top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology -- CRYPTO 2003 [[electronic resource] ] : 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings / / edited by Dan Boneh
Advances in Cryptology -- CRYPTO 2003 [[electronic resource] ] : 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings / / edited by Dan Boneh
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 636 p.)
Disciplina 005.8205
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computer science—Mathematics
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
ISBN 3-540-45146-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Cryptanalysis I -- Factoring Large Numbers with the TWIRL Device -- New Partial Key Exposure Attacks on RSA -- Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases -- Alternate Adversary Models -- On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model -- Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret -- Invited Talk I -- On Cryptographic Assumptions and Challenges -- Protocols -- Scalable Protocols for Authenticated Group Key Exchange -- Practical Verifiable Encryption and Decryption of Discrete Logarithms -- Extending Oblivious Transfers Efficiently -- Symmetric Key Cryptanalysis I -- Algebraic Attacks on Combiners with Memory -- Fast Algebraic Attacks on Stream Ciphers with Linear Feedback -- Cryptanalysis of Safer++ -- Public Key Cryptanalysis II -- A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem -- The Impact of Decryption Failures on the Security of NTRU Encryption -- Universal Composability -- Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption -- Universal Composition with Joint State -- Zero-Knowledge -- Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More -- Derandomization in Cryptography -- On Deniability in the Common Reference String and Random Oracle Model -- Algebraic Geometry -- Primality Proving via One Round in ECPP and One Iteration in AKS -- Torus-Based Cryptography -- Public Key Constructions -- Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation -- Multipurpose Identity-Based Signcryption -- Invited Talk II -- SIGMA: The ‘SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols -- New Problems -- On Memory-Bound Functions for Fighting Spam -- Lower and Upper Bounds on Obtaining History Independence -- Private Circuits: Securing Hardware against Probing Attacks -- Symmetric Key Constructions -- A Tweakable Enciphering Mode -- A Message Authentication Code Based on Unimodular Matrix Groups -- Luby-Rackoff: 7 Rounds Are Enough for 2 n(1????) Security -- New Models -- Weak Key Authenticity and the Computational Completeness of Formal Encryption -- Plaintext Awareness via Key Registration -- Relaxing Chosen-Ciphertext Security -- Symmetric Key Cryptanalysis II -- Password Interception in a SSL/TLS Channel -- Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication -- Making a Faster Cryptanalytic Time-Memory Trade-Off.
Record Nr. UNISA-996465879203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology -- CRYPTO 2003 : 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings / / edited by Dan Boneh
Advances in Cryptology -- CRYPTO 2003 : 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings / / edited by Dan Boneh
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 636 p.)
Disciplina 005.8205
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Algorithms
Computer science—Mathematics
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
ISBN 3-540-45146-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Cryptanalysis I -- Factoring Large Numbers with the TWIRL Device -- New Partial Key Exposure Attacks on RSA -- Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases -- Alternate Adversary Models -- On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model -- Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret -- Invited Talk I -- On Cryptographic Assumptions and Challenges -- Protocols -- Scalable Protocols for Authenticated Group Key Exchange -- Practical Verifiable Encryption and Decryption of Discrete Logarithms -- Extending Oblivious Transfers Efficiently -- Symmetric Key Cryptanalysis I -- Algebraic Attacks on Combiners with Memory -- Fast Algebraic Attacks on Stream Ciphers with Linear Feedback -- Cryptanalysis of Safer++ -- Public Key Cryptanalysis II -- A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem -- The Impact of Decryption Failures on the Security of NTRU Encryption -- Universal Composability -- Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption -- Universal Composition with Joint State -- Zero-Knowledge -- Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More -- Derandomization in Cryptography -- On Deniability in the Common Reference String and Random Oracle Model -- Algebraic Geometry -- Primality Proving via One Round in ECPP and One Iteration in AKS -- Torus-Based Cryptography -- Public Key Constructions -- Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation -- Multipurpose Identity-Based Signcryption -- Invited Talk II -- SIGMA: The ‘SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols -- New Problems -- On Memory-Bound Functions for Fighting Spam -- Lower and Upper Bounds on Obtaining History Independence -- Private Circuits: Securing Hardware against Probing Attacks -- Symmetric Key Constructions -- A Tweakable Enciphering Mode -- A Message Authentication Code Based on Unimodular Matrix Groups -- Luby-Rackoff: 7 Rounds Are Enough for 2 n(1????) Security -- New Models -- Weak Key Authenticity and the Computational Completeness of Formal Encryption -- Plaintext Awareness via Key Registration -- Relaxing Chosen-Ciphertext Security -- Symmetric Key Cryptanalysis II -- Password Interception in a SSL/TLS Channel -- Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication -- Making a Faster Cryptanalytic Time-Memory Trade-Off.
Record Nr. UNINA-9910767536703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Journal of cryptology
Journal of cryptology
Pubbl/distr/stampa New York : Springer International
Descrizione fisica v. : ill. ; 24 cm
Disciplina 005.8205
Soggetto topico Crittografia -- Periodici
ISSN 0933-2790
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Note periodicità Trimestrale
Record Nr. UNISA-990000335100203316
New York : Springer International
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Research in Attacks, Intrusions, and Defenses [[electronic resource] ] : 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings / / edited by Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright
Research in Attacks, Intrusions, and Defenses [[electronic resource] ] : 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings / / edited by Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 476 p. 139 illus.)
Disciplina 005.8205
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
E-commerce
Application software
Systems and Data Security
Computer Communication Networks
e-Commerce/e-business
Information Systems Applications (incl. Internet)
ISBN 3-642-41284-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Building Companionship through Human-Robot Collaboration -- Older People’s Involvement in the Development of a Social Assistive Robot -- What Older People Expect of Robots: A Mixed Methods Approach -- Modelling Human Game play at Pool and Countering It with an Anthropomorphic Robot -- Automated Assistance Robot System for Transferring Model-Free Objects From/To Human Hand Using Vision/Force Control -- Robot-Mediated Interviews: Do Robots Possess Advantages over Human Interviewers When Talking to Children with Special Needs? -- Multi domain Voice Activity Detection during Human-Robot Interaction -- A Low-Cost Classroom-Oriented Educational Robotics System -- Social Navigation - Identifying Robot Navigation Patterns in a Path Crossing Scenario -- Affordance-Based Activity Placement in Human-Robot Shared Environments -- Exploring Requirements and Alternative Pet Robots for Robot Assisted Therapy with Older Adults with Dementia -- Smooth Reaching and Human-Like Compliance in Physical Interactions for Redundant Arms -- Recognition and Representation of Robot Skills in Real Time: A Theoretical Analysis -- Robots in Time: How User Experience in Human-Robot Interaction Changes over Time -- Interpreting Robot Pointing Behavior -- Coping with Stress Using Social Robots as Emotion-Oriented Tool: Potential Factors Discovered from Stress Game Experiment -- Study of a Social Robot’s Appearance Using Interviews and a Mobile Eye-Tracking Device -- Playful Interaction with Voice Sensing Modular Robots -- Social Comparison between the Self and a Humanoid Self-Evaluation Maintenance Model in HRI and Psychological Safety -- Psychological Anthropomorphism of Robots Measuring Mind Perception and Humanity in Japanese Context -- The Ultimatum Game as Measurement Tool for Anthropomorphism in Human–Robot Interaction -- Human-Robot Upper Body Gesture Imitation Analysis for Autism Spectrum Disorders -- Low-Cost Whole-Body Touch Interaction for Manual Motion Control of a Mobile Service Robot -- Human-Robot Interaction between Virtual and Real Worlds: Motivation from RoboCup @Home -- Habituation and Sensitisation Learning in ASMO Cognitive Architecture -- Effects of Different Kinds of Robot Feedback -- The Frankenstein Syndrome Questionnaire – Results from a Quantitative Cross-Cultural Survey -- Region of Eye Contact of Humanoid Nao Robot is Similar to that of a Human -- Exploring Robot Etiquette: Refining a HRI Home Companion Scenario Based on Feedback from Two Artists Who Lived with Robots in the UH Robot House -- The Good, The Bad, The Weird: Audience Evaluation of a “Real” Robot in Relation to Science Fiction and Mass Media -- Systems Overview of Ono: A DIY Reproducible Open Source Social Robot -- Sharing Spaces, Sharing Lives – The Impact of Robot Mobility on User Perception of a Home Companion Robot -- Qualitative Design and Implementation of Human-Robot Spatial Interactions -- Unsupervised Learning Spatio-temporal Features for Human Activity Recognition from RGB-D Video Data -- Head Pose Patterns in Multiparty Human-Robot Team-Building Interactions -- I Would Like Some Food: Anchoring Objects to Semantic Web Information in Human-Robot Dialogue Interactions -- Situated Analysis of Interactions between Cognitively Impaired Older Adults and the Therapeutic Robot PARO -- Closing the Loop: Towards Tightly Synchronized Robot Gesture and Speech -- Teleoperation of Domestic Service Robots: Effects of Global 3D Environment Maps in the User Interface on Operators’ Cognitive and Performance Metrics -- Artists as HRI Pioneers: A Creative Approach to Developing Novel Interactions for Living with Robots -- iCharibot: Design and Field Trials of a Fundraising Robot -- “It Don’t Matter If You’re Black or White”?- Effects of Robot Appearance and User Prejudice on Evaluations of a Newly Developed Robot Companion -- A Humanoid Robot Companion for Wheelchair Users -- Tuning Cost Functions for Social Navigation -- Child-Robot Interaction: Perspectives and Challenges -- Training a Robot via Human Feedback: A Case Study -- Real Time People Tracking in Crowded Environments with Range Measurements -- Who, How, Where: Using Exemplars to Learn Social Concepts -- An Asynchronous RGB-D Sensor Fusion Framework Using Monte-Carlo Methods for Hand Tracking on a Mobile Robot in Crowded Environments -- Using Spatial Semantic and Pragmatic Fields to Interpret Natural Language Pick-and-Place Instructions for a Mobile Service Robot -- Bodily Mood Expression: Recognize Moods from Functional Behaviors of Humanoid Robots -- Cooperative Robot Manipulator Control with Human ‘pinning’ for Robot Assistive Task Execution -- Effects of Politeness and Interaction Context on Perception and Experience of HRI -- Facial Expressions and Gestures to Convey Emotions with a Humanoid Robot -- PEPITA: A Design of Robot Pet Interface for Promoting Interaction -- A Socially Assistive Robot to Support Physical Training of Older People – An End User Acceptance Study -- How Do Companion-Type Service-Robots Fit into Daily Routines of the Elderly to Improve Quality of Life? -- Do Children Behave Differently with a Social Robot If with Peers? -- Is a Furry Pet More Engaging? Comparing the Effect of the Material on the Body Surface of Robot Pets -- Can You Trust Your Robotic Assistant? -- A Robotic Social Reciprocity in Children with Autism Spectrum Disorder -- Learning Complex Trajectories by Imitation Using Orthogonal Basis Functions and Template Matching -- Does Physical Interaction Escalate? -- Being There: Humans and Robots in Public Spaces -- Signaling Robot Trustworthiness: Effects of Behavioral Cues as Warnings -- Activity Switching in Child-Robot Interaction: A Hospital Case Study -- Addressing Multiple Participants: A Museum Robot’s Gaze Shapes Visitor Participation -- Towards a Robotic Sports Instructor for High-Interaction Sports.
Record Nr. UNISA-996465762003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Research in Attacks, Intrusions, and Defenses : 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings / / edited by Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright
Research in Attacks, Intrusions, and Defenses : 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings / / edited by Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 476 p. 139 illus.)
Disciplina 005.8205
Collana Security and Cryptology
Soggetto topico Data protection
Computer networks
Electronic commerce
Application software
Data and Information Security
Computer Communication Networks
e-Commerce and e-Business
Computer and Information Systems Applications
ISBN 3-642-41284-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Building Companionship through Human-Robot Collaboration -- Older People’s Involvement in the Development of a Social Assistive Robot -- What Older People Expect of Robots: A Mixed Methods Approach -- Modelling Human Game play at Pool and Countering It with an Anthropomorphic Robot -- Automated Assistance Robot System for Transferring Model-Free Objects From/To Human Hand Using Vision/Force Control -- Robot-Mediated Interviews: Do Robots Possess Advantages over Human Interviewers When Talking to Children with Special Needs? -- Multi domain Voice Activity Detection during Human-Robot Interaction -- A Low-Cost Classroom-Oriented Educational Robotics System -- Social Navigation - Identifying Robot Navigation Patterns in a Path Crossing Scenario -- Affordance-Based Activity Placement in Human-Robot Shared Environments -- Exploring Requirements and Alternative Pet Robots for Robot Assisted Therapy with Older Adults with Dementia -- Smooth Reaching and Human-Like Compliance in Physical Interactions for Redundant Arms -- Recognition and Representation of Robot Skills in Real Time: A Theoretical Analysis -- Robots in Time: How User Experience in Human-Robot Interaction Changes over Time -- Interpreting Robot Pointing Behavior -- Coping with Stress Using Social Robots as Emotion-Oriented Tool: Potential Factors Discovered from Stress Game Experiment -- Study of a Social Robot’s Appearance Using Interviews and a Mobile Eye-Tracking Device -- Playful Interaction with Voice Sensing Modular Robots -- Social Comparison between the Self and a Humanoid Self-Evaluation Maintenance Model in HRI and Psychological Safety -- Psychological Anthropomorphism of Robots Measuring Mind Perception and Humanity in Japanese Context -- The Ultimatum Game as Measurement Tool for Anthropomorphism in Human–Robot Interaction -- Human-Robot Upper Body Gesture Imitation Analysis for Autism Spectrum Disorders -- Low-Cost Whole-Body Touch Interaction for Manual Motion Control of a Mobile Service Robot.-Human-Robot Interaction between Virtual and Real Worlds: Motivation from RoboCup @Home -- Habituation and Sensitisation Learning in ASMO Cognitive Architecture -- Effects of Different Kinds of Robot Feedback -- The Frankenstein Syndrome Questionnaire – Results from a Quantitative Cross-Cultural Survey -- Region of Eye Contact of Humanoid Nao Robot is Similar to that of a Human -- Exploring Robot Etiquette: Refining a HRI Home Companion Scenario Based on Feedback from Two Artists Who Lived with Robots in the UH Robot House -- The Good, The Bad, The Weird: Audience Evaluation of a “Real” Robot in Relation to Science Fiction and Mass Media -- Systems Overview of Ono: A DIY Reproducible Open Source Social Robot -- Sharing Spaces, Sharing Lives – The Impact of Robot Mobility on User Perception of a Home Companion Robot -- Qualitative Design and Implementation of Human-Robot Spatial Interactions -- Unsupervised Learning Spatio-temporal Features for Human Activity Recognition from RGB-D Video Data -- Head Pose Patterns in Multiparty Human-Robot Team-Building Interactions -- I Would Like Some Food: Anchoring Objects to Semantic Web Information in Human-Robot Dialogue Interactions -- Situated Analysis of Interactions between Cognitively Impaired Older Adults and the Therapeutic Robot PARO -- Closing the Loop: Towards Tightly Synchronized Robot Gesture and Speech -- Teleoperation of Domestic Service Robots: Effects of Global 3D Environment Maps in the User Interface on Operators’ Cognitive and Performance Metrics -- Artists as HRI Pioneers: A Creative Approach to Developing Novel Interactions for Living with Robots -- iCharibot: Design and Field Trials of a Fundraising Robot -- “It Don’t Matter If You’re Black or White”?- Effects of Robot Appearance and User Prejudice on Evaluations of a Newly Developed Robot Companion -- A Humanoid Robot Companion for Wheelchair Users -- Tuning Cost Functions for Social Navigation -- Child-Robot Interaction: Perspectives and Challenges.-Training a Robot via Human Feedback: A Case Study -- Real Time People Tracking in Crowded Environments with Range Measurements -- Who, How, Where: Using Exemplars to Learn Social Concepts -- An Asynchronous RGB-D Sensor Fusion Framework Using Monte-Carlo Methods for Hand Tracking on a Mobile Robot in Crowded Environments -- Using Spatial Semantic and Pragmatic Fields to Interpret Natural Language Pick-and-Place Instructions for a Mobile Service Robot -- Bodily Mood Expression: Recognize Moods from Functional Behaviors of Humanoid Robots -- Cooperative Robot Manipulator Control with Human ‘pinning’ for Robot Assistive Task Execution -- Effects of Politeness and Interaction Context on Perception and Experience of HRI -- Facial Expressions and Gestures to Convey Emotions with a Humanoid Robot -- PEPITA: A Design of Robot Pet Interface for Promoting Interaction -- A Socially Assistive Robot to Support Physical Training of Older People – An End User Acceptance Study -- How Do Companion-Type Service-Robots Fit into Daily Routines of the Elderly to Improve Quality of Life? -- Do Children Behave Differently with a Social Robot If with Peers? -- Is a Furry Pet More Engaging? Comparing the Effect of the Material on the Body Surface of Robot Pets -- Can You Trust Your Robotic Assistant? -- A Robotic Social Reciprocity in Children with Autism Spectrum Disorder -- Learning Complex Trajectories by Imitation Using Orthogonal Basis Functions and Template Matching -- Does Physical Interaction Escalate? -- Being There: Humans and Robots in Public Spaces -- Signaling Robot Trustworthiness: Effects of Behavioral Cues as Warnings -- Activity Switching in Child-Robot Interaction: A Hospital Case Study -- Addressing Multiple Participants: A Museum Robot’s Gaze Shapes Visitor Participation -- Towards a Robotic Sports Instructor for High-Interaction Sports.
Record Nr. UNINA-9910483160103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security Protocols [[electronic resource] ] : 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers / / edited by Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau
Security Protocols [[electronic resource] ] : 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers / / edited by Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 267 p. 23 illus.) : online resource
Disciplina 005.8205
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Computer science
Systems and Data Security
Cryptology
Computer Communication Networks
Computer Science, general
ISBN 3-642-41717-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: What’s Happening on the Other Channel? (Transcript of Discussion) -- Towards New Security Primitives Based on Hard AI Problems -- Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion) -- Towards a Theory of Application Compartmentalisation -- Towards a Theory of Application Compartmentalisation (Transcript of Discussion) -- Authentication for Resilience: The Case of SDN -- Authentication for Resilience: The Case of SDN (Transcript of Discussion) -- Verifiable Postal Voting -- End-to-End Verifiable Postal Voting (Transcript of Discussion) -- Independent Computations for Safe Remote Electronic Voting -- Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion) -- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets -- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion) -- Enhancements to Prepare-and-Measure Based QKD Protocols -- Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion) -- Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks -- Simple Defences against Vibration-Based-Keystroke Fingerprinting Attacks (Transcript of Discussion) -- Communication Setup in Anonymous Messaging -- Communication Setup in Anonymous Messaging (Transcript of Discussion) -- Towards a Stronger Location Integrity -- Towards a Stronger Location Integrity (Transcript of Discussion.-Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication -- Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion) -- Spraying Diffie-Hellman for Secure Key Exchange in MANETs -- Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion) -- On the Origin of Yet another Channel -- On the Origin of Yet another Channel (Transcript of Discussion) -- Verifiable Classroom Voting: Where Cryptography Meets Pedagogy -- Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion) -- Creative Uses for the Other Channel.
Record Nr. UNISA-996465426703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security Protocols : 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers / / edited by Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau
Security Protocols : 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers / / edited by Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 267 p. 23 illus.) : online resource
Disciplina 005.8205
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks
Computer science
Data and Information Security
Cryptology
Computer Communication Networks
Computer Science
ISBN 3-642-41717-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: What’s Happening on the Other Channel? (Transcript of Discussion) -- Towards New Security Primitives Based on Hard AI Problems -- Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion) -- Towards a Theory of Application Compartmentalisation -- Towards a Theory of Application Compartmentalisation (Transcript of Discussion) -- Authentication for Resilience: The Case of SDN -- Authentication for Resilience: The Case of SDN (Transcript of Discussion) -- Verifiable Postal Voting -- End-to-End Verifiable Postal Voting (Transcript of Discussion) -- Independent Computations for Safe Remote Electronic Voting -- Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion) -- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets -- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion) -- Enhancements to Prepare-and-Measure Based QKD Protocols -- Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion) -- Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks -- Simple Defences against Vibration-Based-Keystroke Fingerprinting Attacks (Transcript of Discussion) -- Communication Setup in Anonymous Messaging -- Communication Setup in Anonymous Messaging (Transcript of Discussion) -- Towards a Stronger Location Integrity -- Towards a Stronger Location Integrity (Transcript of Discussion.-Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication -- Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion) -- Spraying Diffie-Hellman for Secure Key Exchange in MANETs -- Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion) -- On the Origin of Yet another Channel -- On the Origin of Yet another Channel (Transcript of Discussion) -- Verifiable Classroom Voting: Where Cryptography Meets Pedagogy.-Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion) -- Creative Uses for the Other Channel.
Record Nr. UNINA-9910484194103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui