2006 IEEE Symposium on Security and Privacy : (S & P 2006) : proceedings : 21-24 May, 2006, Berkeley/Oakland, California |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2006 |
Soggetto topico |
Computers - Access control
Telecommunication - Security measures |
ISBN | 1-5090-9835-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996197570203316 |
[Place of publication not identified], : IEEE Computer Society, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
2006 IEEE Symposium on Security and Privacy : (S & P 2006) : proceedings : 21-24 May, 2006, Berkeley/Oakland, California |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2006 |
Soggetto topico |
Computers - Access control
Telecommunication - Security measures |
ISBN |
9781509098354
1509098356 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145617403321 |
[Place of publication not identified], : IEEE Computer Society, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Aerospace Computer Security Applications 4th Conference, 1988: Proceedings |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society Press, 1988 |
Descrizione fisica | 1 online resource (452 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Database security Telecommunication - Security measures |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996215152303316 |
[Place of publication not identified], : IEEE Computer Society Press, 1988 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Aerospace Computer Security Applications 4th Conference, 1988: Proceedings |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society Press, 1988 |
Descrizione fisica | 1 online resource (452 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Database security Telecommunication - Security measures |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910872502603321 |
[Place of publication not identified], : IEEE Computer Society Press, 1988 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied cryptography [[electronic resource] ] : protocols, algorithms, and source code in C / / Bruce Schneier |
Autore | Schneier Bruce <1963-> |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | New York, : J. Wiley & Sons, c1996 |
Descrizione fisica | 1 online resource (1 v.) : ill |
Disciplina | 005.8/2 |
Soggetto topico |
Computer security
Telecommunication - Security measures Cryptography |
ISBN | 1-119-18347-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145768303321 |
Schneier Bruce <1963-> | ||
New York, : J. Wiley & Sons, c1996 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied cryptography [[electronic resource] ] : protocols, algorithms, and source code in C / / Bruce Schneier |
Autore | Schneier Bruce <1963-> |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | New York, : J. Wiley & Sons, c1996 |
Descrizione fisica | 1 online resource (1 v.) : ill |
Disciplina | 005.8/2 |
Soggetto topico |
Computer security
Telecommunication - Security measures Cryptography |
ISBN | 1-119-18347-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910831079103321 |
Schneier Bruce <1963-> | ||
New York, : J. Wiley & Sons, c1996 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied cryptography : protocols, algorithms, and source code in C / / Bruce Schneier |
Autore | Schneier Bruce <1963-> |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | New York, : J. Wiley & Sons, c1996 |
Descrizione fisica | 1 online resource (1 v.) : ill |
Disciplina | 005.8/2 |
Soggetto topico |
Computer security
Telecommunication - Security measures Cryptography |
ISBN |
9781119183471
1119183472 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910877747003321 |
Schneier Bruce <1963-> | ||
New York, : J. Wiley & Sons, c1996 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied cryptography and network security : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings / / Jianying Zhou, Moti Yung (eds.) |
Edizione | [1st ed.] |
Pubbl/distr/stampa | New York, : Springer, 2010 |
Descrizione fisica | 1 online resource (XIII, 564 p. 83 illus.) |
Disciplina | 005.8 |
Altri autori (Persone) |
ZhouJianying
YungMoti |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Telecommunication - Security measures
Data encryption (Computer science) Cryptography |
ISBN |
1-280-38725-4
9786613565174 3-642-13708-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public Key Encryption -- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption -- How to Construct Interval Encryption from Binary Tree Encryption -- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions -- Digital Signature -- Trapdoor Sanitizable Signatures Made Easy -- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs -- Redactable Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions -- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions -- Multi-trail Statistical Saturation Attacks -- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G??? -- High Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES against First and Second-Order Differential Power Analysis -- Adaptive Chosen-Message Side-Channel Attacks -- Secure Multiplicative Masking of Power Functions -- Zero Knowledge and Multi-party Protocols -- Batch Groth–Sahai -- Efficient and Secure Evaluation of Multivariate Polynomials and Applications -- Efficient Implementation of the Orlandi Protocol -- Improving the Round Complexity of Traitor Tracing Schemes -- Key Management -- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters -- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead -- Deniable Internet Key Exchange -- Authentication and Identification -- A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm -- Secure Sketch for Multiple Secrets -- A Message Recognition Protocol Based on Standard Assumptions -- Privacy and Anonymity -- Affiliation-Hiding Key Exchange with Untrusted Group Authorities -- Privacy-Preserving Group Discovery with Linear Complexity -- Two New Efficient PIR-Writing Protocols -- Regulatory Compliant Oblivious RAM -- RFID Security and Privacy -- Revisiting Unpredictability-Based RFID Privacy Models -- On RFID Privacy with Mutual Authentication and Tag Corruption -- Internet Security -- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures -- COP: A Step toward Children Online Privacy -- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. |
Record Nr. | UNINA-9910483910603321 |
New York, : Springer, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied cryptography and network security : 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 : proceedings / / Michel Abdalla ... [et al.] (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2009 |
Descrizione fisica | 1 online resource (XIII, 535 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | AbdallaMichel |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) Telecommunication - Security measures |
ISBN | 3-642-01957-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key Exchange -- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys -- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results -- Secure Computation -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Efficient Robust Private Set Intersection -- Public-Key Encryption -- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual-Policy Attribute Based Encryption -- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions -- Network Security I -- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis -- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks -- Traitor Tracing -- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size -- Tracing and Revoking Pirate Rebroadcasts -- Authentication and Anonymity -- Efficient Deniable Authentication for Signatures -- Homomorphic MACs: MAC-Based Integrity for Network Coding -- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN -- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks -- Hash Functions -- Cryptanalysis of Twister -- Cryptanalysis of CubeHash -- Collision Attack on Boole -- Network Security II -- Integrity Protection for Revision Control -- Fragility of the Robust Security Network: 802.11 Denial of Service -- Fast Packet Classification Using Condition Factorization -- Lattices -- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches -- Broadcast Attacks against Lattice-Based Cryptosystems -- Partial Key Exposure Attack on CRT-RSA -- Side-Channel Attacks -- How to Compare Profiled Side-Channel Attacks? -- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis -- Attacking ECDSA-Enabled RFID Devices. |
Altri titoli varianti | ACNS 2009 |
Record Nr. | UNINA-9910484102303321 |
Berlin ; ; New York, : Springer, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied cryptography and network security : 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008 : proceedings / / Steven M. Bellovin ... [et al.] (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2008 |
Descrizione fisica | 1 online resource (XI, 508 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | BellovinSteven M |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Telecommunication - Security measures
Data encryption (Computer science) Cryptography |
ISBN | 3-540-68914-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On the Effectiveness of Internal Patching Against File-Sharing Worms -- Peeking Through the Cloud: DNS-Based Estimation and Its Applications -- Pushback for Overlay Networks: Protecting Against Malicious Insiders -- PPAA: Peer-to-Peer Anonymous Authentication -- Generic Constructions of Stateful Public Key Encryption and Their Applications -- Traceable and Retrievable Identity-Based Encryption -- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures -- Attacking Reduced Round SHA-256 -- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography -- Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA? -- Replay Attack in a Fair Exchange Protocol -- Improved Conditional E-Payments -- Anonymity in Transferable E-cash -- Generic Security-Amplifying Methods of Ordinary Digital Signatures -- New Differential-Algebraic Attacks and Reparametrization of Rainbow -- Trapdoor Sanitizable Signatures and Their Application to Content Protection -- Multi-factor Authenticated Key Exchange -- Repelling Detour Attack Against Onions with Re-encryption -- Analysis of EAP-GPSK Authentication Protocol -- Efficient Device Pairing Using “Human-Comparable” Synchronized Audiovisual Patterns -- PUF-HB: A Tamper-Resilient HB Based Authentication Protocol -- An Authentication Scheme Based on the Twisted Conjugacy Problem -- Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance -- A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation -- On the Security of the CCM Encryption Mode and of a Slight Variant -- wNAF *, an Efficient Left-to-Right Signed Digit Recoding Algorithm -- A Very Compact “Perfectly Masked” S-Box for AES -- Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks -- Traceable Privacy of Recent Provably-Secure RFID Protocols -- The Security of EPC Gen2 Compliant RFID Protocols. |
Altri titoli varianti | ACNS 2008 |
Record Nr. | UNINA-9910483820803321 |
Berlin ; ; New York, : Springer, 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|