top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cryptology and Network Security [[electronic resource] ] : 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings / / edited by Juan A. Garay, Akira Otsuka
Cryptology and Network Security [[electronic resource] ] : 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings / / edited by Juan A. Garay, Akira Otsuka
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 538 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Number theory
Coding theory
Information theory
Mathematical logic
Computer science—Mathematics
Cryptology
Computer Communication Networks
Number Theory
Coding and Information Theory
Mathematical Logic and Formal Languages
Mathematics of Computing
Soggetto genere / forma Kanazawa (2009)
Kongress.
ISBN 3-642-10433-9
Classificazione DAT 461f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Protocol and Schemes I -- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima -- Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security -- On Cryptographic Schemes Based on Discrete Logarithms and Factoring -- Invited Talk 1 -- Asymptotically Optimal and Private Statistical Estimation -- Cryptanalysis I -- Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT -- Saturation Attack on the Block Cipher HIGHT -- Extensions of the Cube Attack Based on Low Degree Annihilators -- An Analysis of the Compact XSL Attack on BES and Embedded SMS4 -- Wireless and Sensor Network Security I -- RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks -- Anonymizer-Enabled Security and Privacy for RFID -- Blink ’Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes -- Network Security -- DepenDNS: Dependable Mechanism against DNS Cache Poisoning -- Privacy and Anonymity -- Privacy-Preserving Relationship Path Discovery in Social Networks -- Verifying Anonymous Credential Systems in Applied Pi Calculus -- Transferable Constant-Size Fair E-Cash -- Functional and Searchable Encryption -- A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle -- Private-Key Hidden Vector Encryption with Key Confidentiality -- Invited Talk 2 -- Building Secure Networked Systems with Code Attestation -- Authentication -- HPAKE : Password Authentication Secure against Cross-Site User Impersonation -- An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards -- Ensuring Authentication of Digital Information Using Cryptographic Accumulators -- Block Cipher Design -- MIBS: A New Lightweight Block Cipher -- Cryptanalysis II -- Distinguishing and Second-Preimage Attacks on CBC-Like MACs -- Improving the Rainbow Attack by Reusing Colours -- Side Channel Cube Attack on PRESENT -- Algebraic Attack on the MQQ Public Key Cryptosystem -- Algebraic and Number-Theoretic Schemes -- Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity -- Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves -- On the Complexity of Computing Discrete Logarithms over Algebraic Tori -- Wireless and Sensor Network Security II -- On the Usability of Secure Association of Wireless Devices Based on Distance Bounding -- Short Hash-Based Signatures for Wireless Sensor Networks -- Invited Talk 3 -- Computing on Encrypted Data -- Cryptographic Protocol and Schemes II -- Fully Robust Tree-Diffie-Hellman Group Key Exchange -- Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model -- Relinkable Ring Signature.
Record Nr. UNISA-996466365603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptology and Network Security : 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings / / edited by Juan A. Garay, Akira Otsuka
Cryptology and Network Security : 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings / / edited by Juan A. Garay, Akira Otsuka
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 538 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Number theory
Coding theory
Information theory
Mathematical logic
Computer science—Mathematics
Cryptology
Computer Communication Networks
Number Theory
Coding and Information Theory
Mathematical Logic and Formal Languages
Mathematics of Computing
Soggetto genere / forma Kanazawa (2009)
Kongress.
ISBN 3-642-10433-9
Classificazione DAT 461f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Protocol and Schemes I -- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima -- Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security -- On Cryptographic Schemes Based on Discrete Logarithms and Factoring -- Invited Talk 1 -- Asymptotically Optimal and Private Statistical Estimation -- Cryptanalysis I -- Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT -- Saturation Attack on the Block Cipher HIGHT -- Extensions of the Cube Attack Based on Low Degree Annihilators -- An Analysis of the Compact XSL Attack on BES and Embedded SMS4 -- Wireless and Sensor Network Security I -- RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks -- Anonymizer-Enabled Security and Privacy for RFID -- Blink ’Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes -- Network Security -- DepenDNS: Dependable Mechanism against DNS Cache Poisoning -- Privacy and Anonymity -- Privacy-Preserving Relationship Path Discovery in Social Networks -- Verifying Anonymous Credential Systems in Applied Pi Calculus -- Transferable Constant-Size Fair E-Cash -- Functional and Searchable Encryption -- A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle -- Private-Key Hidden Vector Encryption with Key Confidentiality -- Invited Talk 2 -- Building Secure Networked Systems with Code Attestation -- Authentication -- HPAKE : Password Authentication Secure against Cross-Site User Impersonation -- An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards -- Ensuring Authentication of Digital Information Using Cryptographic Accumulators -- Block Cipher Design -- MIBS: A New Lightweight Block Cipher -- Cryptanalysis II -- Distinguishing and Second-Preimage Attacks on CBC-Like MACs -- Improving the Rainbow Attack by Reusing Colours -- Side Channel Cube Attack on PRESENT -- Algebraic Attack on the MQQ Public Key Cryptosystem -- Algebraic and Number-Theoretic Schemes -- Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity -- Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves -- On the Complexity of Computing Discrete Logarithms over Algebraic Tori -- Wireless and Sensor Network Security II -- On the Usability of Secure Association of Wireless Devices Based on Distance Bounding -- Short Hash-Based Signatures for Wireless Sensor Networks -- Invited Talk 3 -- Computing on Encrypted Data -- Cryptographic Protocol and Schemes II -- Fully Robust Tree-Diffie-Hellman Group Key Exchange -- Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model -- Relinkable Ring Signature.
Record Nr. UNINA-9910482963603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptology and network security : 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedings / / Feng Bao [and three others] (editors)
Cryptology and network security : 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedings / / Feng Bao [and three others] (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Descrizione fisica 1 online resource (XII, 286 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer networks - Security measures
Cryptography
ISBN 3-540-76969-2
Classificazione DAT 461f
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Signatures -- Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles -- A Generic Construction for Universally-Convertible Undeniable Signatures -- Fast Digital Signature Algorithm Based on Subgraph Isomorphism -- Efficient ID-Based Digital Signatures with Message Recovery -- Network Security -- Achieving Mobility and Anonymity in IP-Based Networks -- Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary -- Forward-Secure Key Evolution in Wireless Sensor Networks -- A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations -- An Intelligent Network-Warning Model with Strong Survivability -- Running on Karma – P2P Reputation and Currency Systems -- Secure Keyword Search and Private Information Retrieval -- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption -- Extended Private Information Retrieval and Its Application in Biometrics Authentications -- Public Key Encryption -- Strongly Secure Certificateless Public Key Encryption Without Pairing -- Intrusion Detection -- Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems -- Email Security -- How to Secure Your Email Address Book and Beyond -- Denial of Service Attacks -- Toward Non-parallelizable Client Puzzles -- Authentication -- Anonymity 2.0 – X.509 Extensions Supporting Privacy-Friendly Authentication.
Record Nr. UNINA-9910483850803321
Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptology and network security : 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedings / / Feng Bao [and three others] (editors)
Cryptology and network security : 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedings / / Feng Bao [and three others] (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Descrizione fisica 1 online resource (XII, 286 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer networks - Security measures
Cryptography
ISBN 3-540-76969-2
Classificazione DAT 461f
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Signatures -- Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles -- A Generic Construction for Universally-Convertible Undeniable Signatures -- Fast Digital Signature Algorithm Based on Subgraph Isomorphism -- Efficient ID-Based Digital Signatures with Message Recovery -- Network Security -- Achieving Mobility and Anonymity in IP-Based Networks -- Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary -- Forward-Secure Key Evolution in Wireless Sensor Networks -- A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations -- An Intelligent Network-Warning Model with Strong Survivability -- Running on Karma – P2P Reputation and Currency Systems -- Secure Keyword Search and Private Information Retrieval -- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption -- Extended Private Information Retrieval and Its Application in Biometrics Authentications -- Public Key Encryption -- Strongly Secure Certificateless Public Key Encryption Without Pairing -- Intrusion Detection -- Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems -- Email Security -- How to Secure Your Email Address Book and Beyond -- Denial of Service Attacks -- Toward Non-parallelizable Client Puzzles -- Authentication -- Anonymity 2.0 – X.509 Extensions Supporting Privacy-Friendly Authentication.
Record Nr. UNISA-996465828003316
Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Identity and Privacy in the Internet Age [[electronic resource] ] : 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings / / edited by Audun Jøsang, Torleiv Maseng, Svein J. Knapskog
Identity and Privacy in the Internet Age [[electronic resource] ] : 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings / / edited by Audun Jøsang, Torleiv Maseng, Svein J. Knapskog
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 303 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Application software
Information storage and retrieval
Coding theory
Information theory
Computer security
Data structures (Computer science)
Data encryption (Computer science)
Computer Applications
Information Storage and Retrieval
Coding and Information Theory
Systems and Data Security
Data Structures and Information Theory
Cryptology
Soggetto genere / forma Kongress.
Oslo (2009)
ISBN 3-642-04766-1
Classificazione DAT 461f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1: Anonymity and Privacy -- On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market -- Facilitating the Adoption of Tor by Focusing on a Promising Target Group -- A Parallelism-Based Approach to Network Anonymization -- Security Usability of Petname Systems -- Session 2: Modelling and Design -- An Analysis of Widget Security -- Trade-Offs in Cryptographic Implementations of Temporal Access Control -- Blunting Differential Attacks on PIN Processing APIs -- Session 3: Network Layer Security -- Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic -- An Improved Attack on TKIP -- Session 4: Security for Mobile Users -- ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System -- A Mechanism for Identity Delegation at Authentication Level -- Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services -- Towards True Random Number Generation in Mobile Environments -- Session 5: Embedded Systems and Mechanisms -- Towards Modelling Information Security with Key-Challenge Petri Nets -- Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011 -- Advanced SIM Capabilities Supporting Trust-Based Applications -- Towards Practical Enforcement Theories -- Session 6: Protocols and Protocol Analysis -- Security Analysis of AN.ON’s Payment Scheme -- Formal Analysis of the Estonian Mobile-ID Protocol -- Generating In-Line Monitors for Rabin Automata.
Record Nr. UNISA-996465313803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Identity and Privacy in the Internet Age : 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings / / edited by Audun Jøsang, Torleiv Maseng, Svein J. Knapskog
Identity and Privacy in the Internet Age : 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings / / edited by Audun Jøsang, Torleiv Maseng, Svein J. Knapskog
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 303 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Application software
Information storage and retrieval
Coding theory
Information theory
Computer security
Data structures (Computer science)
Data encryption (Computer science)
Computer Applications
Information Storage and Retrieval
Coding and Information Theory
Systems and Data Security
Data Structures and Information Theory
Cryptology
Soggetto genere / forma Kongress.
Oslo (2009)
ISBN 3-642-04766-1
Classificazione DAT 461f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1: Anonymity and Privacy -- On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market -- Facilitating the Adoption of Tor by Focusing on a Promising Target Group -- A Parallelism-Based Approach to Network Anonymization -- Security Usability of Petname Systems -- Session 2: Modelling and Design -- An Analysis of Widget Security -- Trade-Offs in Cryptographic Implementations of Temporal Access Control -- Blunting Differential Attacks on PIN Processing APIs -- Session 3: Network Layer Security -- Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic -- An Improved Attack on TKIP -- Session 4: Security for Mobile Users -- ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System -- A Mechanism for Identity Delegation at Authentication Level -- Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services -- Towards True Random Number Generation in Mobile Environments -- Session 5: Embedded Systems and Mechanisms -- Towards Modelling Information Security with Key-Challenge Petri Nets -- Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011 -- Advanced SIM Capabilities Supporting Trust-Based Applications -- Towards Practical Enforcement Theories -- Session 6: Protocols and Protocol Analysis -- Security Analysis of AN.ON’s Payment Scheme -- Formal Analysis of the Estonian Mobile-ID Protocol -- Generating In-Line Monitors for Rabin Automata.
Record Nr. UNINA-9910484137203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 11th International Conference, ICICS 2009 / / edited by Sihan Qing, Chris J. Mitchell, Guilin Wang
Information and Communications Security [[electronic resource] ] : 11th International Conference, ICICS 2009 / / edited by Sihan Qing, Chris J. Mitchell, Guilin Wang
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 504 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer programming
Data structures (Computer science)
Coding theory
Information theory
Computer security
Cryptology
Computer Communication Networks
Programming Techniques
Data Structures and Information Theory
Coding and Information Theory
Systems and Data Security
Soggetto genere / forma Conference proceedings.
Kongress.
Peking (2009)
ISBN 1-280-38340-2
9786613561329
3-642-11145-9
Classificazione DAT 461f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- How to Steal a Botnet and What Can Happen When You Do -- A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing -- Cryptanalysis -- Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform -- Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher -- Algorithms and Implementations -- The rakaposhi Stream Cipher -- Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes -- Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems -- Public Key Cryptography -- Online/Offline Ring Signature Scheme -- Policy-Controlled Signatures -- Public Key Encryption without Random Oracle Made Truly Practical -- A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate -- Security Applications -- Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks -- Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains -- Biometric-Based Non-transferable Anonymous Credentials -- Software Security -- Secure Remote Execution of Sequential Computations -- Architecture- and OS-Independent Binary-Level Dynamic Test Generation -- System Security -- Measuring Information Flow in Reactive Processes -- Trusted Isolation Environment: An Attestation Architecture with Usage Control Model -- Denial-of-Service Attacks on Host-Based Generic Unpackers -- Network Security -- Predictive Pattern Matching for Scalable Network Intrusion Detection -- Deterministic Finite Automata Characterization for Memory-Based Pattern Matching -- A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold -- User-Assisted Host-Based Detection of Outbound Malware Traffic -- Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence -- Short Papers I -- Using the (Open) Solaris Service Management Facility as a Building Block for System Security -- IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program -- A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper] -- Database Security -- Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining -- GUC-Secure Join Operator in Distributed Relational Database -- Trust Management -- TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics -- Bring Efficient Connotation Expressible Policies to Trust Management -- A User Trust-Based Collaborative Filtering Recommendation Algorithm -- Applied Cryptography -- Fingerprinting Attack on the Tor Anonymity System -- Proactive Verifiable Linear Integer Secret Sharing Scheme -- A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach -- Digital Audio Watermarking Technique Using Pseudo-Zernike Moments -- Short Papers II -- An Image Sanitizing Scheme Using Digital Watermarking -- Adaptive and Composable Oblivious Transfer Protocols (Short Paper) -- Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Record Nr. UNISA-996465509603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security : 11th International Conference, ICICS 2009 / / edited by Sihan Qing, Chris J. Mitchell, Guilin Wang
Information and Communications Security : 11th International Conference, ICICS 2009 / / edited by Sihan Qing, Chris J. Mitchell, Guilin Wang
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 504 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer programming
Data structures (Computer science)
Coding theory
Information theory
Computer security
Cryptology
Computer Communication Networks
Programming Techniques
Data Structures and Information Theory
Coding and Information Theory
Systems and Data Security
Soggetto genere / forma Conference proceedings.
Kongress.
Peking (2009)
ISBN 1-280-38340-2
9786613561329
3-642-11145-9
Classificazione DAT 461f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- How to Steal a Botnet and What Can Happen When You Do -- A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing -- Cryptanalysis -- Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform -- Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher -- Algorithms and Implementations -- The rakaposhi Stream Cipher -- Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes -- Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems -- Public Key Cryptography -- Online/Offline Ring Signature Scheme -- Policy-Controlled Signatures -- Public Key Encryption without Random Oracle Made Truly Practical -- A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate -- Security Applications -- Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks -- Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains -- Biometric-Based Non-transferable Anonymous Credentials -- Software Security -- Secure Remote Execution of Sequential Computations -- Architecture- and OS-Independent Binary-Level Dynamic Test Generation -- System Security -- Measuring Information Flow in Reactive Processes -- Trusted Isolation Environment: An Attestation Architecture with Usage Control Model -- Denial-of-Service Attacks on Host-Based Generic Unpackers -- Network Security -- Predictive Pattern Matching for Scalable Network Intrusion Detection -- Deterministic Finite Automata Characterization for Memory-Based Pattern Matching -- A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold -- User-Assisted Host-Based Detection of Outbound Malware Traffic -- Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence -- Short Papers I -- Using the (Open) Solaris Service Management Facility as a Building Block for System Security -- IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program -- A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper] -- Database Security -- Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining -- GUC-Secure Join Operator in Distributed Relational Database -- Trust Management -- TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics -- Bring Efficient Connotation Expressible Policies to Trust Management -- A User Trust-Based Collaborative Filtering Recommendation Algorithm -- Applied Cryptography -- Fingerprinting Attack on the Tor Anonymity System -- Proactive Verifiable Linear Integer Secret Sharing Scheme -- A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach -- Digital Audio Watermarking Technique Using Pseudo-Zernike Moments -- Short Papers II -- An Image Sanitizing Scheme Using Digital Watermarking -- Adaptive and Composable Oblivious Transfer Protocols (Short Paper) -- Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Record Nr. UNINA-9910483214003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
Information Systems Security [[electronic resource] ] : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XV, 388 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Computer security
Application software
Information storage and retrieval
Management information systems
Computer science
Data encryption (Computer science)
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Management of Computing and Information Systems
Cryptology
ISBN 3-642-25560-4
Classificazione 004
DAT 461f
DAT 959f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465923403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings / / edited by Atul Prakash
Information Systems Security [[electronic resource] ] : 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings / / edited by Atul Prakash
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XV, 327 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Computer security
Information storage and retrieval
Management information systems
Computer science
Biometrics (Biology)
Computer Communication Networks
Cryptology
Systems and Data Security
Information Storage and Retrieval
Management of Computing and Information Systems
Biometrics
Soggetto genere / forma Kalkutta (2009)
Kongress.
ISBN 3-642-10772-9
Classificazione DAT 460f
DAT 461f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Talks -- A Survey of Voice over IP Security Research -- Security for a Smarter Planet -- The WOMBAT Attack Attribution Method: Some Results -- Biometrics and Security -- Authentication -- Remote Electronic Voting with Revocable Anonymity -- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals -- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup -- Verification -- Biometric Identification over Encrypted Data Made Feasible -- Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity -- Formal Verification of Security Policy Implementations in Enterprise Networks -- Systems Security -- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles -- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products -- DROP: Detecting Return-Oriented Programming Malicious Code -- Behavior Analysis -- A Framework for Behavior-Based Malware Analysis in the Cloud -- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs -- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders -- Database Security -- Database Relation Watermarking Resilient against Secondary Watermarking Attacks -- A Robust Damage Assessment Model for Corrupted Database Systems -- A Generic Distortion Free Watermarking Technique for Relational Databases -- Cryptography -- On Some Weaknesses in the Disk Encryption Schemes EME and EME2 -- TWIS – A Lightweight Block Cipher -- Short Papers -- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking -- Method-Specific Java Access Control via RMI Proxy Objects Using Annotations -- Let Only the Right One IN: Privacy Management Scheme for Social Network -- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).
Record Nr. UNISA-996466310903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui