top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer security / Dieter Gollmann
Computer security / Dieter Gollmann
Autore Gollmann, Dieter
Edizione [3. ed.]
Pubbl/distr/stampa Chichester : John Wiley & Sons, 2011
Descrizione fisica XIX, 436 p. : tab., fig. ; 24 cm
Disciplina 004.16
005.8
Soggetto non controllato Archivi di datiSicurezza
ISBN 978-0-470-74115-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Titolo uniforme
Record Nr. UNIPARTHENOPE-000028584
Gollmann, Dieter  
Chichester : John Wiley & Sons, 2011
Materiale a stampa
Lo trovi qui: Univ. Parthenope
Opac: Controlla la disponibilità qui
Computer security--ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings / / Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)
Computer security--ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings / / Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, 2005
Descrizione fisica 1 online resource (XII, 516 p.)
Disciplina 005.8
Altri autori (Persone) De Capitani di VimercatiSabrina
SyversonPaul F
GollmannDieter
Collana Lecture notes in computer science
Soggetto topico Computer security
Computers - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation in the Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols.
Altri titoli varianti Computer security
ESORICS 2005
10th European Symposium on Research in Computer Security
Tenth European Symposium on Research in Computer Security
European Symposium on Research in Computer Security
Record Nr. UNINA-9910484150903321
Berlin ; ; New York, : Springer, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer security--ESORICS 2006 : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006 : proceedings / / Dieter Gollmann, Jan Meier, Andrei Sabelfeld (eds.)
Computer security--ESORICS 2006 : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006 : proceedings / / Dieter Gollmann, Jan Meier, Andrei Sabelfeld (eds.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, : Springer, 2006
Descrizione fisica 1 online resource (XII, 550 p.)
Disciplina 005.8
Altri autori (Persone) GollmannDieter
MeierJan <1977->
SabelfeldAndrei
Collana LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science
Soggetto topico Computer security
Computers - Access control
ISBN 3-540-44605-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Altri titoli varianti ESORICS 2006
11th European Symposium on Research in Computer Security
Eleventh European Symposium on Research in Computer Security
European Symposium on Research in Computer Security
Record Nr. UNINA-9910483259103321
Berlin, : Springer, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security / / Dieter Gollmann
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security / / Dieter Gollmann
Autore Gollmann Dieter
Pubbl/distr/stampa New York NY : , : ACM, , 2018
Descrizione fisica 1 online resource (73 pages)
Disciplina 006.3
Soggetto topico Computational intelligence
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910375967103321
Gollmann Dieter  
New York NY : , : ACM, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the Ninth International Conference on Mathematics and Computing : ICMC 2023 / / edited by Debasis Giri, Dieter Gollmann, S. Ponnusamy, Sakurai Kouichi, Predrag S. Stanimirović, J. K. Sahoo
Proceedings of the Ninth International Conference on Mathematics and Computing : ICMC 2023 / / edited by Debasis Giri, Dieter Gollmann, S. Ponnusamy, Sakurai Kouichi, Predrag S. Stanimirović, J. K. Sahoo
Autore Giri Debasis
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (433 pages)
Disciplina 004.0151
Altri autori (Persone) GollmannDieter
PonnusamyS
KouichiSakurai
StanimirovićPredrag S
SahooJ. K
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Computer networks - Security measures
Cloud computing
Blockchains (Databases)
Data protection
Computational Intelligence
Artificial Intelligence
Mobile and Network Security
Cloud Computing
Blockchain
Data and Information Security
ISBN 9789819930807
9819930804
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Verifiable Delay Function Based on Non-linear Hybrid Cellular Automata -- Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack -- MILP Modeling of S-Box: Divide and Merge Approach -- A Relation between Properties of S-Box and Linear Inequalities of DDT -- Damage Level Estimation of Rubble-Mound Breakwaters using Deep Artificial Neural Network -- Facial Image Manipulation Detection using Cellular Automata and Transfer Learning -- Language Independent Fake News Detection Over Social Media Networks using Centrality Aware Graph Convolution Network -- Private Blockchain Enabled Security Framework for IoT-Based Healthcare System -- GradeChain: A Hyperledger Fabric Blockchain Based Students’ Grading System for Educational Institute -- Object-Background Partitioning on Images: A Ratio Based Division -- More on Semipositive Tensor and Tensor Complementarity Problem.
Record Nr. UNINA-9910736017803321
Giri Debasis  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart card research and advanced application : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proeedings / / [edited by] Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny
Smart card research and advanced application : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proeedings / / [edited by] Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny
Edizione [1st ed.]
Pubbl/distr/stampa New York, : Springer, 2010
Descrizione fisica 1 online resource (X, 239 p. 78 illus.)
Disciplina 004.6
Altri autori (Persone) GollmannDieter
LanetJean-Louis
Iguchi-CartignyJulien
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Smart cards
ISBN 1-280-38627-4
9786613564191
3-642-12510-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mathematical Algorithms -- The Polynomial Composition Problem in (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme.
Record Nr. UNINA-9910483369703321
New York, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui