Advances in cryptology - EUROCRYPT 2007 : 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, proceedings / / edited by Moni Naor
| Advances in cryptology - EUROCRYPT 2007 : 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, proceedings / / edited by Moni Naor |
| Edizione | [1st ed. 2007.] |
| Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2007] |
| Descrizione fisica | 1 online resource (602 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Cryptography
Computers - Access control Data transmission systems - Security measures |
| ISBN |
1-280-94372-6
9786610943722 3-540-72540-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities -- Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t Exist -- The Collision Intractability of MDC-2 in the Ideal-Cipher Model -- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries -- Revisiting the Efficiency of Malicious Two-Party Computation -- Efficient Two-Party Secure Computation on Committed Inputs -- Universally Composable Multi-party Computation Using Tamper-Proof Hardware -- Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model -- Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability -- Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility -- Zero Knowledge and Soundness Are Symmetric -- Mesh Signatures -- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks -- Batch Verification of Short Signatures -- Cryptanalysis of SFLASH with Slightly Modified Parameters -- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy -- Secure Computation from Random Error Correcting Codes -- Round-Efficient Secure Computation in Point-to-Point Networks -- Atomic Secure Multi-party Multiplication with Low Communication -- Cryptanalysis of the Sidelnikov Cryptosystem -- Toward a Rigorous Variation of Coppersmith’s Algorithm on Three Variables -- An L (1/3?+??) Algorithm for the Discrete Logarithm Problem for Low Degree Curves -- General Ad Hoc Encryption from Exponent Inversion IBE -- Non-interactive Proofs for Integer Multiplication -- Ate Pairing on Hyperelliptic Curves -- Ideal Multipartite Secret Sharing Schemes -- Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit -- Divisible E-Cash Systems Can Be Truly Anonymous -- A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security -- Range Extension for Weak PRFs; The Good, the Bad, and the Ugly -- Feistel Networks Made Public, and Applications -- Oblivious-Transfer Amplification -- Simulatable Adaptive Oblivious Transfer. |
| Record Nr. | UNISA-996465519903316 |
| Berlin, Germany ; ; New York, New York : , : Springer, , [2007] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advances in cryptology -- EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008 : proceedings / / Nigel Smart (ed.)
| Advances in cryptology -- EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008 : proceedings / / Nigel Smart (ed.) |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
| Descrizione fisica | 1 online resource (XIII, 564 p.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data transmission systems - Security measures
Cryptography Computers - Access control |
| ISBN | 3-540-78967-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A Practical Attack on KeeLoq -- Key Recovery on Hidden Monomial Multivariate Schemes -- Predicting Lattice Reduction -- Efficient Sequential Aggregate Signed Data -- Proving Tight Security for Rabin-Williams Signatures -- Threshold RSA for Dynamic and Ad-Hoc Groups -- Towards Key-Dependent Message Security in the Standard Model -- The Twin Diffie-Hellman Problem and Applications -- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products -- Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves -- On the Indifferentiability of the Sponge Construction -- A New Mode of Operation for Block Ciphers and Length-Preserving MACs -- Security/Efficiency Tradeoffs for Permutation-Based Hashing -- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 -- Collisions for the LPS Expander Graph Hash Function -- Second Preimage Attacks on Dithered Hash Functions -- Efficient Two Party and Multi Party Computation Against Covert Adversaries -- Almost-Everywhere Secure Computation -- Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme -- Protocols and Lower Bounds for Failure Localization in the Internet -- : Increasing the Security and Efficiency of -- Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle -- Precise Concurrent Zero Knowledge -- Efficient Non-interactive Proof Systems for Bilinear Groups -- Zero-Knowledge Sets with Short Proofs -- Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves -- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors -- Obfuscating Point Functions with Multibit Output -- Isolated Proofs of Knowledge and Isolated Zero Knowledge -- David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware -- New Constructions for UC Secure Computation Using Tamper-Proof Hardware. |
| Record Nr. | UNISA-996465495903316 |
| Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Electronic Intelligence (ELINT) at NSA [[electronic resource] /] / Richard L. Bernard
| Electronic Intelligence (ELINT) at NSA [[electronic resource] /] / Richard L. Bernard |
| Autore | Bernard Richard L |
| Pubbl/distr/stampa | Fort George G. Meade, Md. : , : Center for Cryptologic History, National Security Agency, , 2009 |
| Descrizione fisica | 1 online resource (14 pages) : illustrations |
| Soggetto topico |
Electronic surveillance - United States
Data transmission systems - Security measures |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Electronic Intelligence |
| Record Nr. | UNINA-9910700359303321 |
Bernard Richard L
|
||
| Fort George G. Meade, Md. : , : Center for Cryptologic History, National Security Agency, , 2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information and computer security
| Information and computer security |
| Pubbl/distr/stampa | Bingley : , : Emerald, , 2015- |
| Soggetto topico |
Computer security
Data transmission systems - Security measures |
| Soggetto genere / forma | Periodicals. |
| Soggetto non controllato | Computer Science |
| ISSN | 2056-497X |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996398344603316 |
| Bingley : , : Emerald, , 2015- | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and computer security
| Information and computer security |
| Pubbl/distr/stampa | Bingley : , : Emerald, , 2015- |
| Soggetto topico |
Computer security
Data transmission systems - Security measures |
| Soggetto genere / forma | Periodicals. |
| ISSN | 2056-497X |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910265658103321 |
| Bingley : , : Emerald, , 2015- | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information security technical report
| Information security technical report |
| Pubbl/distr/stampa | [New York, NY] : , : Elsevier Science, , ©1996-©2013 |
| Soggetto topico |
Computer security
Data transmission systems - Security measures Sécurité informatique - Périodiques Données - Transmission - Sécurité - Mesures Sécurité informatique |
| Soggetto genere / forma | Periodicals. |
| Soggetto non controllato | Computer Science |
| ISSN | 1873-605X |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996206280603316 |
| [New York, NY] : , : Elsevier Science, , ©1996-©2013 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information security technical report
| Information security technical report |
| Pubbl/distr/stampa | [New York, NY] : , : Elsevier Science, , ©1996-©2013 |
| Soggetto topico |
Computer security
Data transmission systems - Security measures Sécurité informatique - Périodiques Données - Transmission - Sécurité - Mesures Sécurité informatique |
| Soggetto genere / forma | Periodicals. |
| ISSN | 1873-605X |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910147022503321 |
| [New York, NY] : , : Elsevier Science, , ©1996-©2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Securing record communications [[electronic resource] ] : the TSEC/KW-26 / / Melville Klein
| Securing record communications [[electronic resource] ] : the TSEC/KW-26 / / Melville Klein |
| Autore | Klein Melville |
| Pubbl/distr/stampa | [Fort George G. Meade, Md.] : , : [National Security Agency, Central Security Service], , [2003] |
| Descrizione fisica | 1 online resource (19 pages) : illustrations |
| Soggetto topico |
Telecommunication - Security measures
Digital communications - History Data transmission systems - Security measures Data encryption (Computer science) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Securing Record Communications |
| Record Nr. | UNINA-9910703148703321 |
Klein Melville
|
||
| [Fort George G. Meade, Md.] : , : [National Security Agency, Central Security Service], , [2003] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Trust, privacy and security in digital business : 4th international conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 : proceedings / / Steven M. Furnell, Sokratis Katsikas and Antonio Lioy (eds.)
| Trust, privacy and security in digital business : 4th international conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 : proceedings / / Steven M. Furnell, Sokratis Katsikas and Antonio Lioy (eds.) |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
| Descrizione fisica | 1 online resource (X, 205 p.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Public key infrastructure (Computer security)
Data transmission systems - Security measures Electronic commerce - Security measures |
| ISBN | 3-540-85735-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Invited Lecture -- Biometrics – How to Put to Use and How Not at All? -- Trust -- A Map of Trust between Trading Partners -- Implementation of a TCG-Based Trusted Computing in Mobile Device -- A Model for Trust Metrics Analysis -- Authentication, Authorization and Access Control -- Patterns and Pattern Diagrams for Access Control -- A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications -- A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony -- Reputation Systems -- Multilateral Secure Cross-Community Reputation Systems for Internet Communities -- Fairness Emergence through Simple Reputation -- Combining Trust and Reputation Management for Web-Based Services -- Security Policies and Identity Management -- Controlling Usage in Business Process Workflows through Fine-Grained Security Policies -- Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy -- BusiROLE: A Model for Integrating Business Roles into Identity Management -- Intrusion Detection and Applications of Game Theory to IT Security Problems -- The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset -- A Generic Intrusion Detection Game Model in IT Security -- On the Design Dilemma in Dining Cryptographer Networks -- Privacy -- Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing -- A User-Centric Protocol for Conditional Anonymity Revocation -- Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. |
| Record Nr. | UNISA-996465658603316 |
| Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||