top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Identity management for internet of things / / Parikshit N. Mahalle, Poonam N. Railkar
Identity management for internet of things / / Parikshit N. Mahalle, Poonam N. Railkar
Autore Mahalle Parikshit N.
Pubbl/distr/stampa Aalborg, Denmark : , : River Publishers, , 2015
Descrizione fisica 1 online resource (185 pages) : illustrations (some color), charts, tables
Disciplina 004.678
Collana River Publishers Series in Communications
Soggetto topico Internet of things
Ubiquitous computing - Security measures
Computers - Access control
Soggetto genere / forma Electronic books.
ISBN 87-93102-91-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910465768603321
Mahalle Parikshit N.  
Aalborg, Denmark : , : River Publishers, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security theory and practice : smart devices, pervasive systems, and ubiquitous networks : third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 : proceedings / / Olivier Markowitch ... [et al.] (eds.)
Information security theory and practice : smart devices, pervasive systems, and ubiquitous networks : third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 : proceedings / / Olivier Markowitch ... [et al.] (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2009
Descrizione fisica 1 online resource (XII, 167 p.)
Disciplina 005.8
Altri autori (Persone) MarkowitchOlivier
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Data protection
Computer systems - Access control
Smart cards
Mobile computing - Security measures
Ubiquitous computing - Security measures
ISBN 3-642-03944-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mobility -- On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks -- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems -- Privacy-Aware Location Database Service for Granular Queries -- Attacks and Secure Implementations -- Algebraic Attacks on RFID Protocols -- Anti-counterfeiting Using Memory Spots -- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations -- Performance and Security -- Measurement Analysis When Benchmarking Java Card Platforms -- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card -- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks -- Cryptography -- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks -- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure -- PKIX Certificate Status in Hybrid MANETs.
Altri titoli varianti WISTP 2009
IFIP WG 11.2 International Workshop, WISTP 2009
Record Nr. UNINA-9910483237203321
Berlin ; ; New York, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security theory and practices : smart cards, mobile and ubiquitous computing systems : First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, proceedings / / Damien Sauveron [three others] (editors)
Information security theory and practices : smart cards, mobile and ubiquitous computing systems : First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, proceedings / / Damien Sauveron [three others] (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg ; ; New York : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (260 p.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Data protection
Computer systems - Access control
Smart cards
Mobile computing - Security measures
Ubiquitous computing - Security measures
ISBN 3-540-72354-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mobility -- A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks -- A New Resilient Key Management Protocol for Wireless Sensor Networks -- Hardware and Cryptography I -- Efficient Use of Random Delays in Embedded Software -- Enhanced Doubling Attacks on Signed-All-Bits Set Recoding -- Privacy -- Securing the Distribution and Storage of Secrets with Trusted Platform Modules -- Distributed Certified Information Access for Mobile Devices -- Cryptography Scheme -- Linkability of Some Blind Signature Schemes -- Optimistic Non-repudiation Protocol Analysis -- Secure Remote User Authentication Scheme Using Bilinear Pairings -- Cryptanalysis of Some Proxy Signature Schemes Without Certificates -- Smart Card -- Performance Evaluation of Java Card Bytecodes -- Reverse Engineering Java Card Applets Using Power Analysis -- An Embedded System for Practical Security Analysis of Contactless Smartcards -- A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies -- Small Devices -- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication -- An Information Flow Verifier for Small Embedded Systems -- Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks -- Hardware and Cryptography II -- Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures -- CRT RSA Algorithm Protected Against Fault Attacks -- Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.
Record Nr. UNINA-9910483739103321
Berlin ; ; Heidelberg ; ; New York : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security theory and practices : smart cards, mobile and ubiquitous computing systems : First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, proceedings / / Damien Sauveron [three others] (editors)
Information security theory and practices : smart cards, mobile and ubiquitous computing systems : First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, proceedings / / Damien Sauveron [three others] (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg ; ; New York : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (260 p.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Data protection
Computer systems - Access control
Smart cards
Mobile computing - Security measures
Ubiquitous computing - Security measures
ISBN 3-540-72354-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mobility -- A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks -- A New Resilient Key Management Protocol for Wireless Sensor Networks -- Hardware and Cryptography I -- Efficient Use of Random Delays in Embedded Software -- Enhanced Doubling Attacks on Signed-All-Bits Set Recoding -- Privacy -- Securing the Distribution and Storage of Secrets with Trusted Platform Modules -- Distributed Certified Information Access for Mobile Devices -- Cryptography Scheme -- Linkability of Some Blind Signature Schemes -- Optimistic Non-repudiation Protocol Analysis -- Secure Remote User Authentication Scheme Using Bilinear Pairings -- Cryptanalysis of Some Proxy Signature Schemes Without Certificates -- Smart Card -- Performance Evaluation of Java Card Bytecodes -- Reverse Engineering Java Card Applets Using Power Analysis -- An Embedded System for Practical Security Analysis of Contactless Smartcards -- A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies -- Small Devices -- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication -- An Information Flow Verifier for Small Embedded Systems -- Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks -- Hardware and Cryptography II -- Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures -- CRT RSA Algorithm Protected Against Fault Attacks -- Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.
Record Nr. UNISA-996465991403316
Berlin ; ; Heidelberg ; ; New York : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Proceedings : Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : SecPerU 2007 : 19 July, 2007, Istanbul, Turkey
Proceedings : Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : SecPerU 2007 : 19 July, 2007, Istanbul, Turkey
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2007
Soggetto topico Ubiquitous computing - Security measures
Wireless communication systems
Engineering & Applied Sciences
Computer Science
ISBN 1-5090-8749-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996202060503316
[Place of publication not identified], : IEEE Computer Society, 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Proceedings : Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : SecPerU 2007 : 19 July, 2007, Istanbul, Turkey
Proceedings : Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : SecPerU 2007 : 19 July, 2007, Istanbul, Turkey
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2007
Soggetto topico Ubiquitous computing - Security measures
Wireless communication systems
Engineering & Applied Sciences
Computer Science
ISBN 1-5090-8749-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910142655203321
[Place of publication not identified], : IEEE Computer Society, 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
SecPerU 2006 : Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France
SecPerU 2006 : Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2006
Disciplina 005.4
Soggetto topico Ubiquitous computing - Security measures
Wireless communication systems
Engineering & Applied Sciences
Computer Science
ISBN 1-5090-9476-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996197577803316
[Place of publication not identified], : IEEE Computer Society, 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
SecPerU 2006 : Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France
SecPerU 2006 : Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2006
Disciplina 005.4
Soggetto topico Ubiquitous computing - Security measures
Wireless communication systems
Engineering & Applied Sciences
Computer Science
ISBN 1-5090-9476-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910145620503321
[Place of publication not identified], : IEEE Computer Society, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui