top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2007 IEEE Information Assurance Workshop : West Point, NY, 20-22 June 2007
2007 IEEE Information Assurance Workshop : West Point, NY, 20-22 June 2007
Pubbl/distr/stampa IEEE
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Computer networks - Access control
ISBN 1-5090-8611-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2007 IEEE SMC Information Assurance and Security Workshop
Record Nr. UNISA-996201888603316
IEEE
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2007 IEEE Information Assurance Workshop : West Point, NY, 20-22 June 2007
2007 IEEE Information Assurance Workshop : West Point, NY, 20-22 June 2007
Pubbl/distr/stampa IEEE
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Computer networks - Access control
ISBN 9781509086115
1509086110
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2007 IEEE SMC Information Assurance and Security Workshop
Record Nr. UNINA-9910143009203321
IEEE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2011 European Intelligence and Security Informatics Conference
2011 European Intelligence and Security Informatics Conference
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 2011
Descrizione fisica 1 online resource
Disciplina 004.6
Soggetto topico Computer networks - Access control
ISBN 9780769544069
0769544061
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910141208703321
[Place of publication not identified], : IEEE, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN) / / Institute of Electrical and Electronics Engineers
2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN) / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, NJ : , : IEEE, , 2017
Descrizione fisica 1 online resource
Disciplina 004.6
Soggetto topico Computer networks
Computer networks - Access control
ISBN 1-5090-3672-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2017 20th Conference on Innovations in Clouds, Internet and Networks
Record Nr. UNISA-996280472203316
Piscataway, NJ : , : IEEE, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN) / / Institute of Electrical and Electronics Engineers
2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN) / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, NJ : , : IEEE, , 2017
Descrizione fisica 1 online resource
Disciplina 004.6
Soggetto topico Computer networks
Computer networks - Access control
ISBN 1-5090-3672-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2017 20th Conference on Innovations in Clouds, Internet and Networks
Record Nr. UNINA-9910209349103321
Piscataway, NJ : , : IEEE, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ABAC '16 : proceedings of the 2016 ACM International Workshop on Attribute Based Access Control : March 11, 2016, New Orleans, LA, USA / / sponsored by ACM SIGSAC
ABAC '16 : proceedings of the 2016 ACM International Workshop on Attribute Based Access Control : March 11, 2016, New Orleans, LA, USA / / sponsored by ACM SIGSAC
Pubbl/distr/stampa New York : , : ACM, , 2016
Descrizione fisica 1 online resource (76 pages)
Disciplina 005.3
Soggetto topico Application software
Data protection
Computer networks - Access control
ISBN 1-4503-4079-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Attribute Based Access Control 2016 : proceedings of the 2016 Association for Computing Machinery International Workshop on Attribute Based Access Control : March 11, 2016, New Orleans, LA, USA
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control
Proceedings of the 2016 Association for Computing Machinery International Workshop on Attribute Based Access Control
CODASPY '16 : sixth ACM Conference on Data and Application Security and Privacy : New Orleans, LA, USA, March 09-11, 2016
Conference on Data and Application Security and Privacy 2016 : sixth ACM Conference on Data and Application Security and Privacy : New Orleans, LA, USA, March 09-11, 2016
Record Nr. UNINA-9910376554303321
New York : , : ACM, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in biometrics : international conference, ICB 2007, Seoul, Korea, August 27-29, 2007 ; proceedings / / Seong-Whan Lee, Stan Z. Li (eds.)
Advances in biometrics : international conference, ICB 2007, Seoul, Korea, August 27-29, 2007 ; proceedings / / Seong-Whan Lee, Stan Z. Li (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, 2007
Descrizione fisica 1 online resource (XLII, 1302 p.)
Disciplina 006.4
Altri autori (Persone) LeeS.-W (Seong-whan)
LiS. Z. <1958->
Collana Lecture notes in computer science
Soggetto topico Biometric identification
Identification - Automation
Pattern recognition systems
Computer networks - Access control
ISBN 3-642-01793-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Face -- Speech -- Fingerprint and Palmprint -- Biometric Competitions -- Multibiometrics and Security -- Gait -- Iris -- Other Biometrics.
Altri titoli varianti ICB 2007
Record Nr. UNINA-9910484530703321
Berlin ; ; New York, : Springer, 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in biometrics : International Conference, ICB 2006, Hong Kong, China, January 5-7, 2006 : proceedings / / David Zhang, Anil K. Jain (eds.)
Advances in biometrics : International Conference, ICB 2006, Hong Kong, China, January 5-7, 2006 : proceedings / / David Zhang, Anil K. Jain (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, : Springer, 2006
Descrizione fisica 1 online resource (XX, 798 p.)
Disciplina 006.4
Altri autori (Persone) ZhangDavid <1949->
JainAnil K. <1948->
Collana Lecture notes in computer science
Soggetto topico Biometric identification
Identification - Automation
Pattern recognition systems
Computer networks - Access control
ISBN 3-540-31621-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Face Verification Contest 2006 -- Face -- Fingerprint -- Iris -- Speech and Signature -- Biometric Fusion and Performance Evaluation -- Gait and Keystroke -- Others.
Altri titoli varianti ICB 2006
Record Nr. UNINA-9910483469103321
Berlin, : Springer, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in computer science--ASIAN 2009 : information security and privacy : 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009 : proceedings / / Anunam Datta (ed.)
Advances in computer science--ASIAN 2009 : information security and privacy : 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009 : proceedings / / Anunam Datta (ed.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, : Springer, c2009
Descrizione fisica 1 online resource (IX, 159 p.)
Disciplina 005.8
Altri autori (Persone) DattaAnupam
Collana Lecture notes in computer science
LNCS sublibrary. SL 1, Theoretical computer science and general issues
Soggetto topico Computer security
Computer networks - Access control
ISBN 1-280-38329-1
9786613561213
3-642-10622-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto “Logic Wins!” -- Higher-Order Program Verification and Language-Based Security -- Deducibility Constraints -- Automated Security Proof for Symmetric Encryption Modes -- Noninterference with Dynamic Security Domains and Policies -- A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers -- A Logic for Formal Verification of Quantum Programs -- Reducing Equational Theories for the Decision of Static Equivalence -- A Simulation-Based Treatment of Authenticated Message Exchange -- Trusted Deployment of Virtual Execution Environment in Grid Systems -- A Dolev-Yao Model for Zero Knowledge -- A Special Proxy Signature Scheme with Multi-warrant.
Altri titoli varianti ASIAN 2009
Record Nr. UNINA-9910484255203321
Berlin, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in cryptology - ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 ; proceedings / / Mitsuru Matsui (ed.)
Advances in cryptology - ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 ; proceedings / / Mitsuru Matsui (ed.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2009
Descrizione fisica 1 online resource (XIV, 722 p.)
Disciplina 005.8
Altri autori (Persone) MatsuiMitsuru <1961->
Collana Lecture notes in computer science
Soggetto topico Computer networks - Access control
Computer security
Data encryption (Computer science)
ISBN 3-642-10366-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Block Ciphers -- Related-Key Cryptanalysis of the Full AES-192 and AES-256 -- The Key-Dependent Attack on Block Ciphers -- Cascade Encryption Revisited -- Quantum and Post-Quantum -- Quantum-Secure Coin-Flipping and Applications -- On the Power of Two-Party Quantum Cryptography -- Security Bounds for the Design of Code-Based Cryptosystems -- Hash Functions I -- Rebound Attack on the Full Lane Compression Function -- Rebound Distinguishers: Results on the Full Whirlpool Compression Function -- MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners -- The Intel AES Instructions Set and the SHA-3 Candidates -- Encryption Schemes -- Group Encryption: Non-interactive Realization in the Standard Model -- On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations -- Hierarchical Predicate Encryption for Inner-Products -- Hedged Public-Key Encryption: How to Protect against Bad Randomness -- Multi Party Computation -- Secure Two-Party Computation Is Practical -- Secure Multi-party Computation Minimizing Online Rounds -- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols -- Cryptographic Protocols -- Non-malleable Statistically Hiding Commitment from Any One-Way Function -- Proofs of Storage from Homomorphic Identification Protocols -- Simple Adaptive Oblivious Transfer without Random Oracle -- Hash Functions II -- Improved Generic Algorithms for 3-Collisions -- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical -- How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! -- Models and Frameworks I -- On the Analysis of Cryptographic Assumptions in the Generic Ring Model -- Zero Knowledge in the Random Oracle Model, Revisited -- A Framework for Universally Composable Non-committing Blind Signatures -- Cryptanalysis: Square and Quadratic -- Cryptanalysis of the Square Cryptosystems -- Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses -- Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? -- Models and Frameworks II -- Security Notions and Generic Constructions for Client Puzzles -- Foundations of Non-malleable Hash and One-Way Functions -- Hash Functions III -- Improved Cryptanalysis of Skein -- Linearization Framework for Collision Attacks: Application to CubeHash and MD6 -- Preimages for Step-Reduced SHA-2 -- Lattice-Based -- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures -- Efficient Public Key Encryption Based on Ideal Lattices -- Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices -- Side Channels -- PSS Is Secure against Random Fault Attacks -- Cache-Timing Template Attacks -- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions -- Signature Schemes with Bounded Leakage Resilience.
Altri titoli varianti ASIACRYPT 2009
Record Nr. UNINA-9910483947503321
Berlin ; ; New York, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui