top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in information and computer security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008 : proceedings / / Kanta Matsuura, Eiichiro Fujisaki (editors)
Advances in information and computer security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008 : proceedings / / Kanta Matsuura, Eiichiro Fujisaki (editors)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin ; ; Heidelberg ; ; New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (XII, 299 p.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
ISBN 3-540-89598-1
Classificazione 54.30
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography -- On Generating Elements of Orders Dividing p 2k ±p k ?+?1 -- Chosen Ciphertext Secure Public Key Encryption with a Simple Structure -- Remarks on the Attack of Fouque et al. against the ?IC Scheme -- Signature and Signcryption -- Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles -- Signcryption Scheme in Multi-user Setting without Random Oracles -- Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices -- Software Security -- The Superdiversifier: Peephole Individualization for Software Protection -- Detecting Java Theft Based on Static API Trace Birthmark -- Online Network Forensics for Automatic Repair Validation -- Return Value Predictability Profiles for Self–healing -- Privacy Protection and Contents Protection -- Involuntary Information Leakage in Social Network Services -- Privacy Preserving Computations without Public Key Cryptographic Operation -- A Novel Framework for Watermarking: The Data-Abstracted Approach -- Invited Talk -- The Elliptic Curve Discrete Logarithm Problem: State of the Art -- Authentication and Access Control -- An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication -- Analysis of a Biometric Authentication Protocol for Signature Creation Application -- Efficient Secure Labeling Method under Dynamic XML Data Streams -- Implementation -- Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems -- The Long-Short-Key Primitive and Its Applications to Key Security.
Record Nr. UNINA-9910484474203321
Berlin ; ; Heidelberg ; ; New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in information and computer security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008 : proceedings / / Kanta Matsuura, Eiichiro Fujisaki (editors)
Advances in information and computer security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008 : proceedings / / Kanta Matsuura, Eiichiro Fujisaki (editors)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin ; ; Heidelberg ; ; New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (XII, 299 p.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
ISBN 3-540-89598-1
Classificazione 54.30
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography -- On Generating Elements of Orders Dividing p 2k ±p k ?+?1 -- Chosen Ciphertext Secure Public Key Encryption with a Simple Structure -- Remarks on the Attack of Fouque et al. against the ?IC Scheme -- Signature and Signcryption -- Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles -- Signcryption Scheme in Multi-user Setting without Random Oracles -- Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices -- Software Security -- The Superdiversifier: Peephole Individualization for Software Protection -- Detecting Java Theft Based on Static API Trace Birthmark -- Online Network Forensics for Automatic Repair Validation -- Return Value Predictability Profiles for Self–healing -- Privacy Protection and Contents Protection -- Involuntary Information Leakage in Social Network Services -- Privacy Preserving Computations without Public Key Cryptographic Operation -- A Novel Framework for Watermarking: The Data-Abstracted Approach -- Invited Talk -- The Elliptic Curve Discrete Logarithm Problem: State of the Art -- Authentication and Access Control -- An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication -- Analysis of a Biometric Authentication Protocol for Signature Creation Application -- Efficient Secure Labeling Method under Dynamic XML Data Streams -- Implementation -- Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems -- The Long-Short-Key Primitive and Its Applications to Key Security.
Record Nr. UNISA-996465544203316
Berlin ; ; Heidelberg ; ; New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2008 [[electronic resource] ] : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
Computer Security - ESORICS 2008 [[electronic resource] ] : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIV, 602 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Seguridad informática
Computer communication systems
Computer software—Reusability
E-commerce
Management information systems
Computer science
Cryptology
Theory of Computation
Computer Communication Networks
Performance and Reliability
e-Commerce/e-business
Management of Computing and Information Systems
ISBN 3-540-88313-4
Classificazione 54.30
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1: Intrusion Detection and Network Vulnerability Analysis -- Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW -- Identifying Critical Attack Assets in Dependency Attack Graphs -- Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory -- Session 2: Network Security -- Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs -- Efficient Handling of Adversary Attacks in Aggregation Applications -- Symmetric Key Approaches to Securing BGP – A Little Bit Trust Is Enough -- Session 3: Smart Cards and Identity Management -- Dismantling MIFARE Classic -- A Browser-Based Kerberos Authentication Scheme -- CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud -- Session 4: Data and Applications Security -- Disclosure Analysis and Control in Statistical Databases -- TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead -- Access Control Friendly Query Verification for Outsourced Data Publishing -- Session 5: Privacy Enhancing Technologies -- Sharemind: A Framework for Fast Privacy-Preserving Computations -- Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms -- Remote Integrity Check with Dishonest Storage Server -- Session 6: Anonymity and RFID Privacy -- A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks -- RFID Privacy Models Revisited -- A New Formal Proof Model for RFID Location Privacy -- Session 7: Access Control and Trust Negotiation -- Distributed Authorization by Multiparty Trust Negotiation -- Compositional Refinement of Policies in UML – Exemplified for Access Control -- On the Security of Delegation in Access Control Systems -- Session 8: Information Flow and Non-transferability -- Termination-Insensitive Noninterference Leaks More Than Just a Bit -- Security Provisioning in Pervasive Environments Using Multi-objective Optimization -- Improved Security Notions and Protocols for Non-transferable Identification -- Session 9: Secure Electronic Voting and Web Applications Security -- Human Readable Paper Verification of Prêt à Voter -- A Distributed Implementation of the Certified Information Access Service -- Exploring User Reactions to New Browser Cues for Extended Validation Certificates -- A Framework for the Analysis of Mix-Based Steganographic File Systems -- Session 10: VoIP Security, Malware, and DRM -- An Adaptive Policy-Based Approach to SPIT Management -- Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? -- Eureka: A Framework for Enabling Static Malware Analysis -- New Considerations about the Correct Design of Turbo Fingerprinting Codes -- Session 11: Formal Models and Cryptographic Protocols -- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks -- Cryptographic Protocol Explication and End-Point Projection -- State Space Reduction in the Maude-NRL Protocol Analyzer -- Session 12: Language-Based and Hardware Security -- Code-Carrying Authorization -- CPU Bugs, CPU Backdoors and Consequences on Security.
Record Nr. UNISA-996466104103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIV, 602 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Seguridad informática
Computer communication systems
Computer software—Reusability
E-commerce
Management information systems
Computer science
Cryptology
Theory of Computation
Computer Communication Networks
Performance and Reliability
e-Commerce/e-business
Management of Computing and Information Systems
ISBN 3-540-88313-4
Classificazione 54.30
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1: Intrusion Detection and Network Vulnerability Analysis -- Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW -- Identifying Critical Attack Assets in Dependency Attack Graphs -- Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory -- Session 2: Network Security -- Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs -- Efficient Handling of Adversary Attacks in Aggregation Applications -- Symmetric Key Approaches to Securing BGP – A Little Bit Trust Is Enough -- Session 3: Smart Cards and Identity Management -- Dismantling MIFARE Classic -- A Browser-Based Kerberos Authentication Scheme -- CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud -- Session 4: Data and Applications Security -- Disclosure Analysis and Control in Statistical Databases -- TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead -- Access Control Friendly Query Verification for Outsourced Data Publishing -- Session 5: Privacy Enhancing Technologies -- Sharemind: A Framework for Fast Privacy-Preserving Computations -- Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms -- Remote Integrity Check with Dishonest Storage Server -- Session 6: Anonymity and RFID Privacy -- A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks -- RFID Privacy Models Revisited -- A New Formal Proof Model for RFID Location Privacy -- Session 7: Access Control and Trust Negotiation -- Distributed Authorization by Multiparty Trust Negotiation -- Compositional Refinement of Policies in UML – Exemplified for Access Control -- On the Security of Delegation in Access Control Systems -- Session 8: Information Flow and Non-transferability -- Termination-Insensitive Noninterference Leaks More Than Just a Bit -- Security Provisioning in Pervasive Environments Using Multi-objective Optimization -- Improved Security Notions and Protocols for Non-transferable Identification -- Session 9: Secure Electronic Voting and Web Applications Security -- Human Readable Paper Verification of Prêt à Voter -- A Distributed Implementation of the Certified Information Access Service -- Exploring User Reactions to New Browser Cues for Extended Validation Certificates -- A Framework for the Analysis of Mix-Based Steganographic File Systems -- Session 10: VoIP Security, Malware, and DRM -- An Adaptive Policy-Based Approach to SPIT Management -- Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? -- Eureka: A Framework for Enabling Static Malware Analysis -- New Considerations about the Correct Design of Turbo Fingerprinting Codes -- Session 11: Formal Models and Cryptographic Protocols -- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks -- Cryptographic Protocol Explication and End-Point Projection -- State Space Reduction in the Maude-NRL Protocol Analyzer -- Session 12: Language-Based and Hardware Security -- Code-Carrying Authorization -- CPU Bugs, CPU Backdoors and Consequences on Security.
Record Nr. UNINA-9910482961603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui