2007 IEEE Information Assurance Workshop : West Point, NY, 20-22 June 2007 |
Pubbl/distr/stampa | IEEE |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Computer networks - Access control |
ISBN | 1-5090-8611-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | 2007 IEEE SMC Information Assurance and Security Workshop |
Record Nr. | UNISA-996201888603316 |
IEEE | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2007 IEEE Information Assurance Workshop : West Point, NY, 20-22 June 2007 |
Pubbl/distr/stampa | IEEE |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Computer networks - Access control |
ISBN |
9781509086115
1509086110 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | 2007 IEEE SMC Information Assurance and Security Workshop |
Record Nr. | UNINA-9910143009203321 |
IEEE | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN) / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE, , 2017 |
Descrizione fisica | 1 online resource |
Disciplina | 004.6 |
Soggetto topico |
Computer networks
Computer networks - Access control |
ISBN | 1-5090-3672-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | 2017 20th Conference on Innovations in Clouds, Internet and Networks |
Record Nr. | UNISA-996280472203316 |
Piscataway, NJ : , : IEEE, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN) / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE, , 2017 |
Descrizione fisica | 1 online resource |
Disciplina | 004.6 |
Soggetto topico |
Computer networks
Computer networks - Access control |
ISBN | 1-5090-3672-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | 2017 20th Conference on Innovations in Clouds, Internet and Networks |
Record Nr. | UNINA-9910209349103321 |
Piscataway, NJ : , : IEEE, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
ABAC '16 : proceedings of the 2016 ACM International Workshop on Attribute Based Access Control : March 11, 2016, New Orleans, LA, USA / / sponsored by ACM SIGSAC |
Pubbl/distr/stampa | New York : , : ACM, , 2016 |
Descrizione fisica | 1 online resource (76 pages) |
Disciplina | 005.3 |
Soggetto topico |
Application software
Data protection Computer networks - Access control |
ISBN | 1-4503-4079-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Attribute Based Access Control 2016 : proceedings of the 2016 Association for Computing Machinery International Workshop on Attribute Based Access Control : March 11, 2016, New Orleans, LA, USA
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control Proceedings of the 2016 Association for Computing Machinery International Workshop on Attribute Based Access Control CODASPY '16 : sixth ACM Conference on Data and Application Security and Privacy : New Orleans, LA, USA, March 09-11, 2016 Conference on Data and Application Security and Privacy 2016 : sixth ACM Conference on Data and Application Security and Privacy : New Orleans, LA, USA, March 09-11, 2016 |
Record Nr. | UNINA-9910376554303321 |
New York : , : ACM, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in biometrics : international conference, ICB 2007, Seoul, Korea, August 27-29, 2007 ; proceedings / / Seong-Whan Lee, Stan Z. Li (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2007 |
Descrizione fisica | 1 online resource (XLII, 1302 p.) |
Disciplina | 006.4 |
Altri autori (Persone) |
LeeS.-W (Seong-whan)
LiS. Z. <1958-> |
Collana | Lecture notes in computer science |
Soggetto topico |
Biometric identification
Identification - Automation Pattern recognition systems Computer networks - Access control |
ISBN | 3-642-01793-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Face -- Speech -- Fingerprint and Palmprint -- Biometric Competitions -- Multibiometrics and Security -- Gait -- Iris -- Other Biometrics. |
Altri titoli varianti | ICB 2007 |
Record Nr. | UNINA-9910484530703321 |
Berlin ; ; New York, : Springer, 2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in biometrics : International Conference, ICB 2006, Hong Kong, China, January 5-7, 2006 : proceedings / / David Zhang, Anil K. Jain (eds.) |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, : Springer, 2006 |
Descrizione fisica | 1 online resource (XX, 798 p.) |
Disciplina | 006.4 |
Altri autori (Persone) |
ZhangDavid <1949->
JainAnil K. <1948-> |
Collana | Lecture notes in computer science |
Soggetto topico |
Biometric identification
Identification - Automation Pattern recognition systems Computer networks - Access control |
ISBN | 3-540-31621-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Face Verification Contest 2006 -- Face -- Fingerprint -- Iris -- Speech and Signature -- Biometric Fusion and Performance Evaluation -- Gait and Keystroke -- Others. |
Altri titoli varianti | ICB 2006 |
Record Nr. | UNINA-9910483469103321 |
Berlin, : Springer, 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in computer science--ASIAN 2009 : information security and privacy : 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009 : proceedings / / Anunam Datta (ed.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, : Springer, c2009 |
Descrizione fisica | 1 online resource (IX, 159 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | DattaAnupam |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 1, Theoretical computer science and general issues |
Soggetto topico |
Computer security
Computer networks - Access control |
ISBN |
1-280-38329-1
9786613561213 3-642-10622-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | “Logic Wins!” -- Higher-Order Program Verification and Language-Based Security -- Deducibility Constraints -- Automated Security Proof for Symmetric Encryption Modes -- Noninterference with Dynamic Security Domains and Policies -- A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers -- A Logic for Formal Verification of Quantum Programs -- Reducing Equational Theories for the Decision of Static Equivalence -- A Simulation-Based Treatment of Authenticated Message Exchange -- Trusted Deployment of Virtual Execution Environment in Grid Systems -- A Dolev-Yao Model for Zero Knowledge -- A Special Proxy Signature Scheme with Multi-warrant. |
Altri titoli varianti | ASIAN 2009 |
Record Nr. | UNINA-9910484255203321 |
Berlin, : Springer, c2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in cryptology - ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 ; proceedings / / Mitsuru Matsui (ed.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2009 |
Descrizione fisica | 1 online resource (XIV, 722 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | MatsuiMitsuru <1961-> |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer networks - Access control
Computer security Data encryption (Computer science) |
ISBN | 3-642-10366-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Block Ciphers -- Related-Key Cryptanalysis of the Full AES-192 and AES-256 -- The Key-Dependent Attack on Block Ciphers -- Cascade Encryption Revisited -- Quantum and Post-Quantum -- Quantum-Secure Coin-Flipping and Applications -- On the Power of Two-Party Quantum Cryptography -- Security Bounds for the Design of Code-Based Cryptosystems -- Hash Functions I -- Rebound Attack on the Full Lane Compression Function -- Rebound Distinguishers: Results on the Full Whirlpool Compression Function -- MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners -- The Intel AES Instructions Set and the SHA-3 Candidates -- Encryption Schemes -- Group Encryption: Non-interactive Realization in the Standard Model -- On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations -- Hierarchical Predicate Encryption for Inner-Products -- Hedged Public-Key Encryption: How to Protect against Bad Randomness -- Multi Party Computation -- Secure Two-Party Computation Is Practical -- Secure Multi-party Computation Minimizing Online Rounds -- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols -- Cryptographic Protocols -- Non-malleable Statistically Hiding Commitment from Any One-Way Function -- Proofs of Storage from Homomorphic Identification Protocols -- Simple Adaptive Oblivious Transfer without Random Oracle -- Hash Functions II -- Improved Generic Algorithms for 3-Collisions -- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical -- How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! -- Models and Frameworks I -- On the Analysis of Cryptographic Assumptions in the Generic Ring Model -- Zero Knowledge in the Random Oracle Model, Revisited -- A Framework for Universally Composable Non-committing Blind Signatures -- Cryptanalysis: Square and Quadratic -- Cryptanalysis of the Square Cryptosystems -- Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses -- Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? -- Models and Frameworks II -- Security Notions and Generic Constructions for Client Puzzles -- Foundations of Non-malleable Hash and One-Way Functions -- Hash Functions III -- Improved Cryptanalysis of Skein -- Linearization Framework for Collision Attacks: Application to CubeHash and MD6 -- Preimages for Step-Reduced SHA-2 -- Lattice-Based -- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures -- Efficient Public Key Encryption Based on Ideal Lattices -- Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices -- Side Channels -- PSS Is Secure against Random Fault Attacks -- Cache-Timing Template Attacks -- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions -- Signature Schemes with Bounded Leakage Resilience. |
Altri titoli varianti | ASIACRYPT 2009 |
Record Nr. | UNINA-9910483947503321 |
Berlin ; ; New York, : Springer, c2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in web and network technologies, and information management : APWeb/WAIM 2009 international workshops, WCMT 2009, RTBI 2009, DBIR-ENQOIR 2009, PAIS 2009, Suzhou, China, April 2-4, 2009 : revised selected papers / / Lei Chen ... [et al.] (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2009 |
Descrizione fisica | 1 online resource (XVII, 245 p.) |
Disciplina | 004n/a |
Altri autori (Persone) | ChenLei <1972-> |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI |
Soggetto topico |
World Wide Web - Technological innovations
Computer networks - Management Database management Application software - Development Computer networks - Access control |
ISBN | 3-642-03996-0 |
Classificazione |
DAT 614f
DAT 620f SS 4800 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | International Workshop on Real-Time Business Intelligence (RTBI 2009) -- ScaMMDB: Facing Challenge of Mass Data Processing with MMDB -- A Data Distribution Strategy for Scalable Main-Memory Database -- Temporal Restriction Query Optimization for Event Stream Processing -- International Workshop on Web-Based Contents Management Technologies(WCMT 2009) -- Video Object Segmentation Based on Disparity -- A Database Approach for Accelerate Video Data Access -- Medical Image Retrieval in Private Network Based on Dynamic Fuzzy Data Model and Wavelet Entropy -- Extension of OWL with Dynamic Fuzzy Logic -- ADEB: A Dynamic Alert Degree Evaluation Model for Blogosphere -- Data Warehouse Based Approach to the Integration of Semi-structured Data -- Towards Faceted Search for Named Entity Queries -- A Petri-Net-Based Approach to QoS Estimation of Web Service Choreographies -- Personalization Service Research of the E-Learning System Based on Clustering Coefficient Partition Algorithm -- International Workshop on Process Aware Information Systems (PAIS 2007) -- Automatic Generation of Processes Based on Processes Semantic for Smartflow Pattern -- Easy Flow: New Generation Business Process Model -- International Workshop on Data Base and Information Retrieval and on Aspects in Evaluating Holistic Quality of Ontology-Based Information Retrieval (DBIR-ENQOIR 2009) -- User Feedback for Improving Question Categorization in Web-Based Question Answering Systems -- XTree: A New XML Keyword Retrieval Model -- Effective Top-k Keyword Search in Relational Databases Considering Query Semantics -- A Grid Index Based Method for Continuous Constrained Skyline Query over Data Stream -- Ontology Personalization: An Approach Based on Conceptual Prototypicality -- Ontology Evaluation through Text Classification -- Core-Tag Clustering for Web 2.0 Based on Multi-similarity Measurements -- Meta Galaxy: A Flexible and Efficient Cube Model for Data Retrieval in OLAP. |
Record Nr. | UNINA-9910483393203321 |
Berlin ; ; New York, : Springer, c2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|