Information security applications : 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / / Heung Youl Youm, Moti Yung (eds.)
| Information security applications : 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / / Heung Youl Youm, Moti Yung (eds.) |
| Edizione | [1st ed. 2009.] |
| Pubbl/distr/stampa | Berlin ; ; Heidelberg, : Springer-Verlag, 2009 |
| Descrizione fisica | 1 online resource (XIII, 386 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
YoumHeung Youl
YungMoti |
| Collana | Lecture notes in computer science |
| Soggetto topico |
Computer security - International cooperation
Data protection - International cooperation |
| ISBN |
1-280-38536-7
9786613563286 3-642-10838-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Multimedia Security -- Protecting IPTV Service Network against Malicious Rendezvous Point -- Design and Implementation of SIP-aware Security Management System -- Device Security -- Application Management Framework in User Centric Smart Card Ownership Model -- When Compromised Readers Meet RFID -- HW Implementation Security -- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? -- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules -- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment -- Applied Cryptography -- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles -- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity -- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy -- ID-Based Adaptive Oblivious Transfer -- Side Channel Attacks -- Unknown Plaintext Template Attacks -- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices -- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation -- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption -- Cryptograptanalysis -- Finding Collisions for a 45-Step Simplified HAS-V -- Non-linear Error Detection for Finite State Machines -- Quadratic Equations from a Kind of S-boxes -- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure -- Anonymity/Authentication/Access Control -- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET -- A Selectable k-Times Relaxed Anonymous Authentication Scheme -- PUF-Based Authentication Protocols – Revisited -- Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application -- Network Security -- Securing Remote Access Inside Wireless Mesh Networks -- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers -- USN Middleware Security Model -- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs. |
| Record Nr. | UNINA-9910483065303321 |
| Berlin ; ; Heidelberg, : Springer-Verlag, 2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers / / Jooseok Song, Taekyoung Kwon, Moti Yung (eds.)
| Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers / / Jooseok Song, Taekyoung Kwon, Moti Yung (eds.) |
| Edizione | [1st ed. 2006.] |
| Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2006 |
| Descrizione fisica | 1 online resource (XII, 378 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
SongJooSeok
KwonTaekyoung YungMoti |
| Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
| Soggetto topico |
Computer security - International cooperation
Data protection - International cooperation |
| ISBN | 3-540-33153-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Security Analysis and Attacks -- Security Weakness in Ren et al.’s Group Key Agreement Scheme Built on Secure Two-Party Protocols -- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes -- Application of LFSRs in Time/Memory Trade-Off Cryptanalysis -- System Security -- An Alert Data Mining Framework for Network-Based Intrusion Detection System -- Key Factors Influencing Worm Infection in Enterprise Networks -- Evaluation of the Unified Modeling Language for Security Requirements Analysis -- Network Security -- A Simple and Efficient Conference Scheme for Mobile Communications -- A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network -- Efficient Multicast Stream Authentication for the Fully Adversarial Network Model -- Elastic Security QoS Provisioning for Telematics Applications -- DRM/Software Security -- An Improved Algorithm to Watermark Numeric Relational Data -- Video Fingerprinting System Using Wavelet and Error Correcting Code -- Secure Asymmetric Watermark Detection Without Secret of Modified Pixels -- Kimchi: A Binary Rewriting Defense Against Format String Attacks -- Software Protection Through Dynamic Code Mutation -- Efficient HW Implementation -- Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m ) -- Developing and Implementing IHPM on IXP 425 Network Processor Platforms -- Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices -- mCrypton – A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors -- Side-Channel Attacks -- Practical Modifications of Leadbitter et al.’s Repeated-Bits Side-Channel Analysis on (EC)DSA -- A DPA Countermeasure by Randomized Frobenius Decomposition -- DPA Attack on the Improved Ha-Moon Algorithm -- An Efficient Masking Scheme for AES Software Implementations -- Privacy/Anonymity -- Secure Multi-attribute Procurement Auction -- Oblivious Conjunctive Keyword Search -- Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption -- Efficient Implementation -- New Concept of Authority Range for Flexible Management of Role Hierarchy -- Role-Based Access Control Model for Ubiquitous Computing Environment -- Designing Security Auditing Protocol with Web Browsers. |
| Altri titoli varianti | WISA 2005 |
| Record Nr. | UNINA-9910484509403321 |
| Berlin ; ; New York, : Springer, c2006 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers / / Chae Hoon Lim, Moti Yung (eds.)
| Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers / / Chae Hoon Lim, Moti Yung (eds.) |
| Edizione | [1st ed. 2005.] |
| Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2005 |
| Descrizione fisica | 1 online resource (XII, 472 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
LimChae Hoon
YungMoti |
| Collana | Lecture notes in computer science |
| Soggetto topico |
Computer security - International cooperation
Data protection - International cooperation |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications -- An Improvement on Privacy and Authentication in GSM -- Encrypted Watermarks and Linux Laptop Security -- Inconsistency Detection of Authorization Policies in Distributed Component Environment -- Public Key Schemes I -- Custodian-Hiding Verifiable Encryption -- Proving Key Usage -- Public Key Encryption with Conjunctive Field Keyword Search -- Intrusion Detection I -- A Probabilistic Method for Detecting Anomalous Program Behavior -- Service Discrimination and Audit File Reduction for Effective Intrusion Detection -- IDS False Alarm Filtering Using KNN Classifier -- Watermarking/Anti-spamming -- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking -- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment -- Public Key Schemes II -- Efficient Authenticated Key Agreement Protocol for Dynamic Groups -- A Ring Signature Scheme Using Bilinear Pairings -- Verifiable Pairing and Its Applications -- Intrusion Detection II -- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading -- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks -- Application of Content Computing in Honeyfarm -- Digital Rights Management -- License Protection with a Tamper-Resistant Token -- An Adaptive Approach to Hardware Alteration for Digital Rights Management -- Dynamic Fingerprinting over Broadcast Using Revocation Scheme -- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels -- e-Commerce Security -- Vulnerability of a Mobile Payment System Proposed at WISA 2002 -- Fair Offline Payment Using Verifiable Encryption -- A Limited-Used Key Generation Scheme for Internet Transactions -- Efficient Implementation -- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes -- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II -- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors -- Hyperelliptic Curve Coprocessors on a FPGA -- Anonymous Communication -- Key-Exchange Protocol Using Pre-agreed Session-ID -- A New k-Anonymous Message Transmission Protocol -- Onions Based on Universal Re-encryption – Anonymous Communication Immune Against Repetitive Attack -- Side-Channel Attacks -- Side Channel Cryptanalysis on SEED -- Secure and Efficient AES Software Implementation for Smart Cards -- Practical Template Attacks -- Evaluation and Improvement of the Tempest Fonts. |
| Altri titoli varianti | WISA 2004 |
| Record Nr. | UNINA-9910484261803321 |
| Berlin ; ; New York, : Springer, 2005 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information warfare arms control [[electronic resource] ] : risks and costs / / Maxie C. Thom
| Information warfare arms control [[electronic resource] ] : risks and costs / / Maxie C. Thom |
| Autore | Thom Maxie C |
| Pubbl/distr/stampa | USAF Academy, Colo. : , : USAF Institute for National Security Studies, , [2006] |
| Descrizione fisica | x, 66 pages : digital, PDF file |
| Collana | INSS occasional paper |
| Soggetto topico |
Information warfare - International cooperation
War (International law) Arms control - International cooperation Computers - Law and legislation Computer security - International cooperation |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Information warfare arms control |
| Record Nr. | UNINA-9910695032903321 |
Thom Maxie C
|
||
| USAF Academy, Colo. : , : USAF Institute for National Security Studies, , [2006] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 5843) (including cost estimate of the Congressional Budget Office)
| United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 5843) (including cost estimate of the Congressional Budget Office) |
| Pubbl/distr/stampa | [Washington, D.C.] : , : [U. S. Government Publishing Office], , [2016] |
| Descrizione fisica | 1 online resource (7 pages) |
| Collana | Report / 114th Congress, 2d session, House of Representatives |
| Soggetto topico |
Computer security - Law and legislation - United States
Computer security - Law and legislation - Israel Computer security - International cooperation |
| Soggetto genere / forma | Legislative materials. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 |
| Record Nr. | UNINA-9910707885603321 |
| [Washington, D.C.] : , : [U. S. Government Publishing Office], , [2016] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
US policy response to cyber attack on SCADA systems supporting critical national infrastructure / / Scott A. Weed
| US policy response to cyber attack on SCADA systems supporting critical national infrastructure / / Scott A. Weed |
| Autore | Weed Scott A. <1979-> |
| Pubbl/distr/stampa | Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , [2017] |
| Descrizione fisica | 1 online resource (xi, 52 pages) : illustrations |
| Collana |
Air Force Research Institute perspectives on cyber power
Air Force Research Institute papers |
| Soggetto topico |
Computers - Access control - Government policy - United States
Supervisory control systems - Security measures - United States Cyberterrorism - Prevention Computer security - Government policy - United States Computer security - International cooperation Cyberinfrastructure - Security measures - United States |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
U.S. policy response to cyber attack on SCADA systems supporting critical national infrastructure
United States policy response to cyber attack on SCADA systems supporting critical national infrastructure |
| Record Nr. | UNINA-9910708220203321 |
Weed Scott A. <1979->
|
||
| Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||