top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings / edited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings / edited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch
Creatore [Hutchison, David]
Estensione 1 online resource (: v.: digital.
Disciplina 005.8
Accesso persona Kanade, Takeo
Kittler, Josef
Kleinberg, Jon M.
Koch, Klaus-Michael
Lipp, Peter
Mattern, Friedemann
Mitchell, John C.
Naor, Moni
Nierstrasz, Oscar
Pandu Rangan, C.
Sadeghi, Ahmad-Reza
Steffen, Bernhard
Sudan, Madhu
Terzopoulos, Demetri
Tygar, Doug
Vardi, Moshe Y.
Weikum, Gerhard
Genere/Forma Electronic books
ISBN 9783540689799
3540689796
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto TRUST 2008 -- Practical Techniques for Operating System Attestation -- TOCTOU, Traps, and Trusted Computing -- A Software-Based Trusted Platform Module Emulator -- Towards Trust Services for Language-Based Virtual Machines for Grid Computing -- Embedded Trusted Computing with Authenticated Non-volatile Memory -- The Zurich Trusted Information Channel – An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks -- A Model for New Zealand’s Identity Verification Service -- Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI -- Para-Virtualized TPM Sharing -- Slicing for Security of Code -- Trusted Computing Serving an Anonymity Service -- Combining Biometric Authentication with Privacy-Enhancing Technologies -- A New Direct Anonymous Attestation Scheme from Bilinear Maps -- On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA).
Record Nr. NYU-004611421
[Hutchison, David]  
Materiale a stampa
Lo trovi qui: New York University
Security and cryptography for networks : 6th international conference, SCN 2008, Amalfi, Italy, September 10-12, 2008 : proceedings / Rafail Ostrovsky, Roberto De Prisco, Ivan Visconti (eds.).
Security and cryptography for networks : 6th international conference, SCN 2008, Amalfi, Italy, September 10-12, 2008 : proceedings / Rafail Ostrovsky, Roberto De Prisco, Ivan Visconti (eds.).
Creatore [SCN 2008 (2008 : Amalfi, Italy)]
Estensione 1 online resource (xi, 422 pages) : illustrations.
Disciplina 005.8
Accesso persona Ostrovsky, Rafail
De Prisco, Roberto, 1968-
Visconti, Ivan
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783540858553
3540858555
3540858547
9783540858546
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Storage Encryption: A Cryptographer’s View -- Session 1: Implementations -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A Cryptographic Link Layer for Local Area Networks -- Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification -- Session 2: Protocols I -- Privacy Preserving Data Mining within Anonymous Credential Systems -- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function -- Session 3: Encryption I -- Two Generic Constructions of Probabilistic Cryptosystems and Their Applications -- Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption -- Session 4: Encryption II -- General Certificateless Encryption and Timed-Release Encryption -- Efficient Certificate-Based Encryption in the Standard Model -- Session 5: Primitives -- An Improved Robust Fuzzy Extractor -- On Linear Secret Sharing for Connectivity in Directed Graphs -- Session 6: Signatures -- Expressive Subgroup Signatures -- Anonymous Proxy Signatures -- Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem -- Session 7: Hardware and Cryptanalysis -- Using Normal Bases for Compact Hardware Implementations of the AES S-Box -- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes -- Full Cryptanalysis of LPS and Morgenstern Hash Functions -- A New DPA Countermeasure Based on Permutation Tables -- Session 8: Protocols II -- Simplified Submission of Inputs to Protocols -- Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited -- Session 9: Encryption III -- Linear Bandwidth Naccache-Stern Encryption -- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment -- Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework) -- Session 10: Key Exchange -- New Anonymity Notions for Identity-Based Encryption -- A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort -- An Identity-Based Key Agreement Protocol for the Network Layer.
Record Nr. NYU-004611504
[SCN 2008 (2008 : Amalfi, Italy)]  
Materiale a stampa
Lo trovi qui: New York University
Provable security : second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings / Joonsang Baek [and others] (eds.).
Provable security : second international conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008 : proceedings / Joonsang Baek [and others] (eds.).
Creatore [ProvSec (Conference) (2nd : 2008 : Shanghai, China)]
Estensione 1 online resource (xi, 359 pages) : illustrations.
Disciplina 005.8
Accesso persona Baek, Joonsang
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783540887331
3540887334
9783540887324
3540887326
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Encryption -- Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem -- Tweakable Pseudorandom Permutation from Generalized Feistel Structure -- Timed-Release Encryption Revisited -- Efficient and Provably Secure Certificateless Multi-receiver Signcryption -- A CCA Secure Hybrid Damgård’s ElGamal Encryption -- Signature -- Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps -- Optimal Online/Offline Signature: How to Sign a Message without Online Computation -- Round-Optimal Blind Signatures from Waters Signatures -- Secure Proxy Multi-signature Scheme in the Standard Model -- Server-Aided Verification Signatures: Definitions and New Constructions -- Analysis -- On Proofs of Security for DAA Schemes -- Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005 -- Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups -- On the Equivalence of Generic Group Models -- The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version -- Application of Hash Functions -- Leaky Random Oracle (Extended Abstract) -- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions -- Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions? -- Universal Composability -- Relationship of Three Cryptographic Channels in the UC Framework -- A Universally Composable Framework for the Analysis of Browser-Based Security Protocols -- Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library -- Universally Composable Security Analysis of TLS -- Round Optimal Universally Composable Oblivious Transfer Protocols -- Applications -- A Tamper-Evident Voting Machine Resistant to Covert Channels -- Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks.^
Record Nr. NYU-004611762
[ProvSec (Conference) (2nd : 2008 : Shanghai, China)]  
Materiale a stampa
Lo trovi qui: New York University
Advances in Cryptology - ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings / edited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Josef Pieprzyk
Advances in Cryptology - ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings / edited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Josef Pieprzyk
Creatore [Hutchison, David]
Estensione 1 online resource (: v.: digital.
Disciplina 005.8
Accesso persona Kleinberg, Jon M.
Weikum, Gerhard
Vardi, Moshe Y.
Tygar, Doug
Terzopoulos, Demetri
Sudan, Madhu
Kittler, Josef
Mattern, Friedemann
Mitchell, John C.
Naor, Moni
Nierstrasz, Oscar
Pandu Rangan, C.
Pieprzyk, Josef
Steffen, Bernhard
Kanade, Takeo
Genere/Forma Electronic books
ISBN 9783540892557
3540892559
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multi-Party Computation -- MPC vs. SFE : Unconditional and Computational Security -- Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes -- Graph Design for Secure Multiparty Computation over Non-Abelian Groups -- Invited Talk -- Some Perspectives on Complexity-Based Cryptography -- Cryptographic Protocols I -- A Modular Security Analysis of the TLS Handshake Protocol -- Ambiguous Optimistic Fair Exchange -- Compact Proofs of Retrievability -- On the Security of HB# against a Man-in-the-Middle Attack -- Cryptographic Hash Functions I -- Hash Functions from Sigma Protocols and Improvements to VSH -- Slide Attacks on a Class of Hash Functions -- Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography -- Cryptographic Protocols II -- Universally Composable Adaptive Oblivious Transfer -- A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting -- Towards Robust Computation on Encrypted Data -- Efficient Protocols for Set Membership and Range Proofs -- Cryptographic Hash Functions II -- Preimage Attacks on 3, 4, and 5-Pass HAVAL -- How to Fill Up Merkle-Damgård Hash Functions -- Limits of Constructive Security Proofs -- Public-Key Cryptography I -- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption -- Twisted Edwards Curves Revisited -- On the Validity of the?-Hiding Assumption in Cryptographic Protocols -- Chosen Ciphertext Security with Optimal Ciphertext Overhead -- Lattice-Based Cryptography -- Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems -- Rigorous and Efficient Short Lattice Vectors Enumeration -- Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits -- Private-Key Cryptography -- An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity -- An Improved Impossible Differential Attack on MISTY1 -- Public-Key Cryptography II -- Generalized Identity Based and Broadcast Encryption Schemes -- Speeding Up the Pollard Rho Method on Prime Fields -- Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems -- OAEP Is Secure under Key-Dependent Messages -- Analysis of Stream Ciphers -- Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks -- A New Attack on the LEX Stream Cipher -- Breaking the F-FCSR-H Stream Cipher in Real Time.
Record Nr. NYU-004611897
[Hutchison, David]  
Materiale a stampa
Lo trovi qui: New York University
Information systems security : 4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 ; proceedings / R. Sekar, Arun K. Pujari (eds.).
Information systems security : 4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 ; proceedings / R. Sekar, Arun K. Pujari (eds.).
Creatore [ICISS (Conference) (2008 : Hyderabad, India)]
Estensione 1 online resource (xiii, 305 pages) : illustrations.
Disciplina 005.8
Accesso persona Sekar, R.
Pujari, Arun K.
Genere/Forma Electronic books
Conference papers and proceedings
ISBN 9783540898627
354089862X
1281919888
9781281919885
9783540898610
3540898611
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004611931
[ICISS (Conference) (2008 : Hyderabad, India)]  
Materiale a stampa
Lo trovi qui: New York University
Web security : a whitehat perspective / Wu Hanqing, Liz Zhao
Web security : a whitehat perspective / Wu Hanqing, Liz Zhao
Creatore [Hanqing, Wu, author]
Estensione 1 online resource : illustrations.
Disciplina 005.8
Accesso persona Zhao, Liz, author
Genere/Forma Popular works
Electronic books
ISBN 9781466592629
1466592621
9781466592612
1466592613
Classificazione BUS041000COM053000COM060000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Section 1. Our view of the security world -- section 2. Safetyon the client script -- section 3. Application on the server side -- section 4. Safety operations of internet companies.
Record Nr. NYU-004695412
[Hanqing, Wu, author]  
Materiale a stampa
Lo trovi qui: New York University
Security technology : international conference, SecTech 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011, proceedings / Tai-hoon Kim [and others] (eds.).
Security technology : international conference, SecTech 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011, proceedings / Tai-hoon Kim [and others] (eds.).
Creatore [SecTech 2011 (2011 : Cheju Island, Korea)]
Estensione 1 online resource (xiii, 237 pages).
Disciplina 005.8
Accesso persona Kim, Tai-hoon
Accesso convegno FGIT (Conference) (3rd : 2011 : Cheju Island, Korea)
GDC 2011 (2011 : Cheju Island, Korea)
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
ISBN 9783642271892
3642271898
9783642271885
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004372922
[SecTech 2011 (2011 : Cheju Island, Korea)]  
Materiale a stampa
Lo trovi qui: New York University
Crypto : how the code rebels beat the government-- saving privacy in the digital age / Steven Levy
Crypto : how the code rebels beat the government-- saving privacy in the digital age / Steven Levy
Creatore [Levy, Steven]
Estensione viii, 356 p. ; 24 cm.
Disciplina 005.8
ISBN 0670859508 (hbk. : alk. paper)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UCHICAGO-4369067
[Levy, Steven]  
Materiale a stampa
Lo trovi qui: University of Chicago
Information security applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 2003 : revised papers / Kijoon Chae, Moti Yung (eds.).
Information security applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 2003 : revised papers / Kijoon Chae, Moti Yung (eds.).
Creatore [WISA (Workshop : Information security (4th : 2003 : Cheju-do, Korea)]
Estensione xii, 506 p. : ill. ; 24 cm.
Disciplina 005.8
Accesso persona Chae, Kijoon
Yung, Moti
ISBN 3540208275
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Model Checking of Security Protocols with Pre-configuration / Kyoil Kim, Jacob A. Abraham and Jayanta Bhadra -- Remote Access VPN with Port Protection Function by Mobile Codes / Yoshiaki Shiraishi, Youji Fukuta and Masakatu Morii -- A Role of DEVS Simulation for Information Assurance / Sung-Do Chi, Jong Sou Park and Jang-Se Lee -- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes / Kwok-Yan Lam, Xi-Bin Zhao, Siu-Leung Chung, Ming Gu and Jia-Guang Sun -- Reliable Cascaded Delegation Scheme for Mobile Agent Environments / Hyun-suk Lee, Hyeog Man Kwon and Young Ik Eom -- Practical Solution for Location Privacy in Mobile IPv6 / SuGil Choi, Kwangjo Kim and ByeongGon Kim -- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection / Jin Suk Kim, Hohn Gyu Lee, Sungbo Seo and Keun Ho Ryu -- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System / Ja-Min Koo and Sung-Bae Cho -- Towards a Global Security Architecture for Intrusion Detection and Reaction Management / Renaud Bidou, Julien Bourgeois and Francois Spies -- Intrusion-Tolerant System Design for Web Server Survivability / Dae-Sik Choi, Eul Gyu Im and Cheol-Won Lee -- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access / Paulo S. Pagliusi and Chris J. Mitchell -- An Automatic Security Evaluation System for IPv6 Network / Jaehoon Nah, Hyeokchan Kwon, Sungwon Sohn, Cheehang Park and Chimoon Han -- A Location Privacy Protection Mechanism for Smart Space / Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung and Cheehang Park -- Secure System Architecture Based on Dynamic Resource Reallocation / Byoung Joon Min, Sung Ki Kim and Joong Sup Choi -- Fair Exchange with Guardian Angels / Gildas Avoine and Serge Vaudenay -- Sign-Based Differential Power Analysis / Roman Novak -- Asymmetric Watermarking Scheme Using Permutation Braids / Geun-Sil Song, Mi-Ae Kim and Won-Hyung Lee -- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2[superscript m]) / Johann Grossschadl and Guy-Armand Kamendje -- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction / Kun Peng, Colin Boyd, Ed Dawson and Kapalee Viswanathan -- Multi-dimensional Hash Chain for Sealed-Bid Auction / Navapot Prakobpol and Yongyuth Permpoontanalarp -- An Improved Forward Integrity Protocol for Mobile Agents / Ming Yao, Ernest Foo, Kun Peng and Ed Dawson -- Taming "Trusted Platforms" by Operating System Design / Ahmad-Reza Sadeghi and Christian Stuble -- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation / Kazuhide Fukushima and Kouichi Sakurai -- Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes / Tomoyuki Asano -- 3D Face Recognition under Pose Varying Environments / Hwanjong Song, Ukil Yang and Kwanghoon Sohn -- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint / H. Kang, Y. Han, H. Kim, W. Choi and Y. Chung -- Fingerprint-Based Authentication for USB Token Systems / Daesung Moon, Youn Hee Gil, Dosung Ahn, Sung Bum Pan, Yongwha Chung and Chee Hang Park -- Iris Recognition System Using Wavelet Packet and Support Vector Machines / Byungjun Son, Gyundo Kee, Yungcheol Byun and Yillbyung Lee -- Biometrics Identification and Verification Using Projection-Based Face Recognition System / Hyeonjoon Moon and Jaihie Kim -- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification / Suyoung Chi, Jaeyeon Lee, Jung Soh, Dohyung Kim, Weongeun Oh and Changhun Kim -- E-MHT. An Efficient Protocol for Certificate Status Checking / Jose L. Munoz, Jordi Forne, Oscar Esparza and Miguel Soriano -- A Comment on Group Independent Threshold Sharing / Brian King -- Automation-Considered Logic of Authentication and Key Distribution / Taekyoung Kwon and Seongan Lim -- The MESH Block Ciphers / Jorge Nakahara, Jr., Vincent Rijmen, Bart Preneel and Joos Vandewalle -- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves / Dong Jin Park, Sang Gyoo Sim and Pil Joong Lee -- Constructing and Cryptanalysis of a 16 x 16 Binary Matrix as a Diffusion Layer / Bon Wook Koo, Hwan Seok Jang and Jung Hwan Song.
Record Nr. UCHICAGO-5090042
[WISA (Workshop : Information security (4th : 2003 : Cheju-do, Korea)]  
Materiale a stampa
Lo trovi qui: University of Chicago
Foundations of security analysis and design II : FOSAD 2001/2002 turorial lectures / Riccardo Focardi, Roberto Gorrieri (eds.).
Foundations of security analysis and design II : FOSAD 2001/2002 turorial lectures / Riccardo Focardi, Roberto Gorrieri (eds.).
Estensione vi, 265 p. : ill. ; 24 cm.
Disciplina 005.8
Accesso persona Focardi, Riccardo, 1970-
Gorrieri, Roberto
Accesso convegno International School on Foundations of Security Analysis and Design (2001-2002 : Bertinoro, Italy)
ISBN 3540209557 (softcover : alk. paper)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Two formal approaches for approximating noninterference properties / Alessandro Aldini, Mario Bravetti, Alessandra Di Pierro, Roberto Gorrieri, Cris Hankin and Herbert Wiklicky -- The key establishment problem / Carlo Blundo and Paolo D'Arco -- A survey of name-passing calculi and crypto-primitives / Michele Bugliesi, Giuseppe Castagna, Silvia Crafa, Riccardo Focardi and Vladimiro Sassone -- Classification of security properties (part II : network security) / Riccardo Focardi, Roberto Gorrieri and Fabio Martinelli -- Cryptographic algorithms for multimedia traffic / Rosario Gennaro -- Security for mobility / Hanne Riis Nielson, Flemming Nielson and Mikael Buchholtz.
Record Nr. UCHICAGO-5090047
Materiale a stampa
Lo trovi qui: University of Chicago