Reusable, Non-erasure and Universally Composable Commitments -- Certificateless Hybrid Signcryption -- On Non-representable Secret Sharing Matroids -- Multimedia Security and DRM -- A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization -- Defending against the Pirate Evolution Attack -- Security Specification for Conversion Technologies of Heterogeneous DRM Systems -- Security Protocols -- Analysing Protocol Implementations -- Measuring Anonymity -- A Hybrid E-Voting Scheme -- Key Exchange and Management -- A Framework for Authenticated Key Exchange in the Standard Model -- Secret Handshake: Strong Anonymity Definition and Construction -- An Extended Authentication and Key Agreement Protocol of UMTS -- Hash-Based Key Management Schemes for MPEG4-FGS -- Hash Functions and MACs -- Twister – A Framework for Secure and Fast Hash Functions -- Preimage Attack on Hash Function RIPEMD -- Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL -- Cryptanalysis -- Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher -- Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2 -- Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard -- On the Correctness of an Approach against Side-Channel Attacks -- Network Security -- Ranking Attack Graphs with Graph Neural Networks -- Implementing IDS Management on Lock-Keeper -- Security Applications -- Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems -- Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing -- Trusted Privacy Domains – Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Record Nr. UNINA-9910483628203321
Berlin, : Springer, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui