top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Availability, Reliability and Security for Business, Enterprise and Health Information Systems [[electronic resource] ] : IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, Vienna, Austria, August 22-26, 2011, Proceedings / / edited by A Min Tjoa, Gerald Quirchmayr, Ilsun You, Lida Xu
Availability, Reliability and Security for Business, Enterprise and Health Information Systems [[electronic resource] ] : IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, Vienna, Austria, August 22-26, 2011, Proceedings / / edited by A Min Tjoa, Gerald Quirchmayr, Ilsun You, Lida Xu
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIII, 388 p.)
Disciplina 005.7
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Management information systems
Computer science
Computers and civilization
Data encryption (Computer science)
Information technology
Business—Data processing
Health informatics
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Computers and Society
Cryptology
IT in Business
Health Informatics
ISBN 3-642-23300-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Benefits of federated identity mangement: a survey from an integrated operations viewpoint / Jostein Jensen -- A security policy model for agent based service-oriented architectures / Eckehard Hermann.
Record Nr. UNISA-996466018503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communication Technology [[electronic resource] ] : Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings / / edited by Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You
Information and Communication Technology [[electronic resource] ] : Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings / / edited by Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIV, 354 p. 119 illus. in color.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security
Application software
Computers
Computer communication systems
Computers and civilization
Information technology
Business—Data processing
Systems and Data Security
Computer Applications
Information Systems and Communication Service
Computer Communication Networks
Computers and Society
IT in Business
ISBN 3-319-24315-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466321503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communication Technology [[electronic resource] ] : Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings / / edited by Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You
Information and Communication Technology [[electronic resource] ] : Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings / / edited by Ismail Khalil, Erich Neuhold, A Min Tjoa, Li Da Xu, Ilsun You
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIV, 354 p. 119 illus. in color.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security
Application software
Computers
Computer communication systems
Computers and civilization
Information technology
Business—Data processing
Systems and Data Security
Computer Applications
Information Systems and Communication Service
Computer Communication Networks
Computers and Society
IT in Business
ISBN 3-319-24315-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483070203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communication Technology [[electronic resource] ] : Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings / / edited by Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You
Information and Communication Technology [[electronic resource] ] : Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings / / edited by Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXII, 699 p. 238 illus.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computers and civilization
Computer security
Information storage and retrieval
Application software
Data structures (Computer science)
Computer communication systems
Computers and Society
Systems and Data Security
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Data Structures and Information Theory
Computer Communication Networks
ISBN 3-642-55032-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Applied modeling and simulation -- Mobile computing -- Advanced urban-scale ICT applications -- Semantic web and knowledge management -- Cloud computing -- Image processing -- Software engineering -- Collaboration technologies and systems -- E-learning -- Data warehousing and data mining -- E-government and e-health -- Biometric and bioinformatics systems -- Network security -- Dependable systems and applications -- Privacy and trust management -- Cryptography -- Multimedia security -- Dependable systems and applications.
Record Nr. UNISA-996203269003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communication Technology [[electronic resource] ] : Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings / / edited by Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You
Information and Communication Technology [[electronic resource] ] : Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings / / edited by Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXII, 699 p. 238 illus.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computers and civilization
Computer security
Information storage and retrieval
Application software
Data structures (Computer science)
Computer communication systems
Computers and Society
Systems and Data Security
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Data Structures and Information Theory
Computer Communication Networks
ISBN 3-642-55032-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Applied modeling and simulation -- Mobile computing -- Advanced urban-scale ICT applications -- Semantic web and knowledge management -- Cloud computing -- Image processing -- Software engineering -- Collaboration technologies and systems -- E-learning -- Data warehousing and data mining -- E-government and e-health -- Biometric and bioinformatics systems -- Network security -- Dependable systems and applications -- Privacy and trust management -- Cryptography -- Multimedia security -- Dependable systems and applications.
Record Nr. UNINA-9910484485403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communication Technology [[electronic resource] ] : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings / / edited by Khabib Mustofa, Erich Neuhold, A Min Tjoa, Edgar R. Weippl, Ilsun You
Information and Communication Technology [[electronic resource] ] : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings / / edited by Khabib Mustofa, Erich Neuhold, A Min Tjoa, Edgar R. Weippl, Ilsun You
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 552 p. 170 illus.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computers and civilization
Computer security
Information storage and retrieval
Application software
Data encryption (Computer science)
Computer communication systems
Computers and Society
Systems and Data Security
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Cryptology
Computer Communication Networks
Soggetto genere / forma Conference proceedings.
ISBN 3-642-36818-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Translating the Idea of the eGovernment One-Stop-Shop in Indonesia.- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting Primes on OpenRISC Processors with Hardware Multiplier -- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidentia Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting P.
Record Nr. UNISA-996465618603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communication Technology [[electronic resource] ] : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings / / edited by Khabib Mustofa, Erich Neuhold, A Min Tjoa, Edgar R. Weippl, Ilsun You
Information and Communication Technology [[electronic resource] ] : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings / / edited by Khabib Mustofa, Erich Neuhold, A Min Tjoa, Edgar R. Weippl, Ilsun You
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 552 p. 170 illus.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computers and civilization
Computer security
Information storage and retrieval
Application software
Data encryption (Computer science)
Computer communication systems
Computers and Society
Systems and Data Security
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Cryptology
Computer Communication Networks
Soggetto genere / forma Conference proceedings.
ISBN 3-642-36818-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Translating the Idea of the eGovernment One-Stop-Shop in Indonesia.- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting Primes on OpenRISC Processors with Hardware Multiplier -- Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network.- Early-Detection System for Cross-Language (Translated) Plagiarism.- TransWiki: Supporting Translation Teaching.- Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework -- Software Development Methods in the Internet of Things.- SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications.- OSMF: A Framework for OSS Process Measurement.- Analyzing Stability of Algorithmic Systems Using Algebraic Constructs.- Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning.- On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy at Database Level.- Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch.- CAPTCHA Suitable for Smartphones.- Code Based KPD Scheme with Full Connectivity: Deterministic Merging.- Indonesian Digital Natives: ICT Usage Pattern Study across Different Age Groups.- End-to-End Delay Performance for VoIP on LTE System in Access Network.- Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required.- A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud.- Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution.- Information Systems Strategic Planning for a Naval Hospital.- Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique.- A Data-Driven Approach toward Building Dynamic Ontology.- Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement -- Secure and Verifiable Outsourcing of Sequence Comparisons.- Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.- On Identifying Proper Security Mechanisms.- A Recovery Approach for SQLite History Recorders from YAFFS2.- UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.- SA4WSs: A Security Architecture for Web Services.- Verifying Data Authenticity and Integrity in Server-Aided Confidentia Forensic Investigation.- A Test Case Generation Technique for VMM Fuzzing.- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.- A Proposal on Security Case Based on Common Criteria.- An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors -- Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks -- Anonymous Lattice-Based Broadcast Encryption.- Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance.- New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.- Provably Secure and Subliminal-Free Variant of Schnorr Signature.- A Block Cipher Mode of Operation with Two Keys.- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing.- Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme -- A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data -- Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control.- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.- A Real-Time Privacy Amplification Scheme in Quantum Key Distribution -- CSP-Based General Detection Model of Network Covert Storage Channels.- Trustworthy Opportunistic Access to the Internet of Services.- Architecture of Network Environment for High-Risk Security Experimentation.- Emulation on the Internet Prefix Hijacking Attack Impaction.- Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction.- Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge -- An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.- A Review of Security Attacks on the GSM Standard -- An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.- Image Watermarking Using Psychovisual Threshold over the Edge.- A Data Structure for Efficient Biometric Identification.- The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System.- Shifting P.
Record Nr. UNINA-9910485023903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security applications : 23rd international conference, WISA 2022, Jeju Island, South Korea, August 24-26, 2022, revised selected papers / / Ilsun You, Taek-Young Youn (editors)
Information security applications : 23rd international conference, WISA 2022, Jeju Island, South Korea, August 24-26, 2022, revised selected papers / / Ilsun You, Taek-Young Youn (editors)
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (361 pages)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
ISBN 3-031-25659-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Cryptography -- Collision-Resistant and Pseudorandom Hash Function Using Tweakable Block Cipher -- 1 Introduction -- 2 Preliminaries -- 2.1 Cryptographic Hash Function -- 2.2 Pseudorandom Function -- 2.3 Tweakable Block Cipher in TWEAKEY Framework -- 2.4 PRF and TPRP Under Related-Key Attack -- 3 Proposed Construction -- 4 Collision Resistance -- 5 Pseudorandom-Function Property -- References -- Provably Secure Password-Authenticated Key Exchange Based on SIDH -- 1 Introduction -- 2 Preliminaries -- 2.1 SIDH -- 2.2 Standard Isogeny-Based Hard Problems -- 3 The Proposed PAKE -- 3.1 Description of the Proposed PAKE -- 3.2 Comparison with Relevant Works -- 4 Security Analysis of the Proposed PAKE -- 4.1 Informal Security Analysis -- 4.2 Security in the BPR Model -- 5 Conclusion -- References -- Group Signatures with Designated Traceability over Openers' Attributes in Bilinear Groups -- 1 Introduction -- 1.1 Our Contribution -- 2 Preliminaries -- 2.1 Syntax of GSdT -- 2.2 Security Definitions of GSdT -- 3 Our Instantiation -- 3.1 Generic Constriction of GSdT in ch3AnadaFH21 -- 3.2 Key Generation and User Joining -- 3.3 Generating and Verifying a Group Signature -- 3.4 Opening and Judging -- 4 Properties -- 4.1 Security -- 4.2 Asymptotic Performance -- 5 Conclusion -- References -- Grover on SPARKLE -- 1 Introduction -- 1.1 Our Contribution and Organization -- 2 Background -- 2.1 SPARKLE -- 2.2 Quantum Gates -- 2.3 Grover's Algorithm for Key Search -- 3 Quantum Implementation of SPARKLE -- 3.1 SPARKLE Permutation -- 3.2 SCHWAEMM -- 4 Performance -- 5 Cost Estimation for Grover Key Search -- 6 Conclusion -- References -- Network Security -- Quality-of-Service Degradation in Distributed Instrumentation Systems Through Poisoning of 5G Beamforming Algorithms -- 1 Introduction.
2 Techniques for Poisoning 5G Beamforming Algorithms -- 3 A Reconfigurable Surface for Poisoning 5G Beamforming Algorithms -- 3.1 Reconfigurable Surface Modeling -- 3.2 Considered Beamforming Algorithms and Proposed Poisoning Algorithm -- 3.3 Physical Implementation and 5G Radio Channel Characteristics -- 4 Experimental Validation: Simulation and Results -- 5 Conclusions and Future Work -- References -- An Effective Approach for Stepping-Stone Intrusion Detection Using Packet Crossover -- 1 Introduction -- 2 Preliminaries -- 2.1 Definitions of Send/Echo Packets -- 2.2 Packet Crossover -- 2.3 The Distribution of Packets' RTTs in a Connection Chain -- 2.4 The Rationale to Detect SSI Based on the Length of a Connection Chain -- 3 Estimate the Length of a Downstream Connection Chain Using Packet Crossover -- 4 Network Experiments and Performance Analysis -- 5 Conclusion -- References -- Software-Defined Network Based Secure Internet-Enabled Video Surveillance System -- 1 Introduction -- 1.1 Problem Background -- 1.2 Contribution of the Paper -- 1.3 Significance of the Study -- 2 Related Literature Review -- 2.1 Application of an IoT-Based System -- 2.2 Security and Prevention Features -- 3 Secure Internet-Enabled Video Surveillance System -- 3.1 Environment Setup -- 3.2 Network Management Tool -- 3.3 DDOS Attack and Mitigation -- 4 Results and Discussion -- 5 Conclusion and Future Works -- References -- TLS Goes Low Cost: When TLS Meets Edge -- 1 Introduction -- 2 Related Works -- 3 TLS-EC (TLS with Edge Computing) Protocol -- 3.1 Our Approach -- 3.2 TLS-EC Protocol -- 4 Security Evaluation -- 5 Performance Evaluation -- 5.1 Discussion -- 6 Conclusion -- References -- 5G-AKA, Revisited -- 1 Introduction -- 1.1 Motivation and Our Contributions -- 2 Preliminaries -- 2.1 Notation -- 2.2 Computational Assumption.
2.3 Exponential Challenge-Response Signature Schemes -- 3 A Secure AKA Protocol for 5G and Beyond Networks -- 3.1 Initialization -- 3.2 Authentication and Key Agreement -- 4 Security Model -- 5 Security Proof of AKA -- 6 Discussions -- 6.1 UE Anonymity -- 6.2 Forward Secrecy -- 6.3 Explicit Mutual Authentication -- 6.4 UE Unlinkability -- 6.5 Efficiency -- 6.6 Implementation Perspective -- 6.7 Comparison -- References -- Privacy Enhancing Technique -- Membership Privacy for Asynchronous Group Messaging -- 1 Introduction -- 2 Cohn-Gordon et al. SGM Protocol (ART) -- 3 Proposed Protocol -- 4 Conclusion -- References -- On Membership Inference Attacks to Generative Language Models Across Language Domains -- 1 Introduction -- 2 Background of Language Modeling -- 3 Methodology -- 3.1 Threat Model -- 3.2 Text Generation -- 3.3 Membership Inference -- 3.4 Verification -- 4 Evaluation -- 4.1 Environments -- 4.2 Target System -- 4.3 Effectiveness of Membership Inference Across Language Domains -- 4.4 Improving Uniqueness of Inferred Samples -- 5 Discussion -- 6 Related Work -- 7 Conclusion -- References -- A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks -- 1 Introduction -- 2 Background -- 2.1 Distributed Ledger Technology -- 2.2 Federated Learning -- 2.3 Differential Privacy -- 3 Related Work -- 4 Towards Secure Edge Intelligence -- 5 Numerical Results and Discussion -- 6 Conclusion and Future Work -- References -- Vulnerability Analysis -- Recovering Yaw Rate from Signal Injection Attack to Protect RV's Direction -- 1 Introduction -- 2 Related Works -- 2.1 Attack on Gyroscopes -- 2.2 Signal Injection Detection Methods -- 2.3 Recovery Methods -- 3 Background -- 3.1 Resonant Frequencies of MEMS Gyroscopes and Accelerometers -- 3.2 Relation Between Accelerometer X, Y-Axis and Gyroscope Z-Axis -- 4 Attack Model -- 5 Our Method.
5.1 Dataset Collection -- 5.2 Linear System Identification -- 5.3 Estimation of Gyroscope Z-Axis -- 6 Evaluation -- 6.1 Experiment Setup -- 6.2 Impacts of Acoustic Signal Injection -- 6.3 Yaw Rates Estimation -- 6.4 Recovery of Odometry System -- 7 Conclusion -- References -- A Survey on Sensor False Data Injection Attacks and Countermeasures in Cyber-Physical and Embedded Systems -- 1 Introduction -- 2 Background -- 3 Threat Model -- 4 Sensor False Data Injection (SFDI) Attacks -- 4.1 Message Broadcasting -- 4.2 Inertial Measurement Unit (IMU) -- 4.3 Microphone -- 4.4 Active Sensors -- 4.5 Other Sensors -- 5 Countermeasures -- 5.1 Receiver Layer -- 5.2 Signal Processing Layer -- 5.3 Control Layer -- 6 Research Challenges -- 7 Conclusion -- References -- Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine -- 1 Introduction -- 2 Motivating Example -- 3 Design -- 3.1 Identifying Input Words via Profiling -- 3.2 Dazzle-attack Creator -- 4 Evaluation -- 4.1 Reliability of Dazzle-attack -- 4.2 Anti-forensic Capability of Dazzle-attack -- 4.3 Comparison with Existing Obfuscators -- 5 Discussion -- 6 Related Work -- 7 Conclusion -- A Appendix -- A.1 Payload types -- References -- vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability -- 1 Introduction -- 2 Background -- 2.1 Kernel Vulnerability and PoC Code -- 3 Precondition of Environment and Scenario -- 4 Design -- 4.1 Concept -- 4.2 Approach -- 4.3 Profile of Vulnerable Kernel Codes -- 5 Implementation -- 5.1 Profile Generation -- 5.2 Kernel Code Tracing and Virtual Address Range Identification -- 5.3 Termination Condition -- 6 Evaluation -- 6.1 Evaluation Environment -- 6.2 Tracing and Identification Consideration -- 6.3 Performance Measurement -- 7 Discussion -- 7.1 Evaluation Result Consideration -- 7.2 Limitation -- 7.3 Portability.
8 Related Work -- 8.1 Comparison -- 9 Conclusion -- References -- Security Engineering -- ARMing-Sword: Scabbard on ARM -- 1 Introduction -- 1.1 Contributions -- 1.2 Organization of the Paper -- 2 Backgrounds -- 2.1 Scabbard: A Suite of Post-quantum Key-Encapsulation Mechanisms -- 2.2 Target Processor: Apple M1 Processor -- 2.3 Optimized Implementations of Post-Quantum Cryptography on ARM Processors -- 3 Proposed Techniques -- 3.1 Instruction Set -- 3.2 Evaluation: Direct Mapping -- 3.3 Multiplication: Sliding Window -- 4 Evaluation -- 5 Conclusion -- References -- Optimized Implementation of Quantum Binary Field Multiplication with Toffoli Depth One -- 1 Introduction -- 1.1 Our Contribution -- 2 Background -- 2.1 Binary Field Multiplication -- 2.2 Karatsuba Multiplication -- 2.3 Quantum Gates -- 3 Optimized Implementation of Quantum Binary Field Multiplication -- 3.1 Parallel Quantum Multiplication with the Karatsuba Algorithm -- 3.2 Toffoli Depth Optimization with Recursive Karatsuba Algorithm -- 3.3 Recycling Qubits with Reverse Operation -- 3.4 Optimized Implementation of Quantum Multiplication of T-Depth One -- 3.5 Quantum Modular Reduction -- 4 Performance -- 5 Conclusion -- References -- Time-Optimal Design of Finite Field Arithmetic for SIKE on Cortex-M4 -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 SIKE -- 3.2 ARMv7-M Architecture -- 4 Proposed Design for SIKE Field Arithmetic -- 4.1 Notation -- 4.2 Multi-precision Multiplication -- 4.3 Multi-precision Squaring -- 4.4 Multi-precision Reduction -- 4.5 Performance Evaluation -- 5 SIKE Performance Speedup -- 6 Conclusions -- References -- Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments -- 1 Introduction -- 2 Background -- 2.1 Random Number Generator -- 2.2 Quantum Random Number Generator -- 3 Materials and Method -- 3.1 Digital Data Harvesting.
3.2 Analysis of Pulse Collector for IoT Devices.
Record Nr. UNISA-996511872003316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information security applications : 23rd international conference, WISA 2022, Jeju Island, South Korea, August 24-26, 2022, revised selected papers / / Ilsun You, Taek-Young Youn (editors)
Information security applications : 23rd international conference, WISA 2022, Jeju Island, South Korea, August 24-26, 2022, revised selected papers / / Ilsun You, Taek-Young Youn (editors)
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (361 pages)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
ISBN 3-031-25659-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Cryptography -- Collision-Resistant and Pseudorandom Hash Function Using Tweakable Block Cipher -- 1 Introduction -- 2 Preliminaries -- 2.1 Cryptographic Hash Function -- 2.2 Pseudorandom Function -- 2.3 Tweakable Block Cipher in TWEAKEY Framework -- 2.4 PRF and TPRP Under Related-Key Attack -- 3 Proposed Construction -- 4 Collision Resistance -- 5 Pseudorandom-Function Property -- References -- Provably Secure Password-Authenticated Key Exchange Based on SIDH -- 1 Introduction -- 2 Preliminaries -- 2.1 SIDH -- 2.2 Standard Isogeny-Based Hard Problems -- 3 The Proposed PAKE -- 3.1 Description of the Proposed PAKE -- 3.2 Comparison with Relevant Works -- 4 Security Analysis of the Proposed PAKE -- 4.1 Informal Security Analysis -- 4.2 Security in the BPR Model -- 5 Conclusion -- References -- Group Signatures with Designated Traceability over Openers' Attributes in Bilinear Groups -- 1 Introduction -- 1.1 Our Contribution -- 2 Preliminaries -- 2.1 Syntax of GSdT -- 2.2 Security Definitions of GSdT -- 3 Our Instantiation -- 3.1 Generic Constriction of GSdT in ch3AnadaFH21 -- 3.2 Key Generation and User Joining -- 3.3 Generating and Verifying a Group Signature -- 3.4 Opening and Judging -- 4 Properties -- 4.1 Security -- 4.2 Asymptotic Performance -- 5 Conclusion -- References -- Grover on SPARKLE -- 1 Introduction -- 1.1 Our Contribution and Organization -- 2 Background -- 2.1 SPARKLE -- 2.2 Quantum Gates -- 2.3 Grover's Algorithm for Key Search -- 3 Quantum Implementation of SPARKLE -- 3.1 SPARKLE Permutation -- 3.2 SCHWAEMM -- 4 Performance -- 5 Cost Estimation for Grover Key Search -- 6 Conclusion -- References -- Network Security -- Quality-of-Service Degradation in Distributed Instrumentation Systems Through Poisoning of 5G Beamforming Algorithms -- 1 Introduction.
2 Techniques for Poisoning 5G Beamforming Algorithms -- 3 A Reconfigurable Surface for Poisoning 5G Beamforming Algorithms -- 3.1 Reconfigurable Surface Modeling -- 3.2 Considered Beamforming Algorithms and Proposed Poisoning Algorithm -- 3.3 Physical Implementation and 5G Radio Channel Characteristics -- 4 Experimental Validation: Simulation and Results -- 5 Conclusions and Future Work -- References -- An Effective Approach for Stepping-Stone Intrusion Detection Using Packet Crossover -- 1 Introduction -- 2 Preliminaries -- 2.1 Definitions of Send/Echo Packets -- 2.2 Packet Crossover -- 2.3 The Distribution of Packets' RTTs in a Connection Chain -- 2.4 The Rationale to Detect SSI Based on the Length of a Connection Chain -- 3 Estimate the Length of a Downstream Connection Chain Using Packet Crossover -- 4 Network Experiments and Performance Analysis -- 5 Conclusion -- References -- Software-Defined Network Based Secure Internet-Enabled Video Surveillance System -- 1 Introduction -- 1.1 Problem Background -- 1.2 Contribution of the Paper -- 1.3 Significance of the Study -- 2 Related Literature Review -- 2.1 Application of an IoT-Based System -- 2.2 Security and Prevention Features -- 3 Secure Internet-Enabled Video Surveillance System -- 3.1 Environment Setup -- 3.2 Network Management Tool -- 3.3 DDOS Attack and Mitigation -- 4 Results and Discussion -- 5 Conclusion and Future Works -- References -- TLS Goes Low Cost: When TLS Meets Edge -- 1 Introduction -- 2 Related Works -- 3 TLS-EC (TLS with Edge Computing) Protocol -- 3.1 Our Approach -- 3.2 TLS-EC Protocol -- 4 Security Evaluation -- 5 Performance Evaluation -- 5.1 Discussion -- 6 Conclusion -- References -- 5G-AKA, Revisited -- 1 Introduction -- 1.1 Motivation and Our Contributions -- 2 Preliminaries -- 2.1 Notation -- 2.2 Computational Assumption.
2.3 Exponential Challenge-Response Signature Schemes -- 3 A Secure AKA Protocol for 5G and Beyond Networks -- 3.1 Initialization -- 3.2 Authentication and Key Agreement -- 4 Security Model -- 5 Security Proof of AKA -- 6 Discussions -- 6.1 UE Anonymity -- 6.2 Forward Secrecy -- 6.3 Explicit Mutual Authentication -- 6.4 UE Unlinkability -- 6.5 Efficiency -- 6.6 Implementation Perspective -- 6.7 Comparison -- References -- Privacy Enhancing Technique -- Membership Privacy for Asynchronous Group Messaging -- 1 Introduction -- 2 Cohn-Gordon et al. SGM Protocol (ART) -- 3 Proposed Protocol -- 4 Conclusion -- References -- On Membership Inference Attacks to Generative Language Models Across Language Domains -- 1 Introduction -- 2 Background of Language Modeling -- 3 Methodology -- 3.1 Threat Model -- 3.2 Text Generation -- 3.3 Membership Inference -- 3.4 Verification -- 4 Evaluation -- 4.1 Environments -- 4.2 Target System -- 4.3 Effectiveness of Membership Inference Across Language Domains -- 4.4 Improving Uniqueness of Inferred Samples -- 5 Discussion -- 6 Related Work -- 7 Conclusion -- References -- A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks -- 1 Introduction -- 2 Background -- 2.1 Distributed Ledger Technology -- 2.2 Federated Learning -- 2.3 Differential Privacy -- 3 Related Work -- 4 Towards Secure Edge Intelligence -- 5 Numerical Results and Discussion -- 6 Conclusion and Future Work -- References -- Vulnerability Analysis -- Recovering Yaw Rate from Signal Injection Attack to Protect RV's Direction -- 1 Introduction -- 2 Related Works -- 2.1 Attack on Gyroscopes -- 2.2 Signal Injection Detection Methods -- 2.3 Recovery Methods -- 3 Background -- 3.1 Resonant Frequencies of MEMS Gyroscopes and Accelerometers -- 3.2 Relation Between Accelerometer X, Y-Axis and Gyroscope Z-Axis -- 4 Attack Model -- 5 Our Method.
5.1 Dataset Collection -- 5.2 Linear System Identification -- 5.3 Estimation of Gyroscope Z-Axis -- 6 Evaluation -- 6.1 Experiment Setup -- 6.2 Impacts of Acoustic Signal Injection -- 6.3 Yaw Rates Estimation -- 6.4 Recovery of Odometry System -- 7 Conclusion -- References -- A Survey on Sensor False Data Injection Attacks and Countermeasures in Cyber-Physical and Embedded Systems -- 1 Introduction -- 2 Background -- 3 Threat Model -- 4 Sensor False Data Injection (SFDI) Attacks -- 4.1 Message Broadcasting -- 4.2 Inertial Measurement Unit (IMU) -- 4.3 Microphone -- 4.4 Active Sensors -- 4.5 Other Sensors -- 5 Countermeasures -- 5.1 Receiver Layer -- 5.2 Signal Processing Layer -- 5.3 Control Layer -- 6 Research Challenges -- 7 Conclusion -- References -- Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine -- 1 Introduction -- 2 Motivating Example -- 3 Design -- 3.1 Identifying Input Words via Profiling -- 3.2 Dazzle-attack Creator -- 4 Evaluation -- 4.1 Reliability of Dazzle-attack -- 4.2 Anti-forensic Capability of Dazzle-attack -- 4.3 Comparison with Existing Obfuscators -- 5 Discussion -- 6 Related Work -- 7 Conclusion -- A Appendix -- A.1 Payload types -- References -- vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability -- 1 Introduction -- 2 Background -- 2.1 Kernel Vulnerability and PoC Code -- 3 Precondition of Environment and Scenario -- 4 Design -- 4.1 Concept -- 4.2 Approach -- 4.3 Profile of Vulnerable Kernel Codes -- 5 Implementation -- 5.1 Profile Generation -- 5.2 Kernel Code Tracing and Virtual Address Range Identification -- 5.3 Termination Condition -- 6 Evaluation -- 6.1 Evaluation Environment -- 6.2 Tracing and Identification Consideration -- 6.3 Performance Measurement -- 7 Discussion -- 7.1 Evaluation Result Consideration -- 7.2 Limitation -- 7.3 Portability.
8 Related Work -- 8.1 Comparison -- 9 Conclusion -- References -- Security Engineering -- ARMing-Sword: Scabbard on ARM -- 1 Introduction -- 1.1 Contributions -- 1.2 Organization of the Paper -- 2 Backgrounds -- 2.1 Scabbard: A Suite of Post-quantum Key-Encapsulation Mechanisms -- 2.2 Target Processor: Apple M1 Processor -- 2.3 Optimized Implementations of Post-Quantum Cryptography on ARM Processors -- 3 Proposed Techniques -- 3.1 Instruction Set -- 3.2 Evaluation: Direct Mapping -- 3.3 Multiplication: Sliding Window -- 4 Evaluation -- 5 Conclusion -- References -- Optimized Implementation of Quantum Binary Field Multiplication with Toffoli Depth One -- 1 Introduction -- 1.1 Our Contribution -- 2 Background -- 2.1 Binary Field Multiplication -- 2.2 Karatsuba Multiplication -- 2.3 Quantum Gates -- 3 Optimized Implementation of Quantum Binary Field Multiplication -- 3.1 Parallel Quantum Multiplication with the Karatsuba Algorithm -- 3.2 Toffoli Depth Optimization with Recursive Karatsuba Algorithm -- 3.3 Recycling Qubits with Reverse Operation -- 3.4 Optimized Implementation of Quantum Multiplication of T-Depth One -- 3.5 Quantum Modular Reduction -- 4 Performance -- 5 Conclusion -- References -- Time-Optimal Design of Finite Field Arithmetic for SIKE on Cortex-M4 -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 SIKE -- 3.2 ARMv7-M Architecture -- 4 Proposed Design for SIKE Field Arithmetic -- 4.1 Notation -- 4.2 Multi-precision Multiplication -- 4.3 Multi-precision Squaring -- 4.4 Multi-precision Reduction -- 4.5 Performance Evaluation -- 5 SIKE Performance Speedup -- 6 Conclusions -- References -- Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments -- 1 Introduction -- 2 Background -- 2.1 Random Number Generator -- 2.2 Quantum Random Number Generator -- 3 Materials and Method -- 3.1 Digital Data Harvesting.
3.2 Analysis of Pulse Collector for IoT Devices.
Record Nr. UNINA-9910647774103321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Applications [[electronic resource] ] : 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers / / edited by Ilsun You
Information Security Applications [[electronic resource] ] : 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers / / edited by Ilsun You
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XIII, 384 p. 128 illus., 53 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer communication systems
Data encryption (Computer science)
Artificial intelligence
Systems and Data Security
Information Systems and Communication Service
Computer Communication Networks
Computing Milieux
Cryptology
Artificial Intelligence
ISBN 3-030-39303-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Show me your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM -- Turn On the Lights: User Behavior in Game Environment Using CPTED -- QR Code Watermarking for Digital Images -- FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking -- DroPPP: A P4 Approach to Mitigating DoS Attacks in SDN -- A Secure and Self-Tallying E-Voting System Based on Blockchain -- An Extended CTRT for AES-256 -- A Blind Ring Signature Based on the Short Integer Solution Problem -- A Note on the Invisibility and Anonymity of Undeniable Signature Schemes -- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR -- Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNSS) -- CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network -- A New Password Cracking Model with Generative Adversarial Networks -- Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing -- Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression -- Timed-Release Encryption with Master Time Bound Key -- Is it Possible to Hide My Key into Deep Neural Network -- RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices -- On the Automation of Security Testing for IoT Constrained Scenarios -- Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments -- Secret Sharing on Evolving Multi-Level Access Structure -- Strengthened PAKE Protocols Secure Against Malicious Private Key Generator -- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof -- Ring-LWE on 8-bit AVR Embedded Processor -- Low-Noise LLC Side-Channel Attack with Perf -- Optimized SIKE Round 2 on 64-bit ARM -- Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea -- An SGX-Based Key Management Framework for Data Centric Networking -- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR.
Record Nr. UNINA-9910373928503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui