top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in cryptology, ASIACRYPT '94 : 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28-December 1, 1994 : proceedings / / Josef Pieprzyk, Reihanah Safavi-Naini, eds
Advances in cryptology, ASIACRYPT '94 : 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28-December 1, 1994 : proceedings / / Josef Pieprzyk, Reihanah Safavi-Naini, eds
Pubbl/distr/stampa Springer Berlin Heidelberg
Disciplina 005.8/2
Altri autori (Persone) Safavi-NainiReihanah
PieprzykJosef
Soggetto topico Computer security - Congresses
Cryptography - Congresses
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Advances in Cryptology — ASIACRYPT'94
Record Nr. UNISA-996466116503316
Springer Berlin Heidelberg
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in cryptology, ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings / / Josef Pieprzyk (editor)
Advances in cryptology, ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings / / Josef Pieprzyk (editor)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2008]
Descrizione fisica 1 online resource (XIV, 572 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer security
ISBN 3-540-89255-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multi-Party Computation -- MPC vs. SFE : Unconditional and Computational Security -- Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes -- Graph Design for Secure Multiparty Computation over Non-Abelian Groups -- Invited Talk -- Some Perspectives on Complexity-Based Cryptography -- Cryptographic Protocols I -- A Modular Security Analysis of the TLS Handshake Protocol -- Ambiguous Optimistic Fair Exchange -- Compact Proofs of Retrievability -- On the Security of HB# against a Man-in-the-Middle Attack -- Cryptographic Hash Functions I -- Hash Functions from Sigma Protocols and Improvements to VSH -- Slide Attacks on a Class of Hash Functions -- Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography -- Cryptographic Protocols II -- Universally Composable Adaptive Oblivious Transfer -- A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting -- Towards Robust Computation on Encrypted Data -- Efficient Protocols for Set Membership and Range Proofs -- Cryptographic Hash Functions II -- Preimage Attacks on 3, 4, and 5-Pass HAVAL -- How to Fill Up Merkle-Damgård Hash Functions -- Limits of Constructive Security Proofs -- Public-Key Cryptography I -- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption -- Twisted Edwards Curves Revisited -- On the Validity of the ?-Hiding Assumption in Cryptographic Protocols -- Chosen Ciphertext Security with Optimal Ciphertext Overhead -- Lattice-Based Cryptography -- Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems -- Rigorous and Efficient Short Lattice Vectors Enumeration -- Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits -- Private-Key Cryptography -- An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity -- An Improved Impossible Differential Attack on MISTY1 -- Public-Key Cryptography II -- Generalized Identity Based and Broadcast Encryption Schemes -- Speeding Up the Pollard Rho Method on Prime Fields -- Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems -- OAEP Is Secure under Key-Dependent Messages -- Analysis of Stream Ciphers -- Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks -- A New Attack on the LEX Stream Cipher -- Breaking the F-FCSR-H Stream Cipher in Real Time.
Record Nr. UNINA-9910484704403321
Berlin, Heidelberg : , : Springer-Verlag, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in cryptology, ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings / / Josef Pieprzyk (editor)
Advances in cryptology, ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings / / Josef Pieprzyk (editor)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2008]
Descrizione fisica 1 online resource (XIV, 572 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer security
ISBN 3-540-89255-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multi-Party Computation -- MPC vs. SFE : Unconditional and Computational Security -- Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes -- Graph Design for Secure Multiparty Computation over Non-Abelian Groups -- Invited Talk -- Some Perspectives on Complexity-Based Cryptography -- Cryptographic Protocols I -- A Modular Security Analysis of the TLS Handshake Protocol -- Ambiguous Optimistic Fair Exchange -- Compact Proofs of Retrievability -- On the Security of HB# against a Man-in-the-Middle Attack -- Cryptographic Hash Functions I -- Hash Functions from Sigma Protocols and Improvements to VSH -- Slide Attacks on a Class of Hash Functions -- Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography -- Cryptographic Protocols II -- Universally Composable Adaptive Oblivious Transfer -- A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting -- Towards Robust Computation on Encrypted Data -- Efficient Protocols for Set Membership and Range Proofs -- Cryptographic Hash Functions II -- Preimage Attacks on 3, 4, and 5-Pass HAVAL -- How to Fill Up Merkle-Damgård Hash Functions -- Limits of Constructive Security Proofs -- Public-Key Cryptography I -- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption -- Twisted Edwards Curves Revisited -- On the Validity of the ?-Hiding Assumption in Cryptographic Protocols -- Chosen Ciphertext Security with Optimal Ciphertext Overhead -- Lattice-Based Cryptography -- Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems -- Rigorous and Efficient Short Lattice Vectors Enumeration -- Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits -- Private-Key Cryptography -- An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity -- An Improved Impossible Differential Attack on MISTY1 -- Public-Key Cryptography II -- Generalized Identity Based and Broadcast Encryption Schemes -- Speeding Up the Pollard Rho Method on Prime Fields -- Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems -- OAEP Is Secure under Key-Dependent Messages -- Analysis of Stream Ciphers -- Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks -- A New Attack on the LEX Stream Cipher -- Breaking the F-FCSR-H Stream Cipher in Real Time.
Record Nr. UNISA-996465527903316
Berlin, Heidelberg : , : Springer-Verlag, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / / J. Seberry, J. Pieprzyk, eds
Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / / J. Seberry, J. Pieprzyk, eds
Pubbl/distr/stampa Springer Berlin Heidelberg
Disciplina 005.8/2
Altri autori (Persone) SeberryJennifer
PieprzykJosef
Soggetto topico Computer security - Congresses
Cryptography - Congresses
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465865003316
Springer Berlin Heidelberg
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptology and Network Security [[electronic resource] ] : 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings / / edited by Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis
Cryptology and Network Security [[electronic resource] ] : 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings / / edited by Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XVI, 311 p. 48 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer science—Mathematics
Coding theory
Information theory
Data structures (Computer science)
Computer security
Cryptology
Computer Communication Networks
Discrete Mathematics in Computer Science
Coding and Information Theory
Data Structures and Information Theory
Systems and Data Security
ISBN 3-642-35404-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory.
Record Nr. UNISA-996465945703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Information Security [[electronic resource] ] : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (X, 322 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Operating systems (Computers)
Management information systems
Computer science
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Operating Systems
Management of Computing and Information Systems
ISBN 3-540-44456-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multimedia Copyright Protection -- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients -- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models -- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection -- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling -- Region-Based Watermarking by Distribution Adjustment -- Hiding Information in Color Images Using Small Color Palettes -- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software -- Characteristics of Some Binary Codes for Fingerprinting -- E-Commerce -- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees -- Unlinkable Divisible Electronic Cash -- Weighted One-Way Hash Chain and Its Applications -- Linkability in Practical Electronic Cash Design -- Towards a Practical Secure Framework for Mobile Code Commerce -- Key Management -- Probabilistic Methods in Multicast Key Management -- Classification of Authentication Protocols: A Practical Approach -- Exploring Fair Exchange Protocols Using Specification Animation -- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation -- Network Security and Access Control -- An Efficient Protocol for Certified Electronic Mail -- Performance Analysis of Secure Web Server Based on SSL -- Sherlock: Commercial High Assurance Network Computing Extended Abstract -- The Role of the Development Process in Operating System Security -- Cryptographic Systems -- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization -- A Signcryption Scheme Based on Integer Factorization.
Record Nr. UNISA-996466008803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Information Security : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (X, 322 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Operating systems (Computers)
Management information systems
Computer science
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Operating Systems
Management of Computing and Information Systems
ISBN 3-540-44456-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multimedia Copyright Protection -- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients -- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models -- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection -- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling -- Region-Based Watermarking by Distribution Adjustment -- Hiding Information in Color Images Using Small Color Palettes -- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software -- Characteristics of Some Binary Codes for Fingerprinting -- E-Commerce -- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees -- Unlinkable Divisible Electronic Cash -- Weighted One-Way Hash Chain and Its Applications -- Linkability in Practical Electronic Cash Design -- Towards a Practical Secure Framework for Mobile Code Commerce -- Key Management -- Probabilistic Methods in Multicast Key Management -- Classification of Authentication Protocols: A Practical Approach -- Exploring Fair Exchange Protocols Using Specification Animation -- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation -- Network Security and Access Control -- An Efficient Protocol for Certified Electronic Mail -- Performance Analysis of Secure Web Server Based on SSL -- Sherlock: Commercial High Assurance Network Computing Extended Abstract -- The Role of the Development Process in Operating System Security -- Cryptographic Systems -- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization -- A Signcryption Scheme Based on Integer Factorization.
Record Nr. UNINA-9910143608103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II / / edited by Josef Pieprzyk, Suriadi Suriadi
Information Security and Privacy [[electronic resource] ] : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II / / edited by Josef Pieprzyk, Suriadi Suriadi
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVII, 471 p. 93 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-319-59870-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public key encryption -- Attribute-based encryption -- Identity-based encryption -- Searchable encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography.
Record Nr. UNISA-996466283403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I / / edited by Josef Pieprzyk, Suriadi Suriadi
Information Security and Privacy [[electronic resource] ] : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I / / edited by Josef Pieprzyk, Suriadi Suriadi
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXIX, 471 p. 75 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-319-60055-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public key encryption -- Attribute-based encryption -- Identity-based encryption -- Searchable encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography.
Record Nr. UNISA-996466289903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II / / edited by Josef Pieprzyk, Suriadi Suriadi
Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II / / edited by Josef Pieprzyk, Suriadi Suriadi
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVII, 471 p. 93 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-319-59870-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public key encryption -- Attribute-based encryption -- Identity-based encryption -- Searchable encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography.
Record Nr. UNINA-9910483788303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui