top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers / Bruce Christianson [and others] (eds.).
Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers / Bruce Christianson [and others] (eds.).
Creatore [International Workshop on Security Protocols (11th : 2003 : Cambridge, England)]
Estensione 1 online resource (ix, 349 pages) : illustrations.
Disciplina 005.8
Accesso persona Christianson, Bruce
Genere/Forma Electronic books
Conference papers and proceedings
Kongress
ISBN 9783540318361
3540318364
3540283897
9783540283898
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004610056
[International Workshop on Security Protocols (11th : 2003 : Cambridge, England)]  
Materiale a stampa
Lo trovi qui: New York University
Trustworthy global computing : international symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005 : revised selected papers / Rocco De Nicola, Davide Sangiorgi (eds.).
Trustworthy global computing : international symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005 : revised selected papers / Rocco De Nicola, Davide Sangiorgi (eds.).
Creatore [TGC 2005 (2005 : Edinburgh, Scotland)]
Estensione 1 online resource (viii, 369 pages) : illustrations.
Disciplina 005.8
Accesso persona De Nicola, Rocco
Sangiorgi, Davide
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783540314837
3540314830
3540300074
9783540300076
Classificazione 54.32
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004610094
[TGC 2005 (2005 : Edinburgh, Scotland)]  
Materiale a stampa
Lo trovi qui: New York University
Information security and privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001 : proceedings / Vijay Varadharajan, Yi Mu, (Eds.).
Information security and privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001 : proceedings / Vijay Varadharajan, Yi Mu, (Eds.).
Creatore [ACISP (Conference) (6th : 2001 : Sydney, N.S.W.)]
Estensione 1 online resource (xi, 522 pages) : illustrations.
Disciplina 005.8
Accesso persona Varadharajan, Vijay
Mu, Yi, 1955-
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783540477198
3540477195
3540423001
9783540423003
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Few Thoughts on E-Commerce -- New CBC-MAC Forgery Attacks -- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000 -- Improved Cryptanalysis of the Self-Shrinking Generator -- Attacks Based on Small Factors in Various Group Structures -- On Classifying Conference Key Distribution Protocols -- Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI -- New Public-Key Cryptosystem Using Divisor Class Groups -- First Implementation of Cryptographic Protocols Based on Algebraic Number Fields -- Practical Key Recovery Schemes -- Non-deterministic Processors -- Personal Secure Booting -- Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules -- A Strategy for MLS Workflow -- Condition-Driven Integration of Security Services -- SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes -- Secure and Private Distribution of Online Video and Some Related Cryptographic Issues -- Private Information Retrieval Based on the Subgroup Membership Problem -- A Practical English Auction with One-Time Registration -- A User Authentication Scheme with Identity and Location Privacy -- An End-to-End Authentication Protocol in Wireless Application Protocol -- Error Detection and Authentication in Quantum Key Distribution -- An Axiomatic Basis for Reasoning about Trust in PKIs -- A Knowledge-Based Approach to Internet Authorizations -- Applications of Trusted Review to Information Security -- Network Security Modeling and Cyber Attack Simulation Methodology -- Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks -- Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS -- Improving the Availability of Time-Stamping Services -- Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group -- Democratic Systems -- Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme -- Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates -- How to Construct Fail-Stop Confirmer Signature Schemes -- Signature Schemes Based on 3rd Order Shift Registers -- Anonymous Statistical Survey of Attributes -- Secure Mobile Agent Using Strong Non-designated Proxy Signature -- Elliptic Curve Based Password Authenticated Key Exchange Protocols -- Elliptic Curve Cryptography on a Palm OS Device -- Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field.
Record Nr. NYU-004610226
[ACISP (Conference) (6th : 2001 : Sydney, N.S.W.)]  
Materiale a stampa
Lo trovi qui: New York University
Formal aspects in security and trust : third international workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005 : revised selected papers / Theo Dimitrakos [and others] (eds.).
Formal aspects in security and trust : third international workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005 : revised selected papers / Theo Dimitrakos [and others] (eds.).
Creatore [FAST (Workshop) (3rd : 2005 : Newcastle upon Tyne, England)]
Estensione 1 online resource (x, 257 pages) : illustrations.
Disciplina 005.8
Accesso persona Dimitrakos, Theo
Genere/Forma Electronic books
Conference papers and proceedings
Kongress
ISBN 9783540326298
3540326294
3540326286
9783540326281
Classificazione TP309-532
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004610422
[FAST (Workshop) (3rd : 2005 : Newcastle upon Tyne, England)]  
Materiale a stampa
Lo trovi qui: New York University
Applied cryptography and network security : 4th international conference, ACNS 2006, Singapore, June 6-9, 2006 : proceedings / Jianying Zhou, Moti Yung, Feng Bao (eds.).
Applied cryptography and network security : 4th international conference, ACNS 2006, Singapore, June 6-9, 2006 : proceedings / Jianying Zhou, Moti Yung, Feng Bao (eds.).
Creatore [ACNS (Conference) (4th : 2006 : Singapore)]
Estensione 1 online resource (xiv, 488 pages) : illustrations.
Disciplina 005.8
Accesso persona Zhou, Jianying
Yung, Moti
Bao, Feng
Genere/Forma Electronic books
Conference papers and proceedings
Kongress
Singapur (2006)
ISBN 9783540347040
3540347046
3540347038
9783540347033
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Avoidance and Detection -- Adaptive Detection of Local Scanners -- Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection -- DSO: Dependable Signing Overlay -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy Multi-coupon System -- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families -- DoS: Attacks and Countermeasures -- Efficient Memory Bound Puzzles Using Pattern Databases -- Effect of Malicious Synchronization -- Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets -- Key Management -- Password Based Server Aided Key Exchange -- Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks -- Stateful Subset Cover -- Cryptanalysis -- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions -- Breaking a New Instance of TTM Cryptosystems -- Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords -- Security of Limited Devices -- An AES Smart Card Implementation Resistant to Power Analysis Attacks -- Physical Security Bounds Against Tampering -- Flexible Exponentiation with Resistance to Side Channel Attacks -- Cryptography -- An Improved Poly1305 MAC -- Certificateless Public-Key Signature: Security Model and Efficient Construction -- High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive -- Authentication and Web Security -- Authentication for Paranoids: Multi-party Secret Handshakes -- On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan -- W3Bcrypt: Encryption as a Stylesheet -- Ad Hoc and Sensor Network Security -- Combinatorial Structures for Design of Wireless Sensor Networks -- Public Key Cryptography Sans Certificates in Ad Hoc Networks -- Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks -- Cryptographic Constructions -- A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography -- Results on Almost Resilient Functions -- Real Perfect Contrast Visual Secret Sharing Schemes with Reversing -- Security and Privacy -- On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries -- Improving the Randomized Initial Point Countermeasure Against DPA -- Syntax-Driven Private Evaluation of Quantified Membership Queries.
Record Nr. NYU-004610670
[ACNS (Conference) (4th : 2006 : Singapore)]  
Materiale a stampa
Lo trovi qui: New York University
Privacy enhancing technologies : 5th international workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005 : revised selected papers / George Danezis, David Martin (eds.).
Privacy enhancing technologies : 5th international workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005 : revised selected papers / George Danezis, David Martin (eds.).
Creatore [PET 2005 (2005 : Cavtat, Croatia)]
Estensione 1 online resource (viii, 272 pages) : illustrations.
Disciplina 005.8
Accesso persona Danezis, George, 1979-
Martin, David Michael
Genere/Forma Electronic books
Conference papers and proceedings
Cavtat (2006)
Kongress
ISBN 9783540347460
3540347461
3540347453
9783540347453
Classificazione 54.62
54.69
TP309-532
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy Vulnerabilities in Encrypted HTTP Streams -- An Analysis of Parallel Mixing with Attacker-Controlled Inputs -- Message Splitting Against the Partial Adversary -- Location Privacy for Cellular Systems; Analysis and Solution -- Towards Modeling Wireless Location Privacy -- Failures in a Hybrid Content Blocking System -- Anonymity Preserving Techniques in Trust Negotiations -- Unmixing Mix Traffic -- Mix-Network with Stronger Security -- Covert Channels in IPv6 -- Towards Privacy-Aware eLearning -- Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies -- Privacy Issues in Vehicular Ad Hoc Networks -- High-Power Proxies for Enhancing RFID Privacy and Utility -- Integrating Utility into Face De-identification -- Privacy in India: Attitudes and Awareness -- Economics of Identity Management: A Supply-Side Perspective.
Record Nr. NYU-004610673
[PET 2005 (2005 : Cavtat, Croatia)]  
Materiale a stampa
Lo trovi qui: New York University
Emerging trends in information and communication security : international conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 : proceedings / Günter Müller (ed.).
Emerging trends in information and communication security : international conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 : proceedings / Günter Müller (ed.).
Creatore [ETRICS 2006 (2006 : Freiburg im Breisgau, Germany)]
Estensione 1 online resource (xx, 524 pages) : illustrations, portraits.
Disciplina 005.8
Accesso persona Müller, Günter, 1948-
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783540346425
3540346422
3540346406
9783540346401
Classificazione TP309-532
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004610755
[ETRICS 2006 (2006 : Freiburg im Breisgau, Germany)]  
Materiale a stampa
Lo trovi qui: New York University
Privacy and identity management for life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised selected papers / Jan Camenisch [and others] (eds.).
Privacy and identity management for life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised selected papers / Jan Camenisch [and others] (eds.).
Creatore [IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School (7th : 2011 : Trento, Italy)]
Estensione 1 online resource.
Disciplina 005.8
Accesso persona Camenisch, Jan.
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
ISBN 9783642316685
3642316689
3642316670
9783642316678
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Are They Making Our Privates Public? -- Emerging Risks of Governmental Open Data Initiatives / Thomas P. Keenan -- Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals / Marit Hansen -- Developing a Strategy for Automated Privacy Testing Suites / Ioannis Agrafiotis, Sadie Creese and Michael Goldsmith -- Assessing Formal Independence of Data Protection Authorities in a Comparative Perspective / Philip Schütz -- Extracting Access Control and Conflict Resolution Policies from European Data Protection Law / Kaniz Fatema, David W. Chadwick and Brendan Van Alsenoy -- Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software / Sandra Olislaegers -- The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services / Ina Schiering and Jan Kretschmer -- (More) Side Channels in Cloud Storage: Linking Data to Users / Tobias Pulls -- Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information / Sebastian Labitzke -- Exploring Touch-Screen Biometrics for User Identification on Smart Phones / Julio Angulo and Erik Wästlund -- Using a Smartphone to Access Personalized Web Services on a Workstation / Faysal Boukayoua, Jan Vossaert, Bart De Decker and Vincent Naessens -- Designing Privacy-Enhancing Mobile Applications / Koen Decroix, Bart De Decker and Vincent Naessens -- Extending Comparison Shopping Sites by Privacy Information on Retailers / Ulrich König and Marit Hansen -- Do-Not-Track Techniques for Browsers and Their Implications for Consumers / Martin Beck and Michael Marhöfer -- P2P Social Networks with Broadcast Encryption Protected Privacy / Oleksandr Bodriagov and Sonja Buchegger -- Privacy by Design: Does It Matter for Social Networks? / Mohammad Badiul Islam and Renato Iannella -- Privacy Preserving Mechanisms for a Pervasive eHealth System / Milica Milutinovic, Koen Decroix, Vincent Naessens and Bart De Decker -- Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation / Ioannis Agrafiotis, Sadie Creese and Michael Goldsmith -- Privacy Protection Goals and Their Implications for eID Systems / Harald Zwingelberg and Marit Hansen -- Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals / Gergely Alpár and Jaap-Henk Hoepman -- Massive Data Collection by Mistake? / Arnold Roosendaal -- Addressing Governance and Ethics in European Technology Development Projects through Scenarios / Aygen Kurt and Penny Duquenoy.
Record Nr. NYU-004623491
[IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School (7th : 2011 : Trento, Italy)]  
Materiale a stampa
Lo trovi qui: New York University
Information security and cryptology-- ICISC 2011 : 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised selected papers / Howon Kim (ed.).
Information security and cryptology-- ICISC 2011 : 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised selected papers / Howon Kim (ed.).
Creatore [ICISC (Conference) (14th : 2011 : Seoul, Korea)]
Estensione 1 online resource (xii, 512 pages) : illustrations.
Disciplina 005.8
Accesso persona Kim, Howon
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Computational complexity
Information Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Discrete Mathematics in Computer Science
ISBN 9783642319129
3642319122
3642319114
9783642319112
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Improved Integral Analysis on Tweaked Lesamnta / Yu Sasaki and Kazumaro Aoki -- Analysis of Trivium Using Compressed Right Hand Side Equations / Thorsten Ernst Schilling and Håvard Raddum -- Cryptanalysis of Round-Reduced HAS-160 / Florian Mendel, Tomislav Nad and Martin Schläffer -- An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software / Daehyun Strobel and Christof Paar -- An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks / Hailong Zhang, Yongbin Zhou and Dengguo Feng -- Correcting Errors in Private Keys Obtained from Cold Boot Attacks / Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek and Jung Hee Cheon -- Strong Security Notions for Timed-Release Public-Key Encryption Revisited / Ryo Kikuchi, Atsushi Fujioka, Yoshiaki Okamoto and Taiichi Saito -- Fully Secure Unidirectional Identity-Based Proxy Re-encryption / Song Luo, Qingni Shen and Zhong Chen -- Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition / Yong Qiao, Yuexiang Yang, Jie He, Bo Liu and Yingzhi Zeng -- AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability / Kai Chen, Yifeng Lian and Yingjun Zhang -- Weaknesses in Current RSA Signature Schemes / Juliane Krämer, Dmitry Nedospasov and Jean-Pierre Seifert.
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations / Shuguo Yang, Yongbin Zhou, Jiye Liu and Danyang Chen -- A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users / Keita Emura, Atsuko Miyaji and Kazumasa Omote -- Generic Constructions for Verifiable Signcryption / Laila El Aimani -- Non-delegatable Strong Designated Verifier Signature on Elliptic Curves / Haibo Tian, Xiaofeng Chen, Zhengtao Jiang and Yusong Du -- An Improved Known Plaintext Attack on PKZIP Encryption Algorithm / Kyung Chul Jeong, Dong Hoon Lee and Daewan Han -- Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit / Yi Lu, Serge Vaudenay, Willi Meier, Liping Ding and Jianchun Jiang -- On the Resistance of Boolean Functions against Fast Algebraic Attacks / Yusong Du, Fangguo Zhang and Meicheng Liu -- CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model / Yu Chen, Liqun Chen and Zongyang Zhang -- Design, Implementation, and Evaluation of a Vehicular Hardware Security Module / Marko Wolf and Timo Gendrullis -- Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection / Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd and Juan Gonzalez Nieto -- Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering / Paolo Palmieri and Olivier Pereira.
Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing / Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida -- Biclique Attack on the Full HIGHT / Deukjo Hong, Bonwook Koo and Daesung Kwon -- Preimage Attacks on Step-Reduced SM3 Hash Function / Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su and Le Dong -- Breaking a 3D-Based CAPTCHA Scheme / Vu Duc Nguyen, Yang-Wai Chow and Willy Susilo -- Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control / Fangming Zhao, Takashi Nishide and Kouichi Sakurai -- Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes / Zhenfei Zhang, Thomas Plantard and Willy Susilo -- A Blind Digital Image Watermarking Method Based on the Dual-Tree Complex Discrete Wavelet Transform and Interval Arithmetic / Teruya Minamoto and Ryuji Ohura -- On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks / Ashish Choudhury and Arpita Patra -- Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles / Kazuki Yoneyama -- Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys / Atsushi Fujioka and Koutarou Suzuki.
Record Nr. NYU-004623667
[ICISC (Conference) (14th : 2011 : Seoul, Korea)]  
Materiale a stampa
Lo trovi qui: New York University
Information Security : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings
Information Security : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings
Creatore [Samarati, Pierangela, Volume Editor]
Estensione 1 online resource (xiv, 508 pages).
Disciplina 005.8
Accesso persona Yung, Moti, Volume Editor
Martinelli, Fabio, Volume Editor
Ardagna, Claudio Agostino, Volume Editor
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783642044731
3642044735
9783642044748
3642044743
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis Techniques -- A New Approach to ? 2 Cryptanalysis of Block Ciphers -- Analysis and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol -- Towards Security Notions for White-Box Cryptography -- A Calculus to Detect Guessing Attacks -- Hash Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database Security and Biometrics -- Detection of Database Intrusion Using a Two-Stage Fuzzy System -- Combining Consistency and Confidentiality Requirements in First-Order Databases -- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping -- Iris Recognition in Nonideal Situations -- Algebraic Attacks and Proxy Re-Encryption -- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security -- Practical Algebraic Attacks on the Hitag2 Stream Cipher -- A New Construction of Boolean Functions with Maximum Algebraic Immunity -- Distributed System Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A Priori Bound on the Coalition Size -- SISR – A New Model for Epidemic Spreading of Electronic Threats -- Identity Management and Authentication -- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement -- Robust Authentication Using Physically Unclonable Functions -- Risks of the CardSpace Protocol -- Applied Cryptography -- Fair E-Cash: Be Compact, Spend Faster -- On the Security of Identity Based Ring Signcryption Schemes -- A Storage Efficient Redactable Signature in the Standard Model -- Generic Construction of Stateful Identity Based Encryption -- Access Control -- Privacy-Aware Attribute-Based Encryption with User Accountability -- Hardware-Assisted Application-Level Access Control -- Towards Trustworthy Delegation in Role-Based Access Control Model -- Secure Interoperation in Multidomain Environments Employing UCON Policies -- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control -- MAC and Nonces -- Nonce Generators and the Nonce Reset Problem -- MAC Precomputation with Applications to Secure Memory -- HMAC without the “Second” Key -- P2P and Web Services -- Adding Trust to P2P Distribution of Paid Content -- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.
Record Nr. NYU-004613492
[Samarati, Pierangela, Volume Editor]  
Materiale a stampa
Lo trovi qui: New York University