top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Safety, Reliability, and Security [[electronic resource] ] : 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings / / edited by Bettina Buth, Gerd Rabe, Till Seyfarth
Computer Safety, Reliability, and Security [[electronic resource] ] : 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings / / edited by Bettina Buth, Gerd Rabe, Till Seyfarth
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 343 p.)
Disciplina 004n/a
Collana Programming and Software Engineering
Soggetto topico Computer security
Computer communication systems
Software engineering
Computers
Special purpose computers
Systems and Data Security
Computer Communication Networks
Software Engineering/Programming and Operating Systems
Information Systems and Communication Service
Software Engineering
Special Purpose and Application-Based Systems
Soggetto genere / forma Hamburg (2009)
Kongress.
ISBN 3-642-04468-9
Classificazione DAT 050f
DAT 260f
DAT 343f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- A Domain-Specific Framework for Automated Construction and Verification of Railway Control Systems -- Medical Systems -- Model-Based Development of Medical Devices -- Why Are People’s Decisions Sometimes Worse with Computer Support? -- Industrial Experience -- Safety-Related Application Conditions – A Balance between Safety Relevance and Handicaps for Applications -- Probability of Failure on Demand – The Why and the How -- Establishing the Correlation between Complexity and a Reliability Metric for Software Digital I&C-Systems -- Security Risk Analysis -- Exploring Network Security in PROFIsafe -- Modelling Critical Infrastructures in Presence of Lack of Data with Simulated Annealing – Like Algorithms -- Environment Characterization and System Modeling Approach for the Quantitative Evaluation of Security -- Safety Guidelines -- Experiences with the Certification of a Generic Functional Safety Management Structure According to IEC 61508 -- Analysing Dependability Case Arguments Using Quality Models -- Experience with Establishment of Reusable and Certifiable Safety Lifecycle Model within ABB -- Automotive -- Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats -- Safety Requirements for a Cooperative Traffic Management System: The Human Interface Perspective -- Aerospace -- The COMPASS Approach: Correctness, Modelling and Performability of Aerospace Systems -- Formal Verification of a Microkernel Used in Dependable Software Systems -- Issues in Tool Qualification for Safety-Critical Hardware: What Formal Approaches Can and Cannot Do -- Verification, Validation, Test -- Probabilistic Failure Propagation and Transformation Analysis -- Towards Model-Based Automatic Testing of Attack Scenarios -- CRIOP: A Human Factors Verification and Validation Methodology That Works in an Industrial Setting -- Fault Tolerance -- Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure -- Increasing the Reliability of High Redundancy Actuators by Using Elements in Series and Parallel -- AN-Encoding Compiler: Building Safety-Critical Systems with Commodity Hardware -- Dependability -- Component-Based Abstraction in Fault Tree Analysis -- A Foundation for Requirements Analysis of Dependable Software -- Establishing a Framework for Dynamic Risk Management in ‘Intelligent’ Aero-Engine Control.
Record Nr. UNISA-996465672203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Safety, Reliability, and Security : 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings / / edited by Bettina Buth, Gerd Rabe, Till Seyfarth
Computer Safety, Reliability, and Security : 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings / / edited by Bettina Buth, Gerd Rabe, Till Seyfarth
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 343 p.)
Disciplina 004n/a
Altri autori (Persone) ButhBettina
RabeGerd
SeyfarthTill
Collana Programming and Software Engineering
Soggetto topico Data protection
Computer networks
Software engineering
Computers, Special purpose
Data and Information Security
Computer Communication Networks
Software Engineering
Special Purpose and Application-Based Systems
ISBN 3-642-04468-9
Classificazione DAT 050f
DAT 260f
DAT 343f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- A Domain-Specific Framework for Automated Construction and Verification of Railway Control Systems -- Medical Systems -- Model-Based Development of Medical Devices -- Why Are People’s Decisions Sometimes Worse with Computer Support? -- Industrial Experience -- Safety-Related Application Conditions – A Balance between Safety Relevance and Handicaps for Applications -- Probability of Failure on Demand – The Why and the How -- Establishing the Correlation between Complexity and a Reliability Metric for Software Digital I&C-Systems -- Security Risk Analysis -- Exploring Network Security in PROFIsafe -- Modelling Critical Infrastructures in Presence of Lack of Data with Simulated Annealing – Like Algorithms -- Environment Characterization and System Modeling Approach for the Quantitative Evaluation of Security -- Safety Guidelines -- Experiences with the Certification of a Generic Functional Safety Management Structure According to IEC 61508 -- Analysing Dependability Case Arguments Using Quality Models -- Experience with Establishment of Reusable and Certifiable Safety Lifecycle Model within ABB -- Automotive -- Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats -- Safety Requirements for a Cooperative Traffic Management System: The Human Interface Perspective -- Aerospace -- The COMPASS Approach: Correctness, Modelling and Performability of Aerospace Systems -- Formal Verification of a Microkernel Used in Dependable Software Systems -- Issues in Tool Qualification for Safety-Critical Hardware: What Formal Approaches Can and Cannot Do -- Verification, Validation, Test -- Probabilistic Failure Propagation and Transformation Analysis -- Towards Model-Based Automatic Testing of Attack Scenarios -- CRIOP: A HumanFactors Verification and Validation Methodology That Works in an Industrial Setting -- Fault Tolerance -- Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure -- Increasing the Reliability of High Redundancy Actuators by Using Elements in Series and Parallel -- AN-Encoding Compiler: Building Safety-Critical Systems with Commodity Hardware -- Dependability -- Component-Based Abstraction in Fault Tree Analysis -- A Foundation for Requirements Analysis of Dependable Software -- Establishing a Framework for Dynamic Risk Management in ‘Intelligent’ Aero-Engine Control.
Record Nr. UNINA-9910484216803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Watermarking [[electronic resource] ] : 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings / / edited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni
Digital Watermarking [[electronic resource] ] : 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings / / edited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 337 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Coding theory
Information theory
Information storage and retrieval
Computer graphics
Optical data processing
Cryptology
Data Structures and Information Theory
Coding and Information Theory
Information Storage and Retrieval
Computer Graphics
Image Processing and Computer Vision
Soggetto genere / forma Guildford (2009)
Kongress.
ISBN 3-642-03688-0
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lectures (Abstracts) -- Data Hiding and the Statistics of Images -- The Changing Face of Cryptography -- Forensic Techniques for Image Source Classification: A Comparative Study -- Session I: Robust Watermarking -- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model -- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques -- Robust AVS Audio Watermarking -- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks -- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks -- Session II: Video Watermarking -- A Robust Watermarking for MPEG-2 -- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping -- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video -- Session III: Poster Session -- Fast Embedding Technique for Dirty Paper Trellis Watermarking -- A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual Cryptography -- High Capacity Data Hiding in Binary Document Images -- Session IV: Steganography and Steganalysis -- Hiding Information by Context-Based Synonym Substitution -- A Statistical and Iterative Method for Data Hiding in Palette-Based Images -- Estimating the Information Theoretic Optimal Stego Noise -- Multi-class Blind Steganalysis Based on Image Run-Length Analysis -- Session V: Multimedia Watermarking and Security Protocols -- Local Patch Blind Spectral Watermarking Method for 3D Graphics -- Reading Watermarks from Printed Binary Images with a Camera Phone -- A New Approach in Reversible Watermarking -- Classification Framework for Fair Content Tracing Protocols -- Session VI: Image Forensics and Authentication -- Fragile Watermarking Scheme with Extensive Content Restoration Capability -- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking -- Camera-Model Identification Using Markovian Transition Probability Matrix -- A Survey of Passive Image Tampering Detection -- An Enhanced Statistical Approach to Identifying Photorealistic Images.
Record Nr. UNISA-996465561103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital Watermarking : 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings / / edited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni
Digital Watermarking : 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009, Proceedings / / edited by Anthony T. S. Ho, Yun Q. Shi, Hyoung-Joong Kim, Mauro Barni
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 337 p.)
Disciplina 005.8
Altri autori (Persone) HoAnthony Tung-Shuen
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Data structures (Computer science)
Information theory
Coding theory
Information storage and retrieval systems
Computer graphics
Computer vision
Cryptology
Data Structures and Information Theory
Coding and Information Theory
Information Storage and Retrieval
Computer Graphics
Computer Vision
ISBN 3-642-03688-0
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lectures (Abstracts) -- Data Hiding and the Statistics of Images -- The Changing Face of Cryptography -- Forensic Techniques for Image Source Classification: A Comparative Study -- Session I: Robust Watermarking -- Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model -- Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques -- Robust AVS Audio Watermarking -- Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks -- Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks -- Session II: Video Watermarking -- A Robust Watermarking for MPEG-2 -- Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping -- Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video -- Session III: Poster Session -- Fast Embedding Technique for Dirty Paper Trellis Watermarking -- A Homomorphic Method for Sharing Secret Images -- Dot-Size Variant Visual Cryptography -- High Capacity Data Hiding in Binary Document Images -- Session IV: Steganography and Steganalysis -- Hiding Information by Context-Based Synonym Substitution -- A Statistical and Iterative Method for Data Hiding in Palette-Based Images -- Estimating the Information Theoretic Optimal Stego Noise -- Multi-class Blind Steganalysis Based on Image Run-Length Analysis -- Session V: Multimedia Watermarking and Security Protocols -- Local Patch Blind Spectral Watermarking Method for 3D Graphics -- Reading Watermarks from Printed Binary Images with a Camera Phone -- A New Approach in Reversible Watermarking -- Classification Framework for Fair Content Tracing Protocols -- Session VI: Image Forensics and Authentication -- Fragile Watermarking Scheme with Extensive Content Restoration Capability -- Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking -- Camera-Model Identification Using Markovian Transition Probability Matrix -- A Survey of Passive Image Tampering Detection -- An Enhanced Statistical Approach to Identifying Photorealistic Images.
Record Nr. UNINA-9910484839803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Digital watermarking : 6th international workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007 : proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2008]
Descrizione fisica 1 online resource (XII, 484 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Digital watermarking
ISBN 3-540-92238-5
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lecture -- Watermarking, a Mature Technology – Retrospect and Prospect -- The Marriage of Cryptography and Watermarking — Beneficial and Challenging for Secure Watermarking and Detection -- Detecting Photographic Composites of People -- Session I: Watermark Security -- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005 -- Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme -- Multiple Watermarking in Visual Cryptography -- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding -- Session II: Steganalysis -- Fusion Based Blind Image Steganalysis by Boosting Feature Selection -- Steganalysis of Multi Bit Plane Image Steganography -- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis -- Weaknesses of MB2 -- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis -- Steganalysis Versus Splicing Detection -- Session III: Authentication -- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning -- A General Data Hiding Framework and Multi-level Signature for Binary Images -- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents -- Session IV: Reversible Data Hiding -- Reversible Quantization-Index Modulation Using Neighboring Correlation -- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain -- Reversible Data Hiding Using Prediction Error Values Embedding -- An Improved Reversible Difference Expansion Watermarking Algorithm -- Optimum Histogram Pair Based Image Lossless Data Embedding -- Session V: Robust Watermarking -- Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding -- GA-Based Robustness Evaluation Method for Digital Image Watermarking -- Dither Modulation in the Logarithmic Domain -- Session VI: Poster Session -- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack -- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption -- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking -- Watermarking for Authentication of LZ-77 Compressed Documents -- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation -- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images -- Session VII: Theory and Methods in Watermarking -- On the Complexity of Obtaining Optimal Watermarking Schemes -- A Theoretical Framework for Watermarking of Compressed Signals -- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model -- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking -- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality -- A High Payload VQ Steganographic Method for Binary Images.
Record Nr. UNISA-996465399003316
Berlin, Germany : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital Watermarking : 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Digital Watermarking : 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings / / edited by Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XII, 484 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer programming
Data structures (Computer science)
Information theory
Coding theory
Computer graphics
Image processing - Digital techniques
Computer vision
Cryptology
Programming Techniques
Data Structures and Information Theory
Coding and Information Theory
Computer Graphics
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-540-92238-5
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lecture -- Watermarking, a Mature Technology – Retrospect and Prospect -- The Marriage of Cryptography and Watermarking — Beneficial and Challenging for Secure Watermarking and Detection -- Detecting Photographic Composites of People -- Session I: Watermark Security -- (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005 -- Attack Analysis for He & Wu’s Joint Watermarking/Fingerprinting Scheme -- Multiple Watermarking in Visual Cryptography -- Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding -- Session II: Steganalysis -- Fusion Based Blind Image Steganalysis by Boosting Feature Selection -- Steganalysis of Multi Bit Plane Image Steganography -- Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis -- Weaknesses of MB2 -- Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis -- Steganalysis Versus Splicing Detection -- Session III: Authentication -- Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning -- A General Data Hiding Framework and Multi-level Signature for Binary Images -- High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents -- Session IV: Reversible Data Hiding -- Reversible Quantization-Index Modulation Using Neighboring Correlation -- High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain -- Reversible Data Hiding Using Prediction Error Values Embedding -- An Improved Reversible Difference Expansion Watermarking Algorithm -- Optimum Histogram Pair Based Image Lossless Data Embedding -- Session V: Robust Watermarking -- Multiple Domain Watermarking for Print-Scanand JPEG Resilient Data Hiding -- GA-Based Robustness Evaluation Method for Digital Image Watermarking -- Dither Modulation in the Logarithmic Domain -- Session VI: Poster Session -- A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack -- Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption -- Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking -- Watermarking for Authentication of LZ-77 Compressed Documents -- Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation -- A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images -- Session VII: Theory and Methods in Watermarking -- On the Complexity of Obtaining Optimal Watermarking Schemes -- A Theoretical Framework for Watermarking of Compressed Signals -- Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model -- Multiple Scrambling and Adaptive Synchronization for Audio Watermarking -- A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality -- A High Payload VQ Steganographic Method for Binary Images.
Record Nr. UNINA-9910484691103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations of security analysis and design IV : FOSAD 2006/2007 tutorial lectures / / Alessandro Aldini, Roberto Gorrieri (eds.)
Foundations of security analysis and design IV : FOSAD 2006/2007 tutorial lectures / / Alessandro Aldini, Roberto Gorrieri (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, : Springer, c2007
Descrizione fisica 1 online resource (VIII, 339 p.)
Disciplina 005.8
Altri autori (Persone) AldiniAlessandro
GorrieriRoberto
Collana Lecture notes in computer science,Tutorial
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-280-38325-9
9786613561176
3-642-03829-8
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foundations of Security Analysis and Design -- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties -- An Introduction to Certificate Translation -- Federated Identity Management -- Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment -- Logic in Access Control (Tutorial Notes) -- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols -- Verification of Concurrent Programs with Chalice -- Certified Static Analysis by Abstract Interpretation -- Resource Usage Analysis and Its Application to Resource Certification -- Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks.
Altri titoli varianti Foundations of security analysis and design 4
Foundations of security analysis and design four
FOSAD 2006/2007 tutorial lectures
Record Nr. UNINA-9910484938903321
Berlin, : Springer, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations of Security Analysis and Design V [[electronic resource] ] : FOSAD 2008/2009 Tutorial Lectures / / edited by Alessandro Aldini, Gilles Barthe, Roberto Gorrieri
Foundations of Security Analysis and Design V [[electronic resource] ] : FOSAD 2008/2009 Tutorial Lectures / / edited by Alessandro Aldini, Gilles Barthe, Roberto Gorrieri
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (VIII, 339 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Computer logic
Programming languages (Electronic computers)
Systems and Data Security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Logics and Meanings of Programs
Programming Languages, Compilers, Interpreters
Soggetto genere / forma Aufsatzsammlung
ISBN 1-280-38325-9
9786613561176
3-642-03829-8
Classificazione DAT 050f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foundations of Security Analysis and Design -- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties -- An Introduction to Certificate Translation -- Federated Identity Management -- Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment -- Logic in Access Control (Tutorial Notes) -- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols -- Verification of Concurrent Programs with Chalice -- Certified Static Analysis by Abstract Interpretation -- Resource Usage Analysis and Its Application to Resource Certification -- Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks.
Record Nr. UNISA-996465299103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 508 p.)
Disciplina 005.822gerDNB
Collana Security and Cryptology
Soggetto topico Computer science—Mathematics
Computer programming
Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Mathematics of Computing
Programming Techniques
Cryptology
Data and Information Security
Mathematical Applications in Computer Science
ISBN 3-642-04474-3
Classificazione DAT 050f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis Techniques -- A New Approach to ? 2 Cryptanalysis of Block Ciphers -- Analysis and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol -- Towards Security Notions for White-Box Cryptography -- A Calculus to Detect Guessing Attacks -- Hash Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database Security and Biometrics -- Detection of Database Intrusion Using a Two-Stage Fuzzy System -- Combining Consistency and Confidentiality Requirements in First-Order Databases -- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping -- Iris Recognition in Nonideal Situations -- Algebraic Attacks and Proxy Re-Encryption -- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security -- Practical Algebraic Attacks on the Hitag2 Stream Cipher -- A New Construction of Boolean Functions with Maximum Algebraic Immunity -- Distributed System Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A Priori Bound on the Coalition Size -- SISR – A New Model for Epidemic Spreading of Electronic Threats -- Identity Management and Authentication -- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement -- Robust Authentication Using Physically Unclonable Functions -- Risks of the CardSpace Protocol -- Applied Cryptography -- Fair E-Cash: Be Compact, Spend Faster -- On the Security of Identity Based Ring Signcryption Schemes -- A Storage Efficient Redactable Signature in the Standard Model -- Generic Construction of Stateful Identity Based Encryption -- Access Control -- Privacy-Aware Attribute-Based Encryption with User Accountability -- Hardware-Assisted Application-Level Access Control -- Towards Trustworthy Delegation in Role-Based Access Control Model -- Secure Interoperation in Multidomain Environments Employing UCON Policies -- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control -- MAC and Nonces -- Nonce Generators and the Nonce Reset Problem -- MAC Precomputation with Applications to Secure Memory -- HMAC without the “Second” Key -- P2P and Web Services -- Adding Trust to P2P Distribution of Paid Content -- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.
Record Nr. UNISA-996465314903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Information Security : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 508 p.)
Disciplina 005.822gerDNB
Altri autori (Persone) SamaratiPierangela
ArdagnaClaudio A
MartinelliFabio
YungMoti
Collana Security and Cryptology
Soggetto topico Computer science - Mathematics
Computer programming
Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Mathematics of Computing
Programming Techniques
Cryptology
Data and Information Security
Mathematical Applications in Computer Science
ISBN 3-642-04474-3
Classificazione DAT 050f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis Techniques -- A New Approach to ? 2 Cryptanalysis of Block Ciphers -- Analysis and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol -- Towards Security Notions for White-Box Cryptography -- A Calculus to Detect Guessing Attacks -- Hash Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database Security and Biometrics -- Detection of Database Intrusion Using a Two-Stage Fuzzy System -- Combining Consistency and Confidentiality Requirements in First-Order Databases -- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping -- Iris Recognition in Nonideal Situations -- Algebraic Attacks and Proxy Re-Encryption -- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security -- Practical Algebraic Attacks on the Hitag2 Stream Cipher -- A New Construction of Boolean Functions with Maximum Algebraic Immunity -- Distributed System Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A Priori Bound on the Coalition Size -- SISR – A New Model for Epidemic Spreading of Electronic Threats -- Identity Management and Authentication -- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement -- Robust Authentication Using Physically Unclonable Functions -- Risks of the CardSpace Protocol -- Applied Cryptography -- Fair E-Cash: Be Compact, Spend Faster -- On the Security of Identity Based Ring Signcryption Schemes -- A Storage Efficient Redactable Signature inthe Standard Model -- Generic Construction of Stateful Identity Based Encryption -- Access Control -- Privacy-Aware Attribute-Based Encryption with User Accountability -- Hardware-Assisted Application-Level Access Control -- Towards Trustworthy Delegation in Role-Based Access Control Model -- Secure Interoperation in Multidomain Environments Employing UCON Policies -- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control -- MAC and Nonces -- Nonce Generators and the Nonce Reset Problem -- MAC Precomputation with Applications to Secure Memory -- HMAC without the “Second” Key -- P2P and Web Services -- Adding Trust to P2P Distribution of Paid Content -- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.
Record Nr. UNINA-9910484216603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui