top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied Cryptography and Network Security [[electronic resource] ] : 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II / / edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
Applied Cryptography and Network Security [[electronic resource] ] : 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II / / edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (489 pages)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data structures (Computer science)
Computer organization
Computers
Systems and Data Security
Data Structures and Information Theory
Computer Systems Organization and Communication Networks
Computing Milieux
ISBN 3-030-57878-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996418309803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I / / edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
Applied Cryptography and Network Security [[electronic resource] ] : 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I / / edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xix, 504 pages) : illustrations
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Data structures (Computer science)
Computers
Systems and Data Security
Computer Systems Organization and Communication Networks
Data Structures and Information Theory
Computing Milieux
ISBN 3-030-57808-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996418310703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II / / edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
Applied Cryptography and Network Security : 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II / / edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (489 pages)
Disciplina 005.82
005.824
Collana Security and Cryptology
Soggetto topico Computer security
Data structures (Computer science)
Computer organization
Computers
Systems and Data Security
Data Structures and Information Theory
Computer Systems Organization and Communication Networks
Computing Milieux
ISBN 3-030-57878-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910416079803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I / / edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
Applied Cryptography and Network Security : 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I / / edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xix, 504 pages) : illustrations
Disciplina 005.82
005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Data structures (Computer science)
Computers
Systems and Data Security
Computer Systems Organization and Communication Networks
Data Structures and Information Theory
Computing Milieux
ISBN 3-030-57808-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910767532403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings / / edited by Feng Bao, Pierangela Samarati, Jianying Zhou
Applied Cryptography and Network Security [[electronic resource] ] : 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings / / edited by Feng Bao, Pierangela Samarati, Jianying Zhou
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XIV, 580 p. 107 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Coding theory
Information theory
Data structures (Computer science)
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
Coding and Information Theory
Data Structures
ISBN 3-642-31284-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465750103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings / / edited by Jianying Zhou, Moti Yung
Applied Cryptography and Network Security [[electronic resource] ] : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings / / edited by Jianying Zhou, Moti Yung
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 564 p. 83 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Computer science—Mathematics
Discrete mathematics
Electronic data processing—Management
Algorithms
Data protection
Computer Communication Networks
Cryptology
Discrete Mathematics in Computer Science
IT Operations
Data and Information Security
ISBN 1-280-38725-4
9786613565174
3-642-13708-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Encryption -- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption -- How to Construct Interval Encryption from Binary Tree Encryption -- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions -- Digital Signature -- Trapdoor Sanitizable Signatures Made Easy -- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs -- Redactable Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions -- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions -- Multi-trail Statistical Saturation Attacks -- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G??? -- High Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES against First and Second-Order Differential Power Analysis -- Adaptive Chosen-Message Side-Channel Attacks -- Secure Multiplicative Masking of Power Functions -- Zero Knowledge and Multi-party Protocols -- Batch Groth–Sahai -- Efficient and Secure Evaluation of Multivariate Polynomials and Applications -- Efficient Implementation of the Orlandi Protocol -- Improving the Round Complexity of Traitor Tracing Schemes -- Key Management -- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters -- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead -- Deniable Internet Key Exchange -- Authentication and Identification -- A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm -- Secure Sketch for Multiple Secrets -- A Message Recognition Protocol Based on Standard Assumptions -- Privacy and Anonymity -- Affiliation-Hiding Key Exchange with Untrusted Group Authorities -- Privacy-Preserving Group Discovery with Linear Complexity -- Two New Efficient PIR-Writing Protocols -- Regulatory Compliant Oblivious RAM -- RFID Security and Privacy -- Revisiting Unpredictability-Based RFID Privacy Models -- On RFID Privacy with Mutual Authentication and Tag Corruption -- Internet Security -- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures -- COP: A Step toward Children Online Privacy -- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising.
Record Nr. UNISA-996465668703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied cryptography and network security : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings / / Jianying Zhou, Moti Yung (eds.)
Applied cryptography and network security : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings / / Jianying Zhou, Moti Yung (eds.)
Edizione [1st ed.]
Pubbl/distr/stampa New York, : Springer, 2010
Descrizione fisica 1 online resource (XIII, 564 p. 83 illus.)
Disciplina 005.8
Altri autori (Persone) ZhouJianying
YungMoti
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Telecommunication - Security measures
Data encryption (Computer science)
Cryptography
ISBN 1-280-38725-4
9786613565174
3-642-13708-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Encryption -- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption -- How to Construct Interval Encryption from Binary Tree Encryption -- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions -- Digital Signature -- Trapdoor Sanitizable Signatures Made Easy -- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs -- Redactable Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions -- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions -- Multi-trail Statistical Saturation Attacks -- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G??? -- High Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES against First and Second-Order Differential Power Analysis -- Adaptive Chosen-Message Side-Channel Attacks -- Secure Multiplicative Masking of Power Functions -- Zero Knowledge and Multi-party Protocols -- Batch Groth–Sahai -- Efficient and Secure Evaluation of Multivariate Polynomials and Applications -- Efficient Implementation of the Orlandi Protocol -- Improving the Round Complexity of Traitor Tracing Schemes -- Key Management -- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters -- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead -- Deniable Internet Key Exchange -- Authentication and Identification -- A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm -- Secure Sketch for Multiple Secrets -- A Message Recognition Protocol Based on Standard Assumptions -- Privacy and Anonymity -- Affiliation-Hiding Key Exchange with Untrusted Group Authorities -- Privacy-Preserving Group Discovery with Linear Complexity -- Two New Efficient PIR-Writing Protocols -- Regulatory Compliant Oblivious RAM -- RFID Security and Privacy -- Revisiting Unpredictability-Based RFID Privacy Models -- On RFID Privacy with Mutual Authentication and Tag Corruption -- Internet Security -- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures -- COP: A Step toward Children Online Privacy -- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising.
Record Nr. UNINA-9910483910603321
New York, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings / / edited by Jianying Zhou, Moti Yung, Feng Bao
Applied Cryptography and Network Security [[electronic resource] ] : 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings / / edited by Jianying Zhou, Moti Yung, Feng Bao
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 490 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Operating systems (Computers)
Application software
Computers and civilization
Electronic data processing—Management
Computer Communication Networks
Cryptology
Operating Systems
Computer and Information Systems Applications
Computers and Society
IT Operations
ISBN 3-540-34704-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Avoidance and Detection -- Adaptive Detection of Local Scanners -- Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection -- DSO: Dependable Signing Overlay -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy Multi-coupon System -- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families -- DoS: Attacks and Countermeasures -- Efficient Memory Bound Puzzles Using Pattern Databases -- Effect of Malicious Synchronization -- Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets -- Key Management -- Password Based Server Aided Key Exchange -- Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks -- Stateful Subset Cover -- Cryptanalysis -- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions -- Breaking a New Instance of TTM Cryptosystems -- Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords -- Security of Limited Devices -- An AES Smart Card Implementation Resistant to Power Analysis Attacks -- Physical Security Bounds Against Tampering -- Flexible Exponentiation with Resistance to Side Channel Attacks -- Cryptography -- An Improved Poly1305 MAC -- Certificateless Public-Key Signature: Security Model and Efficient Construction -- High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive -- Authentication and Web Security -- Authentication for Paranoids: Multi-party Secret Handshakes -- On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan -- W3Bcrypt: Encryption as a Stylesheet -- Ad Hoc and Sensor Network Security -- Combinatorial Structures for Design of Wireless Sensor Networks -- Public Key Cryptography Sans Certificates in Ad Hoc Networks -- Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks -- Cryptographic Constructions -- A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography -- Results on Almost Resilient Functions -- Real Perfect Contrast Visual Secret Sharing Schemes with Reversing -- Security and Privacy -- On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries -- Improving the Randomized Initial Point Countermeasure Against DPA -- Syntax-Driven Private Evaluation of Quantified Membership Queries.
Record Nr. UNISA-996465520103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied cryptography and network security : 4th international conference, ACNS 2006, Singapore, June 6-9, 2006 : proceedings / / Jianying Zhou, Moti Yung, Feng Bao (eds.)
Applied cryptography and network security : 4th international conference, ACNS 2006, Singapore, June 6-9, 2006 : proceedings / / Jianying Zhou, Moti Yung, Feng Bao (eds.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, : Springer, 2006
Descrizione fisica 1 online resource (XIV, 490 p.)
Disciplina 005.8
Altri autori (Persone) ZhouJianying
YungMoti
BaoFeng
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Telecommunication - Security measures
Data encryption (Computer science)
Cryptography
ISBN 3-540-34704-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Avoidance and Detection -- Adaptive Detection of Local Scanners -- Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection -- DSO: Dependable Signing Overlay -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy Multi-coupon System -- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families -- DoS: Attacks and Countermeasures -- Efficient Memory Bound Puzzles Using Pattern Databases -- Effect of Malicious Synchronization -- Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets -- Key Management -- Password Based Server Aided Key Exchange -- Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks -- Stateful Subset Cover -- Cryptanalysis -- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions -- Breaking a New Instance of TTM Cryptosystems -- Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords -- Security of Limited Devices -- An AES Smart Card Implementation Resistant to Power Analysis Attacks -- Physical Security Bounds Against Tampering -- Flexible Exponentiation with Resistance to Side Channel Attacks -- Cryptography -- An Improved Poly1305 MAC -- Certificateless Public-Key Signature: Security Model and Efficient Construction -- High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive -- Authentication and Web Security -- Authentication for Paranoids: Multi-party Secret Handshakes -- On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan -- W3Bcrypt: Encryption as a Stylesheet -- Ad Hoc and Sensor Network Security -- Combinatorial Structures for Design of Wireless Sensor Networks -- Public Key Cryptography Sans Certificates in Ad Hoc Networks -- Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks -- Cryptographic Constructions -- A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography -- Results on Almost Resilient Functions -- Real Perfect Contrast Visual Secret Sharing Schemes with Reversing -- Security and Privacy -- On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries -- Improving the Randomized Initial Point Countermeasure Against DPA -- Syntax-Driven Private Evaluation of Quantified Membership Queries.
Altri titoli varianti ACNS 2006
Record Nr. UNINA-9910484506003321
Berlin, : Springer, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings / / edited by Markus Jakobsson, Moti Yung, Jianying Zhou
Applied Cryptography and Network Security [[electronic resource] ] : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings / / edited by Markus Jakobsson, Moti Yung, Jianying Zhou
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XIII, 511 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Information storage and retrieval systems
Application software
Electronic data processing—Management
Cryptology
Computer Communication Networks
Operating Systems
Information Storage and Retrieval
Computer and Information Systems Applications
IT Operations
ISBN 9783540248528
3-540-24852-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and Storage -- CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap -- Private Keyword-Based Push and Pull with Applications to Anonymous Communication -- Secure Conjunctive Keyword Search over Encrypted Data -- Provably Secure Constructions -- Evaluating Security of Voting Schemes in the Universal Composability Framework -- Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security -- On the Security of Cryptosystems with All-or-Nothing Transform -- Internet Security -- Centralized Management of Virtual Security Zones in IP Networks -- S-RIP: A Secure Distance Vector Routing Protocol -- A Pay-per-Use DoS Protection Mechanism for the Web -- Digital Signature -- Limited Verifier Signature from Bilinear Pairings -- Deniable Ring Authentication Revisited -- A Fully-Functional Group Signature Scheme over Only Known-Order Group -- Security Modelling -- Some Observations on Zap and Its Applications -- Security Measurements of Steganographic Systems -- X2Rep: Enhanced Trust Semantics for the XRep Protocol -- Authenticated Key Exchange -- One-Round Protocols for Two-Party Authenticated Key Exchange -- Password Authenticated Key Exchange Using Quadratic Residues -- Key Agreement Using Statically Keyed Authenticators -- Security of Deployed Systems -- Low-Latency Cryptographic Protection for SCADA Communications -- A Best Practice for Root CA Key Update in PKI -- SQLrand: Preventing SQL Injection Attacks -- Cryptosystems: Design and Analysis -- Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem -- Success Probability in ? 2-Attacks -- More Generalized Clock-Controlled Alternating Step Generator -- Cryptographic Protocols -- FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy -- Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model -- Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity -- Side Channels and Protocol Analysis -- Security Analysis of CRT-Based Cryptosystems -- Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits -- Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords -- Intrusion Detection and DoS -- Advanced Packet Marking Mechanism with Pushback for IP Traceback -- A Parallel Intrusion Detection System for High-Speed Networks -- A Novel Framework for Alert Correlation and Understanding -- Cryptographic Algorithms -- An Improved Algorithm for uP+vQ Using JSF -- New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p n ) -- Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
Record Nr. UNISA-996465428803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui