Advances in Cryptology - CRYPTO 2002 [[electronic resource] ] : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (XIV, 630 p.) |
Disciplina | 005.8/2 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Data encryption (Computer science) Data protection Computer science—Mathematics Discrete mathematics Algorithms Operating systems (Computers) Electronic data processing—Management Cryptology Data and Information Security Discrete Mathematics in Computer Science Operating Systems IT Operations |
ISBN | 3-540-45708-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Block Ciphers -- Essential Algebraic Structure within the AES -- Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC -- Tweakable Block Ciphers -- Multi-user Oriented Cryptosystems -- The LSD Broadcast Encryption Scheme -- Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials -- Foundations and Methodology -- Provably Secure Steganography -- Flaws in Applying Proof Methodologies to Signature Schemes -- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case -- Security of Practical Protocols -- On the Security of RSA Encryption in TLS -- Security Analysis of IKE’s Signature-Based Key-Exchange Protocol -- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks -- Secure Multiparty Computation -- On 2-Round Secure Multiparty Computation -- Private Computation — k-Connected versus 1-Connected Networks -- Public-Key Encryption -- Analysis and Improvements of NTRU Encryption Paddings -- Universal Padding Schemes for RSA -- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent -- Information Theory and Secret Sharing -- Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors -- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups -- Cipher Design and Analysis -- A Generalized Birthday Problem -- (Not So) Random Shuffles of RC4 -- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV -- Elliptic Curves and Abelian Varieties -- Supersingular Abelian Varieties in Cryptology -- Efficient Algorithms for Pairing-Based Cryptosystems -- Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2 -- Password-Based Authentication -- Threshold Password-Authenticated Key Exchange -- Distributed Cryptosystems -- A Threshold Pseudorandom Function Construction and Its Applications -- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products -- Pseudorandomness and Applications -- Hidden Number Problem with the Trace and Bit Security of XTR and LUC -- Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security -- Variations on Signatures and Authentication -- Threshold Ring Signatures and Applications to Ad-hoc Groups -- Deniable Ring Authentication -- SiBIR: Signer-Base Intrusion-Resilient Signatures -- Stream Ciphers and Boolean Functions -- Cryptanalysis of Stream Ciphers with Linear Masking -- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers -- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction -- Commitment Schemes -- Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks -- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor -- Signature Schemes -- Unique Signatures and Verifiable Random Functions from the DH-DDH Separation -- Security Proof for Partial-Domain Hash Signature Schemes. |
Record Nr. | UNISA-996465560903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Cryptology - CRYPTO 2002 [[electronic resource] ] : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings / / edited by Moti Yung |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (XIV, 630 p.) |
Disciplina | 005.8/2 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Cryptography
Data encryption (Computer science) Data protection Computer science—Mathematics Discrete mathematics Algorithms Operating systems (Computers) Electronic data processing—Management Cryptology Data and Information Security Discrete Mathematics in Computer Science Operating Systems IT Operations |
ISBN | 3-540-45708-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Block Ciphers -- Essential Algebraic Structure within the AES -- Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC -- Tweakable Block Ciphers -- Multi-user Oriented Cryptosystems -- The LSD Broadcast Encryption Scheme -- Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials -- Foundations and Methodology -- Provably Secure Steganography -- Flaws in Applying Proof Methodologies to Signature Schemes -- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case -- Security of Practical Protocols -- On the Security of RSA Encryption in TLS -- Security Analysis of IKE’s Signature-Based Key-Exchange Protocol -- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks -- Secure Multiparty Computation -- On 2-Round Secure Multiparty Computation -- Private Computation — k-Connected versus 1-Connected Networks -- Public-Key Encryption -- Analysis and Improvements of NTRU Encryption Paddings -- Universal Padding Schemes for RSA -- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent -- Information Theory and Secret Sharing -- Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors -- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups -- Cipher Design and Analysis -- A Generalized Birthday Problem -- (Not So) Random Shuffles of RC4 -- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV -- Elliptic Curves and Abelian Varieties -- Supersingular Abelian Varieties in Cryptology -- Efficient Algorithms for Pairing-Based Cryptosystems -- Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2 -- Password-Based Authentication -- Threshold Password-Authenticated Key Exchange -- Distributed Cryptosystems -- A Threshold Pseudorandom Function Construction and Its Applications -- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products -- Pseudorandomness and Applications -- Hidden Number Problem with the Trace and Bit Security of XTR and LUC -- Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security -- Variations on Signatures and Authentication -- Threshold Ring Signatures and Applications to Ad-hoc Groups -- Deniable Ring Authentication -- SiBIR: Signer-Base Intrusion-Resilient Signatures -- Stream Ciphers and Boolean Functions -- Cryptanalysis of Stream Ciphers with Linear Masking -- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers -- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction -- Commitment Schemes -- Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks -- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor -- Signature Schemes -- Unique Signatures and Verifiable Random Functions from the DH-DDH Separation -- Security Proof for Partial-Domain Hash Signature Schemes. |
Record Nr. | UNINA-9910143895303321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Information Systems Development [[electronic resource] ] : AI for IS Development and Operations / / edited by Gheorghe Cosmin Silaghi, Robert Andrei Buchmann, Virginia Niculescu, Gabriela Czibula, Chris Barry, Michael Lang, Henry Linger, Christoph Schneider |
Autore | Silaghi Gheorghe Cosmin |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (249 pages) |
Disciplina | 004.21 |
Altri autori (Persone) |
BuchmannRobert Andrei
NiculescuVirginia CzibulaGabriela BarryChris LangMichael LingerHenry SchneiderChristoph |
Collana | Lecture Notes in Information Systems and Organisation |
Soggetto topico |
Business information services
Electronic data processing—Management Application software Database management Business Information Systems IT Operations Computer and Information Systems Applications Database Management System |
ISBN | 3-031-32418-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A DSR study on Iterative Tool Development to Measure IT Process Maturity in an Agile Context -- A living lab perspective on information systems development process -- Cloud-based Business Intelligence Solutions in the Management of Polish Companies -- Conceptualizing Node.js Projects: a Graph-oriented Technology-specific Modeling Method -- Employing Graph Databases for Business Process Management and Representation -- IT Alignment as a Roadmap for Digital Transformation Success. |
Record Nr. | UNINA-9910734835403321 |
Silaghi Gheorghe Cosmin | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings / / edited by Guojin Wang, Albert Zomaya, Gregorio Martinez, Kenli Li |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (LIII, 851 p. 327 illus. in color.) |
Disciplina | 004.35 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Artificial intelligence Software engineering Application software Computer networks Electronic data processing—Management Artificial Intelligence Software Engineering Computer and Information Systems Applications Computer Communication Networks IT Operations |
ISBN | 3-319-27161-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Trust, security and privacy for Big Data -- Trust, security and privacy for emerging applications -- Network optimization and performance evaluation -- Sensor-cloud systems -- Security and privacy protection in computer and network Systems -- Dependability in sensor, cloud, and Big Data systems. . |
Record Nr. | UNISA-996466226303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings / / edited by Guojin Wang, Albert Zomaya, Gregorio Martinez, Kenli Li |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (LIII, 851 p. 327 illus. in color.) |
Disciplina | 004.35 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Artificial intelligence Software engineering Application software Computer networks Electronic data processing—Management Artificial Intelligence Software Engineering Computer and Information Systems Applications Computer Communication Networks IT Operations |
ISBN | 3-319-27161-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Trust, security and privacy for Big Data -- Trust, security and privacy for emerging applications -- Network optimization and performance evaluation -- Sensor-cloud systems -- Security and privacy protection in computer and network Systems -- Dependability in sensor, cloud, and Big Data systems. . |
Record Nr. | UNINA-9910483991303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part II / / edited by Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, Albert Y. Zomaya |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XXIV, 331 p. 159 illus.) |
Disciplina | 005.1 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Artificial intelligence Software engineering Application software Computer networks Electronic data processing—Management Artificial Intelligence Software Engineering Computer and Information Systems Applications Computer Communication Networks IT Operations |
ISBN | 3-642-33065-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Analytical Modeling for Multi-transaction Bus on Distributed Systems -- Leveraging the Strengths of Transactional Memory While Maintaining System Performance for a Multiplayer Gaming -- Enhancing the Performance of a Distributed Mobile Computing Environment by Topology Construction -- Frame Error Rate Testing for High Speed Optical -- Maintaining Consistency in Software Transactional Memory through Dynamic Versioning Tuning -- Solving a 2-Covered Path Problem with Variable Radii for Wireless Sensor Networks -- Design of an Application-Dependent Static-Based Shared Memory Network -- Determining Quality of S-Boxes Using Pseudo Random Sequences Generated from Stream Ciphers -- Exploring Object-Level Parallelism on Chip Multi-processors -- The Hamiltonicity of WK-Recursive Pyramid -- Towards Multi-level Adaptation for Distributed Operating Systems and Applications -- FIDs Classifier for Artificial Intelligence and Its -- On Affirmative Adaptive Failure Detection -- A New Low Latency Parallel Turbo Decoder Employing Parallel Phase Decoding Method -- A Regular Group Quorum System of Degree A Note on Developing Optimal and Scalable Parallel Two-List Algorithms -- Small Business-Oriented Index Construction of Cloud Data -- High-Performance Matrix Multiply on a Massively Multithreaded Fiteng1000 Processor -- BIDE-Based Parallel Mining of Frequent Closed Sequences with MapReduce -- Efficient Task Scheduling for Hard Real-Time Tasks in Asymmetric Multicore Processors -- An Implementation of Parallel 2-D FFT Using Intel AVX Instructions on Multi-core Processors -- A Semantic Impact in Decentralized Resource Discovery Mechanism for Grid Computing Environments -- Design of n-Gram Based Dynamic Pre-fetching for DSM -- On Construction of Cloud IaaS for VM Live Migration Using KVM and OpenNebula -- Performance Evaluation of OpenMP and CUDA on Multicore -- Complexity of the Resource Allocation/Matching Problem with Weight Based Ceilings -- Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory -- A Novel Feature Selection Scheme for Energy Efficient Wireless Sensor Networks -- A Comprehensive Survey of the Feature Extraction Methods in the EEG Research -- Development of a Smart e-Health Portal for Chronic Disease Management -- A Novel Approach to Protein Structure Prediction Using PCA Based Extreme Learning Machines and Multiple Kernels -- A Novel Approach to Guarantee Causal Message Ordering in Pre-planned Wireless Sensor Networks -- People Identification with RMS-Based Spatial Pattern of EEG Signal -- Gait Based Human Identity Recognition from Multi-view Surveillance Videos. |
Record Nr. | UNISA-996465477003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part I / / edited by Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, Albert Y. Zomaya |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XXI, 563 p. 241 illus.) |
Disciplina | 005.1 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Artificial intelligence Software engineering Application software Computer networks Electronic data processing—Management Artificial Intelligence Software Engineering Computer and Information Systems Applications Computer Communication Networks IT Operations |
ISBN | 3-642-33078-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Accelerating the Dynamic Programming for the Optimal Polygon Triangulation on the -- Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor -- Parallel Algorithm for Nonlinear Network Optimization Problems and Real-Time -- Optimization of a Short-Range Proximity Effect Correction Algorithm in E-Beam Lithography Using GPGPUs -- Exploiting Multi-grain Parallelism for Efficient Selective Sweep -- Vectorized Algorithms for Quadtree Construction and -- A Multi-level Monitoring Framework for Stream-Based Coordination Programs -- An Optimal Parallel Prefix-Sums Algorithm on the Memory Machine Models for -- A Multi-GPU Programming Library for Real-Time -- Optimal Linear Programming Solutions for Multiprocessor Scheduling with Communication Delays -- A Bitstream Relocation Technique to Improve Flexibility of Partial -- A Hybrid Heuristic-Genetic Algorithm for Task Scheduling in Heterogeneous Multi-core -- Efficient Task Assignment on Heterogeneous Multicore Systems Considering Communication -- Budget Constrained Resource Allocation for Non-deterministic Workflows on an IaaS Cloud -- On a Wideband Fast Fourier Transform Using Piecewise Linear Approximations: Application to a Radio Telescope -- A Verified Library of Algorithmic Skeletons on Evenly Distributed -- Performance Measurement of Parallel Vlasov Code for Space Plasma on Various Scalar-Type Supercomputer -- Ultrasound Simulation on the Cell Broadband Engine Using the Westervelt -- Study on the Data Flow Balance in NFS Server with -- Performance, Scalability, and Semantics of Concurrent FIFO Queues -- Scalable Distributed Architecture for Media Transcoding -- GPU-Accelerated Restricted Boltzmann Machine for Collaborative Filtering -- STM Systems: Enforcing Strong Isolation between Transactions and Non-transactional -- A Dependency Aware Task Partitioning and Scheduling Algorithm for Hardware-Software Codesign on -- Power Efficiency Evaluation of Block Ciphers on GPU-Integrated Multicore Processor -- Experiments in Parallel Matrix Multiplication on Multi-core -- Fault Tolerance Logical Network Properties of Irregular -- Fault Recovery Technique for TMR Softcore Processor System Using Partial -- Non-Blocking Atomic Commitment in Asynchronous Distributed Systems with Faulty Processes -- On Modelling and Prediction of Total CPU Usage for Applications in MapReduce -- The Impact of Global Communication Latency at Extreme Scales on Krylov Methods -- Fast Parallel Algorithms for Blocked Dense Matrix Multiplication on Shared Memory Architectures -- Kernel Support for Fine-Grained Load Balancing in a Web Cluster Providing Streaming Service -- Overcoming the Scalability Limitations of Parallel Star Schema Data Warehouses -- Enhancing Service-Oriented Computing with Software -- An Insightful Program Performance Tuning Chain for GPU Computing.- Multi-core Fixed Priority DVS -- Comparing Checkpoint and Rollback Recovery Schemes in a Cluster System -- Causal Order Multicast Protocol Using Minimal Message History Information. |
Record Nr. | UNISA-996465501503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Algorithms and Architectures for Parallel Processing, Part I [[electronic resource] ] : 11th International Conference, ICA3PP 2011, Melbourne, Australia,October 24-26, 2011, Proceedings, Part I / / edited by Yang Xiang, Alfredo Cuzzocrea, Michael Hobbs, Wanlei Zhou |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XVIII, 497 p. 161 illus., 87 illus. in color.) |
Disciplina | 005.1 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Artificial intelligence Software engineering Application software Computer networks Electronic data processing—Management Artificial Intelligence Software Engineering Computer and Information Systems Applications Computer Communication Networks IT Operations |
ISBN | 3-642-24650-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466015903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Algorithms and Architectures for Parallel Processing, Part II [[electronic resource] ] : 11th International Conference, ICA3PP 2011, Workshops, Melbourne, Australia, October 24-26, 2011, Proceedings, Part II / / edited by Yang Xiang, Alfredo Cuzzocrea, Michael Hobbs, Wanlei Zhou |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XVIII, 411 p. 191 illus., 99 illus. in color.) |
Disciplina | 005.1 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Artificial intelligence Software engineering Application software Computer networks Electronic data processing—Management Artificial Intelligence Software Engineering Computer and Information Systems Applications Computer Communication Networks IT Operations |
ISBN | 3-642-24669-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465970103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Cryptography and Network Security [[electronic resource] ] : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings / / edited by Jianying Zhou, Moti Yung |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIII, 564 p. 83 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Computer science—Mathematics Discrete mathematics Electronic data processing—Management Algorithms Data protection Computer Communication Networks Cryptology Discrete Mathematics in Computer Science IT Operations Data and Information Security |
ISBN |
1-280-38725-4
9786613565174 3-642-13708-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public Key Encryption -- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption -- How to Construct Interval Encryption from Binary Tree Encryption -- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions -- Digital Signature -- Trapdoor Sanitizable Signatures Made Easy -- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs -- Redactable Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions -- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions -- Multi-trail Statistical Saturation Attacks -- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G??? -- High Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES against First and Second-Order Differential Power Analysis -- Adaptive Chosen-Message Side-Channel Attacks -- Secure Multiplicative Masking of Power Functions -- Zero Knowledge and Multi-party Protocols -- Batch Groth–Sahai -- Efficient and Secure Evaluation of Multivariate Polynomials and Applications -- Efficient Implementation of the Orlandi Protocol -- Improving the Round Complexity of Traitor Tracing Schemes -- Key Management -- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters -- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead -- Deniable Internet Key Exchange -- Authentication and Identification -- A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm -- Secure Sketch for Multiple Secrets -- A Message Recognition Protocol Based on Standard Assumptions -- Privacy and Anonymity -- Affiliation-Hiding Key Exchange with Untrusted Group Authorities -- Privacy-Preserving Group Discovery with Linear Complexity -- Two New Efficient PIR-Writing Protocols -- Regulatory Compliant Oblivious RAM -- RFID Security and Privacy -- Revisiting Unpredictability-Based RFID Privacy Models -- On RFID Privacy with Mutual Authentication and Tag Corruption -- Internet Security -- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures -- COP: A Step toward Children Online Privacy -- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. |
Record Nr. | UNISA-996465668703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|