Advances in Cryptology -- CRYPTO 2003 [[electronic resource] ] : 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings / / edited by Dan Boneh
| Advances in Cryptology -- CRYPTO 2003 [[electronic resource] ] : 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings / / edited by Dan Boneh |
| Edizione | [1st ed. 2003.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
| Descrizione fisica | 1 online resource (XII, 636 p.) |
| Disciplina | 005.8205 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Algorithms Computer science—Mathematics Management information systems Computer science Cryptology Computer Communication Networks Operating Systems Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science Management of Computing and Information Systems |
| ISBN | 3-540-45146-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Public Key Cryptanalysis I -- Factoring Large Numbers with the TWIRL Device -- New Partial Key Exposure Attacks on RSA -- Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases -- Alternate Adversary Models -- On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model -- Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret -- Invited Talk I -- On Cryptographic Assumptions and Challenges -- Protocols -- Scalable Protocols for Authenticated Group Key Exchange -- Practical Verifiable Encryption and Decryption of Discrete Logarithms -- Extending Oblivious Transfers Efficiently -- Symmetric Key Cryptanalysis I -- Algebraic Attacks on Combiners with Memory -- Fast Algebraic Attacks on Stream Ciphers with Linear Feedback -- Cryptanalysis of Safer++ -- Public Key Cryptanalysis II -- A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem -- The Impact of Decryption Failures on the Security of NTRU Encryption -- Universal Composability -- Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption -- Universal Composition with Joint State -- Zero-Knowledge -- Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More -- Derandomization in Cryptography -- On Deniability in the Common Reference String and Random Oracle Model -- Algebraic Geometry -- Primality Proving via One Round in ECPP and One Iteration in AKS -- Torus-Based Cryptography -- Public Key Constructions -- Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation -- Multipurpose Identity-Based Signcryption -- Invited Talk II -- SIGMA: The ‘SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols -- New Problems -- On Memory-Bound Functions for Fighting Spam -- Lower and Upper Bounds on Obtaining History Independence -- Private Circuits: Securing Hardware against Probing Attacks -- Symmetric Key Constructions -- A Tweakable Enciphering Mode -- A Message Authentication Code Based on Unimodular Matrix Groups -- Luby-Rackoff: 7 Rounds Are Enough for 2 n(1????) Security -- New Models -- Weak Key Authenticity and the Computational Completeness of Formal Encryption -- Plaintext Awareness via Key Registration -- Relaxing Chosen-Ciphertext Security -- Symmetric Key Cryptanalysis II -- Password Interception in a SSL/TLS Channel -- Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication -- Making a Faster Cryptanalytic Time-Memory Trade-Off. |
| Record Nr. | UNISA-996465879203316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advances in Cryptology -- CRYPTO 2003 : 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings / / edited by Dan Boneh
| Advances in Cryptology -- CRYPTO 2003 : 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings / / edited by Dan Boneh |
| Edizione | [1st ed. 2003.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
| Descrizione fisica | 1 online resource (XII, 636 p.) |
| Disciplina | 005.8205 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data encryption (Computer science)
Computer networks Operating systems (Computers) Algorithms Computer science—Mathematics Management information systems Computer science Cryptology Computer Communication Networks Operating Systems Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science Management of Computing and Information Systems |
| ISBN | 3-540-45146-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Public Key Cryptanalysis I -- Factoring Large Numbers with the TWIRL Device -- New Partial Key Exposure Attacks on RSA -- Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases -- Alternate Adversary Models -- On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model -- Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret -- Invited Talk I -- On Cryptographic Assumptions and Challenges -- Protocols -- Scalable Protocols for Authenticated Group Key Exchange -- Practical Verifiable Encryption and Decryption of Discrete Logarithms -- Extending Oblivious Transfers Efficiently -- Symmetric Key Cryptanalysis I -- Algebraic Attacks on Combiners with Memory -- Fast Algebraic Attacks on Stream Ciphers with Linear Feedback -- Cryptanalysis of Safer++ -- Public Key Cryptanalysis II -- A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem -- The Impact of Decryption Failures on the Security of NTRU Encryption -- Universal Composability -- Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption -- Universal Composition with Joint State -- Zero-Knowledge -- Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More -- Derandomization in Cryptography -- On Deniability in the Common Reference String and Random Oracle Model -- Algebraic Geometry -- Primality Proving via One Round in ECPP and One Iteration in AKS -- Torus-Based Cryptography -- Public Key Constructions -- Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation -- Multipurpose Identity-Based Signcryption -- Invited Talk II -- SIGMA: The ‘SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols -- New Problems -- On Memory-Bound Functions for Fighting Spam -- Lower and Upper Bounds on Obtaining History Independence -- Private Circuits: Securing Hardware against Probing Attacks -- Symmetric Key Constructions -- A Tweakable Enciphering Mode -- A Message Authentication Code Based on Unimodular Matrix Groups -- Luby-Rackoff: 7 Rounds Are Enough for 2 n(1????) Security -- New Models -- Weak Key Authenticity and the Computational Completeness of Formal Encryption -- Plaintext Awareness via Key Registration -- Relaxing Chosen-Ciphertext Security -- Symmetric Key Cryptanalysis II -- Password Interception in a SSL/TLS Channel -- Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication -- Making a Faster Cryptanalytic Time-Memory Trade-Off. |
| Record Nr. | UNINA-9910767536703321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Journal of cryptology
| Journal of cryptology |
| Pubbl/distr/stampa | New York : Springer International |
| Descrizione fisica | v. : ill. ; 24 cm |
| Disciplina | 005.8205 |
| Soggetto topico | Crittografia -- Periodici |
| ISSN | 0933-2790 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Note periodicità | Trimestrale |
| Record Nr. | UNISA-990000335100203316 |
| New York : Springer International | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Research in Attacks, Intrusions, and Defenses [[electronic resource] ] : 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings / / edited by Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright
| Research in Attacks, Intrusions, and Defenses [[electronic resource] ] : 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings / / edited by Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
| Descrizione fisica | 1 online resource (XII, 476 p. 139 illus.) |
| Disciplina | 005.8205 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computer communication systems E-commerce Application software Systems and Data Security Computer Communication Networks e-Commerce/e-business Information Systems Applications (incl. Internet) |
| ISBN | 3-642-41284-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Building Companionship through Human-Robot Collaboration -- Older People’s Involvement in the Development of a Social Assistive Robot -- What Older People Expect of Robots: A Mixed Methods Approach -- Modelling Human Game play at Pool and Countering It with an Anthropomorphic Robot -- Automated Assistance Robot System for Transferring Model-Free Objects From/To Human Hand Using Vision/Force Control -- Robot-Mediated Interviews: Do Robots Possess Advantages over Human Interviewers When Talking to Children with Special Needs? -- Multi domain Voice Activity Detection during Human-Robot Interaction -- A Low-Cost Classroom-Oriented Educational Robotics System -- Social Navigation - Identifying Robot Navigation Patterns in a Path Crossing Scenario -- Affordance-Based Activity Placement in Human-Robot Shared Environments -- Exploring Requirements and Alternative Pet Robots for Robot Assisted Therapy with Older Adults with Dementia -- Smooth Reaching and Human-Like Compliance in Physical Interactions for Redundant Arms -- Recognition and Representation of Robot Skills in Real Time: A Theoretical Analysis -- Robots in Time: How User Experience in Human-Robot Interaction Changes over Time -- Interpreting Robot Pointing Behavior -- Coping with Stress Using Social Robots as Emotion-Oriented Tool: Potential Factors Discovered from Stress Game Experiment -- Study of a Social Robot’s Appearance Using Interviews and a Mobile Eye-Tracking Device -- Playful Interaction with Voice Sensing Modular Robots -- Social Comparison between the Self and a Humanoid Self-Evaluation Maintenance Model in HRI and Psychological Safety -- Psychological Anthropomorphism of Robots Measuring Mind Perception and Humanity in Japanese Context -- The Ultimatum Game as Measurement Tool for Anthropomorphism in Human–Robot Interaction -- Human-Robot Upper Body Gesture Imitation Analysis for Autism Spectrum Disorders -- Low-Cost Whole-Body Touch Interaction for Manual Motion Control of a Mobile Service Robot -- Human-Robot Interaction between Virtual and Real Worlds: Motivation from RoboCup @Home -- Habituation and Sensitisation Learning in ASMO Cognitive Architecture -- Effects of Different Kinds of Robot Feedback -- The Frankenstein Syndrome Questionnaire – Results from a Quantitative Cross-Cultural Survey -- Region of Eye Contact of Humanoid Nao Robot is Similar to that of a Human -- Exploring Robot Etiquette: Refining a