top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
ASIACCS 2012 : the 7th ACM Symposium on Information, Computer and Communications Security : May 02-04, 2012, the Korea Federation of Science and Technology Societies (KOFST), Seoul, Korea
ASIACCS 2012 : the 7th ACM Symposium on Information, Computer and Communications Security : May 02-04, 2012, the Korea Federation of Science and Technology Societies (KOFST), Seoul, Korea
Autore Youm Heung Youl
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2012
Descrizione fisica 1 online resource (119 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti ASIA Computer and Communications Security 2012 : the 7th Association for Computing Machinery Symposium on Information, Computer and Communications Security : May 02-04, 2012, the Korea Federation of Science and Technology Societies (KOFST), Seoul, Korea
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
ASIA CCS '12 7th ACM Symposium on Information, Computer and Communications Security, Seoul, Republic of Korea - May 02 - 04, 2012
Record Nr. UNINA-9910375879003321
Youm Heung Youl  
[Place of publication not identified], : ACM, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Applications [[electronic resource] ] : 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers / / edited by Heung Youl Youm, Moti Yung
Information Security Applications [[electronic resource] ] : 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers / / edited by Heung Youl Youm, Moti Yung
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 386 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Computer science—Mathematics
Discrete mathematics
Data protection
Algorithms
Cryptology
Computer Communication Networks
Discrete Mathematics in Computer Science
Data and Information Security
Mathematical Applications in Computer Science
ISBN 1-280-38536-7
9786613563286
3-642-10838-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multimedia Security -- Protecting IPTV Service Network against Malicious Rendezvous Point -- Design and Implementation of SIP-aware Security Management System -- Device Security -- Application Management Framework in User Centric Smart Card Ownership Model -- When Compromised Readers Meet RFID -- HW Implementation Security -- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? -- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules -- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment -- Applied Cryptography -- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles -- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity -- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy -- ID-Based Adaptive Oblivious Transfer -- Side Channel Attacks -- Unknown Plaintext Template Attacks -- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices -- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation -- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption -- Cryptograptanalysis -- Finding Collisions for a 45-Step Simplified HAS-V -- Non-linear Error Detection for Finite State Machines -- Quadratic Equations from a Kind of S-boxes -- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure -- Anonymity/Authentication/Access Control -- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET -- A Selectable k-Times Relaxed Anonymous Authentication Scheme -- PUF-Based Authentication Protocols – Revisited -- Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application -- Network Security -- Securing Remote Access Inside Wireless Mesh Networks -- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers -- USN Middleware Security Model -- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.
Record Nr. UNISA-996465916903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information security applications : 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / / Heung Youl Youm, Moti Yung (eds.)
Information security applications : 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / / Heung Youl Youm, Moti Yung (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; Heidelberg, : Springer-Verlag, 2009
Descrizione fisica 1 online resource (XIII, 386 p.)
Disciplina 005.8
Altri autori (Persone) YoumHeung Youl
YungMoti
Collana Lecture notes in computer science
Soggetto topico Computer security - International cooperation
Data protection - International cooperation
ISBN 1-280-38536-7
9786613563286
3-642-10838-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multimedia Security -- Protecting IPTV Service Network against Malicious Rendezvous Point -- Design and Implementation of SIP-aware Security Management System -- Device Security -- Application Management Framework in User Centric Smart Card Ownership Model -- When Compromised Readers Meet RFID -- HW Implementation Security -- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? -- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules -- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment -- Applied Cryptography -- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles -- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity -- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy -- ID-Based Adaptive Oblivious Transfer -- Side Channel Attacks -- Unknown Plaintext Template Attacks -- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices -- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation -- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption -- Cryptograptanalysis -- Finding Collisions for a 45-Step Simplified HAS-V -- Non-linear Error Detection for Finite State Machines -- Quadratic Equations from a Kind of S-boxes -- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure -- Anonymity/Authentication/Access Control -- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET -- A Selectable k-Times Relaxed Anonymous Authentication Scheme -- PUF-Based Authentication Protocols – Revisited -- Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application -- Network Security -- Securing Remote Access Inside Wireless Mesh Networks -- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers -- USN Middleware Security Model -- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.
Record Nr. UNINA-9910483065303321
Berlin ; ; Heidelberg, : Springer-Verlag, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui