2006 IEEE Symposium on Security and Privacy : (S & P 2006) : proceedings : 21-24 May, 2006, Berkeley/Oakland, California
| 2006 IEEE Symposium on Security and Privacy : (S & P 2006) : proceedings : 21-24 May, 2006, Berkeley/Oakland, California |
| Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2006 |
| Soggetto topico |
Computers - Access control
Telecommunication - Security measures |
| ISBN | 1-5090-9835-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996197570203316 |
| [Place of publication not identified], : IEEE Computer Society, 2006 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
2006 IEEE Symposium on Security and Privacy : (S & P 2006) : proceedings : 21-24 May, 2006, Berkeley/Oakland, California
| 2006 IEEE Symposium on Security and Privacy : (S & P 2006) : proceedings : 21-24 May, 2006, Berkeley/Oakland, California |
| Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2006 |
| Soggetto topico |
Computers - Access control
Telecommunication - Security measures |
| ISBN |
9781509098354
1509098356 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910145617403321 |
| [Place of publication not identified], : IEEE Computer Society, 2006 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
2010 IEEE Symposium on Security and Privacy
| 2010 IEEE Symposium on Security and Privacy |
| Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2010 |
| Descrizione fisica | 1 online resource : illustrations |
| Disciplina | 005.8 |
| Soggetto topico |
Computers - Access control
Telecommunication - Security measures |
| ISBN |
9781424468959
1424468957 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910140824903321 |
| [Place of publication not identified], : IEEE, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Aerospace Computer Security Applications 4th Conference, 1988: Proceedings
| Aerospace Computer Security Applications 4th Conference, 1988: Proceedings |
| Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society Press, 1988 |
| Descrizione fisica | 1 online resource (452 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Database security Telecommunication - Security measures |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996215152303316 |
| [Place of publication not identified], : IEEE Computer Society Press, 1988 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Aerospace Computer Security Applications 4th Conference, 1988: Proceedings
| Aerospace Computer Security Applications 4th Conference, 1988: Proceedings |
| Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society Press, 1988 |
| Descrizione fisica | 1 online resource (452 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Database security Telecommunication - Security measures |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910872502603321 |
| [Place of publication not identified], : IEEE Computer Society Press, 1988 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applied cryptography [[electronic resource] ] : protocols, algorithms, and source code in C / / Bruce Schneier
| Applied cryptography [[electronic resource] ] : protocols, algorithms, and source code in C / / Bruce Schneier |
| Autore | Schneier Bruce <1963-> |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | New York, : J. Wiley & Sons, c1996 |
| Descrizione fisica | 1 online resource (1 v.) : ill |
| Disciplina | 005.8/2 |
| Soggetto topico |
Computer security
Telecommunication - Security measures Cryptography |
| ISBN | 1-119-18347-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910145768303321 |
Schneier Bruce <1963->
|
||
| New York, : J. Wiley & Sons, c1996 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applied cryptography [[electronic resource] ] : protocols, algorithms, and source code in C / / Bruce Schneier
| Applied cryptography [[electronic resource] ] : protocols, algorithms, and source code in C / / Bruce Schneier |
| Autore | Schneier Bruce <1963-> |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | New York, : J. Wiley & Sons, c1996 |
| Descrizione fisica | 1 online resource (1 v.) : ill |
| Disciplina | 005.8/2 |
| Soggetto topico |
Computer security
Telecommunication - Security measures Cryptography |
| ISBN | 1-119-18347-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910831079103321 |
Schneier Bruce <1963->
|
||
| New York, : J. Wiley & Sons, c1996 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applied cryptography : protocols, algorithms, and source code in C / / Bruce Schneier
| Applied cryptography : protocols, algorithms, and source code in C / / Bruce Schneier |
| Autore | Schneier Bruce <1963-> |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | New York, : J. Wiley & Sons, c1996 |
| Descrizione fisica | 1 online resource (1 v.) : ill |
| Disciplina | 005.8/2 |
| Soggetto topico |
Computer security
Telecommunication - Security measures Cryptography |
| ISBN |
9781119183471
1119183472 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911020083003321 |
Schneier Bruce <1963->
|
||
| New York, : J. Wiley & Sons, c1996 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applied cryptography and network security : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings / / Jianying Zhou, Moti Yung (eds.)
| Applied cryptography and network security : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings / / Jianying Zhou, Moti Yung (eds.) |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | New York, : Springer, 2010 |
| Descrizione fisica | 1 online resource (XIII, 564 p. 83 illus.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
ZhouJianying
YungMoti |
| Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
| Soggetto topico |
Telecommunication - Security measures
Data encryption (Computer science) Cryptography |
| ISBN |
1-280-38725-4
9786613565174 3-642-13708-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Public Key Encryption -- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption -- How to Construct Interval Encryption from Binary Tree Encryption -- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions -- Digital Signature -- Trapdoor Sanitizable Signatures Made Easy -- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs -- Redactable Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions -- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions -- Multi-trail Statistical Saturation Attacks -- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G??? -- High Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES against First and Second-Order Differential Power Analysis -- Adaptive Chosen-Message Side-Channel Attacks -- Secure Multiplicative Masking of Power Functions -- Zero Knowledge and Multi-party Protocols -- Batch Groth–Sahai -- Efficient and Secure Evaluation of Multivariate Polynomials and Applications -- Efficient Implementation of the Orlandi Protocol -- Improving the Round Complexity of Traitor Tracing Schemes -- Key Management -- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters -- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead -- Deniable Internet Key Exchange -- Authentication and Identification -- A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm -- Secure Sketch for Multiple Secrets -- A Message Recognition Protocol Based on Standard Assumptions -- Privacy and Anonymity -- Affiliation-Hiding Key Exchange with Untrusted Group Authorities -- Privacy-Preserving Group Discovery with Linear Complexity -- Two New Efficient PIR-Writing Protocols -- Regulatory Compliant Oblivious RAM -- RFID Security and Privacy -- Revisiting Unpredictability-Based RFID Privacy Models -- On RFID Privacy with Mutual Authentication and Tag Corruption -- Internet Security -- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures -- COP: A Step toward Children Online Privacy -- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. |
| Record Nr. | UNINA-9910483910603321 |
| New York, : Springer, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applied cryptography and network security : 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 : proceedings / / Michel Abdalla ... [et al.] (eds.)
| Applied cryptography and network security : 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 : proceedings / / Michel Abdalla ... [et al.] (eds.) |
| Edizione | [1st ed. 2009.] |
| Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2009 |
| Descrizione fisica | 1 online resource (XIII, 535 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | AbdallaMichel |
| Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Telecommunication - Security measures |
| ISBN | 3-642-01957-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Key Exchange -- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys -- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results -- Secure Computation -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Efficient Robust Private Set Intersection -- Public-Key Encryption -- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual-Policy Attribute Based Encryption -- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions -- Network Security I -- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis -- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks -- Traitor Tracing -- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size -- Tracing and Revoking Pirate Rebroadcasts -- Authentication and Anonymity -- Efficient Deniable Authentication for Signatures -- Homomorphic MACs: MAC-Based Integrity for Network Coding -- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN -- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks -- Hash Functions -- Cryptanalysis of Twister -- Cryptanalysis of CubeHash -- Collision Attack on Boole -- Network Security II -- Integrity Protection for Revision Control -- Fragility of the Robust Security Network: 802.11 Denial of Service -- Fast Packet Classification Using Condition Factorization -- Lattices -- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches -- Broadcast Attacks against Lattice-Based Cryptosystems -- Partial Key Exposure Attack on CRT-RSA -- Side-Channel Attacks -- How to Compare Profiled Side-Channel Attacks? -- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis -- Attacking ECDSA-Enabled RFID Devices. |
| Altri titoli varianti | ACNS 2009 |
| Record Nr. | UNINA-9910484102303321 |
| Berlin ; ; New York, : Springer, c2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||