HRI Home Companion Scenario Based on Feedback from Two Artists Who Lived with Robots in the UH Robot House -- The Good, The Bad, The Weird: Audience Evaluation of a “Real” Robot in Relation to Science Fiction and Mass Media -- Systems Overview of Ono: A DIY Reproducible Open Source Social Robot -- Sharing Spaces, Sharing Lives – The Impact of Robot Mobility on User Perception of a Home Companion Robot -- Qualitative Design and Implementation of Human-Robot Spatial Interactions -- Unsupervised Learning Spatio-temporal Features for Human Activity Recognition from RGB-D Video Data -- Head Pose Patterns in Multiparty Human-Robot Team-Building Interactions -- I Would Like Some Food: Anchoring Objects to Semantic Web Information in Human-Robot Dialogue Interactions -- Situated Analysis of Interactions between Cognitively Impaired Older Adults and the Therapeutic Robot PARO -- Closing the Loop: Towards Tightly Synchronized Robot Gesture and Speech -- Teleoperation of Domestic Service Robots: Effects of Global 3D Environment Maps in the User Interface on Operators’ Cognitive and Performance Metrics -- Artists as HRI Pioneers: A Creative Approach to Developing Novel Interactions for Living with Robots -- iCharibot: Design and Field Trials of a Fundraising Robot -- “It Don’t Matter If You’re Black or White”?- Effects of Robot Appearance and User Prejudice on Evaluations of a Newly Developed Robot Companion -- A Humanoid Robot Companion for Wheelchair Users -- Tuning Cost Functions for Social Navigation -- Child-Robot Interaction: Perspectives and Challenges -- Training a Robot via Human Feedback: A Case Study -- Real Time People Tracking in Crowded Environments with Range Measurements -- Who, How, Where: Using Exemplars to Learn Social Concepts -- An Asynchronous RGB-D Sensor Fusion Framework Using Monte-Carlo Methods for Hand Tracking on a Mobile Robot in Crowded Environments -- Using Spatial Semantic and Pragmatic Fields to Interpret Natural Language Pick-and-Place Instructions for a Mobile Service Robot -- Bodily Mood Expression: Recognize Moods from Functional Behaviors of Humanoid Robots -- Cooperative Robot Manipulator Control with Human ‘pinning’ for Robot Assistive Task Execution -- Effects of Politeness and Interaction Context on Perception and Experience of HRI -- Facial Expressions and Gestures to Convey Emotions with a Humanoid Robot -- PEPITA: A Design of Robot Pet Interface for Promoting Interaction -- A Socially Assistive Robot to Support Physical Training of Older People – An End User Acceptance Study -- How Do Companion-Type Service-Robots Fit into Daily Routines of the Elderly to Improve Quality of Life? -- Do Children Behave Differently with a Social Robot If with Peers? -- Is a Furry Pet More Engaging? Comparing the Effect of the Material on the Body Surface of Robot Pets -- Can You Trust Your Robotic Assistant? -- A Robotic Social Reciprocity in Children with Autism Spectrum Disorder -- Learning Complex Trajectories by Imitation Using Orthogonal Basis Functions and Template Matching -- Does Physical Interaction Escalate? -- Being There: Humans and Robots in Public Spaces -- Signaling Robot Trustworthiness: Effects of Behavioral Cues as Warnings -- Activity Switching in Child-Robot Interaction: A Hospital Case Study -- Addressing Multiple Participants: A Museum Robot’s Gaze Shapes Visitor Participation -- Towards a Robotic Sports Instructor for High-Interaction Sports. |
| Record Nr. | UNISA-996465762003316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Research in Attacks, Intrusions, and Defenses : 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings / / edited by Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright
| Research in Attacks, Intrusions, and Defenses : 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings / / edited by Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
| Descrizione fisica | 1 online resource (XII, 476 p. 139 illus.) |
| Disciplina | 005.8205 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data protection
Computer networks Electronic commerce Application software Data and Information Security Computer Communication Networks e-Commerce and e-Business Computer and Information Systems Applications |
| ISBN | 3-642-41284-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Building Companionship through Human-Robot Collaboration -- Older People’s Involvement in the Development of a Social Assistive Robot -- What Older People Expect of Robots: A Mixed Methods Approach -- Modelling Human Game play at Pool and Countering It with an Anthropomorphic Robot -- Automated Assistance Robot System for Transferring Model-Free Objects From/To Human Hand Using Vision/Force Control -- Robot-Mediated Interviews: Do Robots Possess Advantages over Human Interviewers When Talking to Children with Special Needs? -- Multi domain Voice Activity Detection during Human-Robot Interaction -- A Low-Cost Classroom-Oriented Educational Robotics System -- Social Navigation - Identifying Robot Navigation Patterns in a Path Crossing Scenario -- Affordance-Based Activity Placement in Human-Robot Shared Environments -- Exploring Requirements and Alternative Pet Robots for Robot Assisted Therapy with Older Adults with Dementia -- Smooth Reaching and Human-Like Compliance in Physical Interactions for Redundant Arms -- Recognition and Representation of Robot Skills in Real Time: A Theoretical Analysis -- Robots in Time: How User Experience in Human-Robot Interaction Changes over Time -- Interpreting Robot Pointing Behavior -- Coping with Stress Using Social Robots as Emotion-Oriented Tool: Potential Factors Discovered from Stress Game Experiment -- Study of a Social Robot’s Appearance Using Interviews and a Mobile Eye-Tracking Device -- Playful Interaction with Voice Sensing Modular Robots -- Social Comparison between the Self and a Humanoid Self-Evaluation Maintenance Model in HRI and Psychological Safety -- Psychological Anthropomorphism of Robots Measuring Mind Perception and Humanity in Japanese Context -- The Ultimatum Game as Measurement Tool for Anthropomorphism in Human–Robot Interaction -- Human-Robot Upper Body Gesture Imitation Analysis for Autism Spectrum Disorders -- Low-Cost Whole-Body Touch Interaction for Manual Motion Control of a Mobile Service Robot.-Human-Robot Interaction between Virtual and Real Worlds: Motivation from RoboCup @Home -- Habituation and Sensitisation Learning in ASMO Cognitive Architecture -- Effects of Different Kinds of Robot Feedback -- The Frankenstein Syndrome Questionnaire – Results from a Quantitative Cross-Cultural Survey -- Region of Eye Contact of Humanoid Nao Robot is Similar to that of a Human -- Exploring Robot Etiquette: Refining a HRI Home Companion Scenario Based on Feedback from Two Artists Who Lived with Robots in the UH Robot House -- The Good, The Bad, The Weird: Audience Evaluation of a “Real” Robot in Relation to Science Fiction and Mass Media -- Systems Overview of Ono: A DIY Reproducible Open Source Social Robot -- Sharing Spaces, Sharing Lives – The Impact of Robot Mobility on User Perception of a Home Companion Robot -- Qualitative Design and Implementation of Human-Robot Spatial Interactions -- Unsupervised Learning Spatio-temporal Features for Human Activity Recognition from RGB-D Video Data -- Head Pose Patterns in Multiparty Human-Robot Team-Building Interactions -- I Would Like Some Food: Anchoring Objects to Semantic Web Information in Human-Robot Dialogue Interactions -- Situated Analysis of Interactions between Cognitively Impaired Older Adults and the Therapeutic Robot PARO -- Closing the Loop: Towards Tightly Synchronized Robot Gesture and Speech -- Teleoperation of Domestic Service Robots: Effects of Global 3D Environment Maps in the User Interface on Operators’ Cognitive and Performance Metrics -- Artists as HRI Pioneers: A Creative Approach to Developing Novel Interactions for Living with Robots -- iCharibot: Design and Field Trials of a Fundraising Robot -- “It Don’t Matter If You’re Black or White”?- Effects of Robot Appearance and User Prejudice on Evaluations of a Newly Developed Robot Companion -- A Humanoid Robot Companion for Wheelchair Users -- Tuning Cost Functions for Social Navigation -- Child-Robot Interaction: Perspectives and Challenges.-Training a Robot via Human Feedback: A Case Study -- Real Time People Tracking in Crowded Environments with Range Measurements -- Who, How, Where: Using Exemplars to Learn Social Concepts -- An Asynchronous RGB-D Sensor Fusion Framework Using Monte-Carlo Methods for Hand Tracking on a Mobile Robot in Crowded Environments -- Using Spatial Semantic and Pragmatic Fields to Interpret Natural Language Pick-and-Place Instructions for a Mobile Service Robot -- Bodily Mood Expression: Recognize Moods from Functional Behaviors of Humanoid Robots -- Cooperative Robot Manipulator Control with Human ‘pinning’ for Robot Assistive Task Execution -- Effects of Politeness and Interaction Context on Perception and Experience of HRI -- Facial Expressions and Gestures to Convey Emotions with a Humanoid Robot -- PEPITA: A Design of Robot Pet Interface for Promoting Interaction -- A Socially Assistive Robot to Support Physical Training of Older People – An End User Acceptance Study -- How Do Companion-Type Service-Robots Fit into Daily Routines of the Elderly to Improve Quality of Life? -- Do Children Behave Differently with a Social Robot If with Peers? -- Is a Furry Pet More Engaging? Comparing the Effect of the Material on the Body Surface of Robot Pets -- Can You Trust Your Robotic Assistant? -- A Robotic Social Reciprocity in Children with Autism Spectrum Disorder -- Learning Complex Trajectories by Imitation Using Orthogonal Basis Functions and Template Matching -- Does Physical Interaction Escalate? -- Being There: Humans and Robots in Public Spaces -- Signaling Robot Trustworthiness: Effects of Behavioral Cues as Warnings -- Activity Switching in Child-Robot Interaction: A Hospital Case Study -- Addressing Multiple Participants: A Museum Robot’s Gaze Shapes Visitor Participation -- Towards a Robotic Sports Instructor for High-Interaction Sports. |
| Record Nr. | UNINA-9910483160103321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security Protocols [[electronic resource] ] : 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers / / edited by Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau
| Security Protocols [[electronic resource] ] : 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers / / edited by Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
| Descrizione fisica | 1 online resource (X, 267 p. 23 illus.) : online resource |
| Disciplina | 005.8205 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Computer science Systems and Data Security Cryptology Computer Communication Networks Computer Science, general |
| ISBN | 3-642-41717-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction: What’s Happening on the Other Channel? (Transcript of Discussion) -- Towards New Security Primitives Based on Hard AI Problems -- Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion) -- Towards a Theory of Application Compartmentalisation -- Towards a Theory of Application Compartmentalisation (Transcript of Discussion) -- Authentication for Resilience: The Case of SDN -- Authentication for Resilience: The Case of SDN (Transcript of Discussion) -- Verifiable Postal Voting -- End-to-End Verifiable Postal Voting (Transcript of Discussion) -- Independent Computations for Safe Remote Electronic Voting -- Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion) -- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets -- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion) -- Enhancements to Prepare-and-Measure Based QKD Protocols -- Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion) -- Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks -- Simple Defences against Vibration-Based-Keystroke Fingerprinting Attacks (Transcript of Discussion) -- Communication Setup in Anonymous Messaging -- Communication Setup in Anonymous Messaging (Transcript of Discussion) -- Towards a Stronger Location Integrity -- Towards a Stronger Location Integrity (Transcript of Discussion.-Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication -- Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion) -- Spraying Diffie-Hellman for Secure Key Exchange in MANETs -- Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion) -- On the Origin of Yet another Channel -- On the Origin of Yet another Channel (Transcript of Discussion) -- Verifiable Classroom Voting: Where Cryptography Meets Pedagogy -- Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion) -- Creative Uses for the Other Channel. |
| Record Nr. | UNISA-996465426703316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Security Protocols : 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers / / edited by Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau
| Security Protocols : 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers / / edited by Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
| Descrizione fisica | 1 online resource (X, 267 p. 23 illus.) : online resource |
| Disciplina | 005.8205 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks Computer science Data and Information Security Cryptology Computer Communication Networks Computer Science |
| ISBN | 3-642-41717-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction: What’s Happening on the Other Channel? (Transcript of Discussion) -- Towards New Security Primitives Based on Hard AI Problems -- Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion) -- Towards a Theory of Application Compartmentalisation -- Towards a Theory of Application Compartmentalisation (Transcript of Discussion) -- Authentication for Resilience: The Case of SDN -- Authentication for Resilience: The Case of SDN (Transcript of Discussion) -- Verifiable Postal Voting -- End-to-End Verifiable Postal Voting (Transcript of Discussion) -- Independent Computations for Safe Remote Electronic Voting -- Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion) -- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets -- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion) -- Enhancements to Prepare-and-Measure Based QKD Protocols -- Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion) -- Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks -- Simple Defences against Vibration-Based-Keystroke Fingerprinting Attacks (Transcript of Discussion) -- Communication Setup in Anonymous Messaging -- Communication Setup in Anonymous Messaging (Transcript of Discussion) -- Towards a Stronger Location Integrity -- Towards a Stronger Location Integrity (Transcript of Discussion.-Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication -- Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion) -- Spraying Diffie-Hellman for Secure Key Exchange in MANETs -- Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion) -- On the Origin of Yet another Channel -- On the Origin of Yet another Channel (Transcript of Discussion) -- Verifiable Classroom Voting: Where Cryptography Meets Pedagogy.-Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion) -- Creative Uses for the Other Channel. |
| Record Nr. | UNINA-9910484194103321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||