top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Autore Lu Wei
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Springer Nature, 2020
Descrizione fisica 1 online resource (X, 235 p. 108 illus., 70 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer communication systems
Application software
Architecture, Computer
Data encryption (Computer science)
Computer networks - Security measures
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Soggetto non controllato Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Data and Information Security
Computer and Information Systems Applications
communication channels (information theory)
communication systems
computer crime
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data security
databases
network protocols
network security
sensors
signal processing
telecommunication networks
telecommunication systems
telecommunication traffic
wireless telecommunication systems
Network hardware
Information retrieval
Internet searching
Systems analysis & design
Coding theory & cryptology
Data encryption
ISBN 981-334-922-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.
Record Nr. UNINA-9910447240103321
Lu Wei  
Springer Nature, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Autore Lu Wei
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Springer Nature, 2020
Descrizione fisica 1 online resource (X, 235 p. 108 illus., 70 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer communication systems
Application software
Architecture, Computer
Data encryption (Computer science)
Computer networks - Security measures
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Soggetto non controllato Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Data and Information Security
Computer and Information Systems Applications
communication channels (information theory)
communication systems
computer crime
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data security
databases
network protocols
network security
sensors
signal processing
telecommunication networks
telecommunication systems
telecommunication traffic
wireless telecommunication systems
Network hardware
Information retrieval
Internet searching
Systems analysis & design
Coding theory & cryptology
Data encryption
ISBN 981-334-922-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.
Record Nr. UNISA-996465362903316
Lu Wei  
Springer Nature, 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
GDPR and Biobanking [[electronic resource] ] : Individual Rights, Public Interest and Research Regulation across Europe / / edited by Santa Slokenberga, Olga Tzortzatou, Jane Reichel
GDPR and Biobanking [[electronic resource] ] : Individual Rights, Public Interest and Research Regulation across Europe / / edited by Santa Slokenberga, Olga Tzortzatou, Jane Reichel
Autore Slokenberga Santa
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Springer Nature, 2021
Descrizione fisica 1 online resource (VII, 434 p. 6 illus.)
Disciplina 341.2422
Collana Law, Governance and Technology Series
Soggetto topico Law—Europe
Computer security
Human genetics
European Law
Systems and Data Security
Human Genetics
Soggetto non controllato European Law
Systems and Data Security
Human Genetics
Data and Information Security
Medical Genetics
Biobank research
GDPR
Article 89 GDPR
Data protection
Informational privacy
ELSI in genetics and genomics
Human specimens
Research Governance
Public interest
Regulatory framework
Open Access
International law
Computer security
Network security
ISBN 3-030-49388-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I Setting the scene -- Introduction: Individual rights, the public interest and biobank research 4000 (8) -- Genetic data and privacy protection -- Part II GDPR and European responses -- Biobank governance and the impact of the GDPR on the regulation of biobank research -- Controller’ and processor’s responsibilities in biobank research under GDPR -- Individual rights in biobank research under GDPR -- Safeguards and derogations relating to processing for archiving purposes in the scientific purposes: Article 89 analysis for biobank research -- A Pan-European analysis of Article 89 implementation and national biobank research regulations -- EEA, Switzerland analysis of GDPR requirements and national biobank research regulations -- Part III National insights in biobank regulatory frameworks -- Selected 10-15 countries for reports: Germany -- Greece -- France -- Finland -- Sweden -- United Kingdom -- Part IV Conclusions -- Reflections on individual rights, the public interest and biobank research, ramifications and ways forward. .
Record Nr. UNINA-9910433228403321
Slokenberga Santa  
Springer Nature, 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
International Symposium on Mathematics, Quantum Theory, and Cryptography [[electronic resource] ] : Proceedings of MQC 2019 / / edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu
International Symposium on Mathematics, Quantum Theory, and Cryptography [[electronic resource] ] : Proceedings of MQC 2019 / / edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu
Autore Takagi Tsuyoshi
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Springer Nature, 2021
Descrizione fisica 1 online resource (XII, 274 p. 83 illus., 24 illus. in color.)
Disciplina 519
Collana Mathematics for Industry
Soggetto topico Applied mathematics
Engineering mathematics
Data structures (Computer science)
Quantum computers
Computer security
Mathematical and Computational Engineering
Data Structures and Information Theory
Quantum Computing
Systems and Data Security
Soggetto non controllato Mathematical and Computational Engineering
Data Structures and Information Theory
Quantum Computing
Systems and Data Security
Mathematical and Computational Engineering Applications
Data and Information Security
Cryptography for Quantum Computers
Post-quantum Cryptography
Number Theory
Representation Theory
Quantum Physics
Security Modelling
Open Access
Maths for engineers
Algorithms & data structures
Information theory
Mathematical theory of computation
Computer security
Network security
ISBN 981-15-5191-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation.
Record Nr. UNINA-9910424948503321
Takagi Tsuyoshi  
Springer Nature, 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
International Symposium on Mathematics, Quantum Theory, and Cryptography [[electronic resource] ] : Proceedings of MQC 2019 / / edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu
International Symposium on Mathematics, Quantum Theory, and Cryptography [[electronic resource] ] : Proceedings of MQC 2019 / / edited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu
Autore Takagi Tsuyoshi
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Springer Nature, 2021
Descrizione fisica 1 online resource (XII, 274 p. 83 illus., 24 illus. in color.)
Disciplina 519
Collana Mathematics for Industry
Soggetto topico Applied mathematics
Engineering mathematics
Data structures (Computer science)
Quantum computers
Computer security
Mathematical and Computational Engineering
Data Structures and Information Theory
Quantum Computing
Systems and Data Security
Soggetto non controllato Mathematical and Computational Engineering
Data Structures and Information Theory
Quantum Computing
Systems and Data Security
Mathematical and Computational Engineering Applications
Data and Information Security
Cryptography for Quantum Computers
Post-quantum Cryptography
Number Theory
Representation Theory
Quantum Physics
Security Modelling
Open Access
Maths for engineers
Algorithms & data structures
Information theory
Mathematical theory of computation
Computer security
Network security
ISBN 981-15-5191-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation.
Record Nr. UNISA-996466557703316
Takagi Tsuyoshi  
Springer Nature, 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security of Ubiquitous Computing Systems [[electronic resource] ] : Selected Topics / / edited by Gildas Avoine, Julio Hernandez-Castro
Security of Ubiquitous Computing Systems [[electronic resource] ] : Selected Topics / / edited by Gildas Avoine, Julio Hernandez-Castro
Autore Avoine Gildas
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Springer Nature, 2021
Descrizione fisica 1 online resource (XVIII, 265 p. 25 illus., 8 illus. in color.)
Disciplina 005.8
Soggetto topico Computer security
Computer engineering
Internet of things
Embedded computer systems
Computer software
System safety
Systems and Data Security
Cyber-physical systems, IoT
Professional Computing
Security Science and Technology
Soggetto non controllato Systems and Data Security
Cyber-physical systems, IoT
Professional Computing
Security Science and Technology
Data and Information Security
Internet of Things
Cryptology
Cryptacus
Security
Ubiquitous Devices
Lightweight Cryptography
Symmetric Cryptography
Side-Channel Analysis
IoT Security
Ubiquitous Computing Systems
Open Access
Computer security
Network security
Electrical engineering
Cybernetics & systems theory
Applied computing
Security & fire alarm systems
ISBN 3-030-10591-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.
Record Nr. UNINA-9910473459903321
Avoine Gildas  
Springer Nature, 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security of Ubiquitous Computing Systems [[electronic resource] ] : Selected Topics / / edited by Gildas Avoine, Julio Hernandez-Castro
Security of Ubiquitous Computing Systems [[electronic resource] ] : Selected Topics / / edited by Gildas Avoine, Julio Hernandez-Castro
Autore Avoine Gildas
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Springer Nature, 2021
Descrizione fisica 1 online resource (XVIII, 265 p. 25 illus., 8 illus. in color.)
Disciplina 005.8
Soggetto topico Computer security
Computer engineering
Internet of things
Embedded computer systems
Computer software
System safety
Systems and Data Security
Cyber-physical systems, IoT
Professional Computing
Security Science and Technology
Soggetto non controllato Systems and Data Security
Cyber-physical systems, IoT
Professional Computing
Security Science and Technology
Data and Information Security
Internet of Things
Cryptology
Cryptacus
Security
Ubiquitous Devices
Lightweight Cryptography
Symmetric Cryptography
Side-Channel Analysis
IoT Security
Ubiquitous Computing Systems
Open Access
Computer security
Network security
Electrical engineering
Cybernetics & systems theory
Applied computing
Security & fire alarm systems
ISBN 3-030-10591-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.
Record Nr. UNISA-996464447403316
Avoine Gildas  
Springer Nature, 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui