Computer security / Dieter Gollmann |
Autore | Gollmann, Dieter |
Edizione | [3. ed.] |
Pubbl/distr/stampa | Chichester : John Wiley & Sons, 2011 |
Descrizione fisica | XIX, 436 p. : tab., fig. ; 24 cm |
Disciplina |
004.16
005.8 |
Soggetto non controllato | Archivi di datiSicurezza |
ISBN | 978-0-470-74115-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Titolo uniforme | |
Record Nr. | UNIPARTHENOPE-000028584 |
Gollmann, Dieter
![]() |
||
Chichester : John Wiley & Sons, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Parthenope | ||
|
Computer security--ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings / / Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.) |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2005 |
Descrizione fisica | 1 online resource (XII, 516 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
De Capitani di VimercatiSabrina
SyversonPaul F GollmannDieter |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Computers - Access control |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation in the Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols. |
Altri titoli varianti |
Computer security
ESORICS 2005 10th European Symposium on Research in Computer Security Tenth European Symposium on Research in Computer Security European Symposium on Research in Computer Security |
Record Nr. | UNINA-9910484150903321 |
Berlin ; ; New York, : Springer, 2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer security--ESORICS 2006 : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006 : proceedings / / Dieter Gollmann, Jan Meier, Andrei Sabelfeld (eds.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, : Springer, 2006 |
Descrizione fisica | 1 online resource (XII, 550 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
GollmannDieter
MeierJan <1977-> SabelfeldAndrei |
Collana |
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science |
Soggetto topico |
Computer security
Computers - Access control |
ISBN | 3-540-44605-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. |
Altri titoli varianti |
ESORICS 2006
11th European Symposium on Research in Computer Security Eleventh European Symposium on Research in Computer Security European Symposium on Research in Computer Security |
Record Nr. | UNINA-9910483259103321 |
Berlin, : Springer, 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security / / Dieter Gollmann |
Autore | Gollmann Dieter |
Pubbl/distr/stampa | New York NY : , : ACM, , 2018 |
Descrizione fisica | 1 online resource (73 pages) |
Disciplina | 006.3 |
Soggetto topico | Computational intelligence |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910375967103321 |
Gollmann Dieter
![]() |
||
New York NY : , : ACM, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the Ninth International Conference on Mathematics and Computing : ICMC 2023 / / edited by Debasis Giri, Dieter Gollmann, S. Ponnusamy, Sakurai Kouichi, Predrag S. Stanimirović, J. K. Sahoo |
Autore | Giri Debasis |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (433 pages) |
Disciplina | 004.0151 |
Altri autori (Persone) |
GollmannDieter
PonnusamyS KouichiSakurai StanimirovićPredrag S SahooJ. K |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Computer networks - Security measures Cloud computing Blockchains (Databases) Data protection Computational Intelligence Artificial Intelligence Mobile and Network Security Cloud Computing Blockchain Data and Information Security |
ISBN |
9789819930807
9819930804 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Verifiable Delay Function Based on Non-linear Hybrid Cellular Automata -- Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack -- MILP Modeling of S-Box: Divide and Merge Approach -- A Relation between Properties of S-Box and Linear Inequalities of DDT -- Damage Level Estimation of Rubble-Mound Breakwaters using Deep Artificial Neural Network -- Facial Image Manipulation Detection using Cellular Automata and Transfer Learning -- Language Independent Fake News Detection Over Social Media Networks using Centrality Aware Graph Convolution Network -- Private Blockchain Enabled Security Framework for IoT-Based Healthcare System -- GradeChain: A Hyperledger Fabric Blockchain Based Students’ Grading System for Educational Institute -- Object-Background Partitioning on Images: A Ratio Based Division -- More on Semipositive Tensor and Tensor Complementarity Problem. |
Record Nr. | UNINA-9910736017803321 |
Giri Debasis
![]() |
||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart card research and advanced application : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010 : proeedings / / [edited by] Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny |
Edizione | [1st ed.] |
Pubbl/distr/stampa | New York, : Springer, 2010 |
Descrizione fisica | 1 online resource (X, 239 p. 78 illus.) |
Disciplina | 004.6 |
Altri autori (Persone) |
GollmannDieter
LanetJean-Louis Iguchi-CartignyJulien |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico | Smart cards |
ISBN |
1-280-38627-4
9786613564191 3-642-12510-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Mathematical Algorithms -- The Polynomial Composition Problem in (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme. |
Record Nr. | UNINA-9910483369703321 |
New York, : Springer, 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|