top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Smart grid security [electronic resource] : first International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012 : revised selected papers / Jorge Cuellar (ed.).
Smart grid security [electronic resource] : first International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012 : revised selected papers / Jorge Cuellar (ed.).
Creatore [SmartGridSec (Workshop) (1st : 2012 : Berlin, Germany)]
Estensione 1 online resource (vi, 149 p.) : ill
Disciplina 621.319
Accesso persona Cuellar, Jorge
Genere/Forma Electronic books
Soggetto non controllato Computer science
Operating systems (Computers)
Data protection
Information Systems
Systems and Data Security
Computers and Society
Management of Computing and Information Systems
ISBN 9783642380303 (electronic bk.)
3642380301 (electronic bk.)
9783642380297
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto IT Security Architecture Approaches for Smart Metering and Smart Grid / David von Oheimb -- Smart Grid Information Exchange - Securing the Smart Grid from the Ground / Steffen Fries, Rainer Falk, Ariane Sutor -- A Tool Set for the Evaluation of Security and Reliability in Smart Grids / Joël Chinnow, Jakob Tonn, Karsten Bsufka, Thomas Konnerth, Sahin Albayrak -- Regular Papers -- A Holistic View of Security and Privacy Issues in Smart Grids / Muhammad Rizwan Asghar, Daniele Miorandi -- Hardware Security for Device Authentication in the Smart Grid / Andrew J. Paverd, Andrew P. Martin -- Maintaining Privacy in Data Rich Demand Response Applications / Markus Karwe, Jens Strüker -- Data Protection in a Cloud-Enabled Smart Grid / Alexander Fromm, Florian Kelbert, Alexander Pretschner -- Formal Analysis of a Privacy-Preserving Billing Protocol / Alessandro Armando, Roberto Carbone, Alessio Merlo -- Privacy in Smart Metering Ecosystems / Peter Ebinger, José Luis Hernández Ramos, Panayotis Kikiras, Mario Lischka -- Energy@home Leveraging ZigBee to Enable Smart Grid in Residential Environment / Andrea Ranalli, Claudio Borean.
Record Nr. UPENN-9960105833503681
[SmartGridSec (Workshop) (1st : 2012 : Berlin, Germany)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Transactions on data hiding and multimedia security VII [electronic resource] / Yun Q. Shi (ed.).
Transactions on data hiding and multimedia security VII [electronic resource] / Yun Q. Shi (ed.).
Estensione 1 online resource (viii, 114 p.)
Disciplina 006.7
Accesso persona Shi, Yun Q.
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Optical pattern recognition
Systems and Data Security
Algorithm Analysis and Problem Complexity
ISBN 9783642286933 (electronic bk.)
3642286933 (electronic bk.)
9783642286926
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Efficient Robust Watermarking Method Integrated in H.264/SVC / Peter Meerwald and Andreas Uhl -- PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing / Takaaki Yamada, Isao Echizen and Hiroshi Yoshiura -- IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices / Isao Echizen, Takayuki Yamada and Seiichi Gohshi -- Secure Watermarking on 3D Geometry via ICA and Orthogonal Transformation / Hao-tian Wu and Yiu-ming Cheung -- Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection / Hong Cao and Alex C. Kot -- Secure Steganography Using Randomized Cropping / Arijit Sur, Vignesh Ramanathan and Jayanta Mukherjee -- Steganography in Streaming Multimedia over Networks / Hong Zhao, Yun Q. Shi and Nirwan Ansari.
Record Nr. UPENN-9960092853503681
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Information security and cryptology--ICISC 2012 [electronic resource] : 15th International Conference, Seoul, Korea, November 28-30, 2012 : revised selected papers / Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon (eds.).
Information security and cryptology--ICISC 2012 [electronic resource] : 15th International Conference, Seoul, Korea, November 28-30, 2012 : revised selected papers / Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon (eds.).
Creatore [ICISC (Conference) (15th : 2012 : Seoul, Korea)]
Estensione 1 online resource (xiv, 512 p.) : ill
Disciplina 005.8
Accesso persona Kwon, Taekyoung
Lee, Mun-Kyu
Kwon, Daesung
Genere/Forma Electronic books
Soggetto non controllato Computer science
Data protection
Data encryption (Computer science)
Information Systems
Systems and Data Security
Management of Computing and Information Systems
ISBN 9783642376825 (electronic bk.)
3642376827 (electronic bk.)
9783642376818
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers. ML Confidential: Machine Learning on Encrypted Data / Thore Graepel, Kristin Lauter, Michael Naehrig -- Another Look at Affine-Padding RSA Signatures / Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi -- On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis / Christian Rechberger -- Attack and Defense. Balanced Indexing Method for Efficient Intrusion Detection Systems / BooJoong Kang ... [et al.] -- Quantitative Questions on Attack-Defense Trees / Barbara Kordy, Sjouke Mauw, Patrick Schweitzer -- DNS Tunneling for Network Penetration / Daan Raman ... [et al.] -- MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring / Lingguang Lei ... [et al.] -- Software and Web Security. iBinHunt: Binary Hunting with Inter-procedural Control Flow / Jiang Ming, Meng Pan, Debin Gao -- Sometimes It's Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys / Christopher Meyer, Florian Feldmann, Jörg Schwenk --
Cryptanalysis I. Improved Impossible Differential Attacks on Large-Block Rijndael / Qingju Wang ... [et al.] -- Cube Cryptanalysis of LBlock with Noisy Leakage / Zhenqi Li ... [et al.] -- Comprehensive Study of Integral Analysis on 22-Round LBlock / Yu Sasaki, Lei Wang -- New Impossible Differential Attack on SAFER+ and SAFER++ / Jingyuan Zhao ... [et al.] -- Cryptographic Protocol. An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocol / Christian L. F. Corniaux, Hossein Ghodosi -- Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms / Koki Hamada ... [et al.] -- Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocol / Lei Zhang -- Identity-Based Encryption. A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles / Kaitai Liang ... [et al.] -- Ciphertext Policy Multi-dimensional Range Encryption / Kohei Kasamatsu ... [et al.] --
Efficient Implementation. Speeding Up Ate Pairing Computation in Affine Coordinates / Duc-Phong Le, Chik How Tan -- An Improved Hardware Implementation of the Grain-128a Stream Cipher / Shohreh Sharif Mansouri, Elena Dubrova -- Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers / Ayesha Khalid ... [et al.] -- Cloud Computing Security. Trusted Launch of Virtual Machine Instances in Public IaaS Environments / Nicolae Paladi ... [et al.] -- Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines / Michael Velten, Frederic Stumpf -- Cryptanalysis II. Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha / Zhenqing Shi ... [et al.] -- Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties / Takuma Koyama, Yu Sasaki, Noboru Kunihiro -- Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers / Mohamed Ahmed Abdelraheem --
Side Channel Analysis. Security Evaluation of Cryptographic Modules against Profiling Attacks / Yongdae Kim ... [et al.] -- Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher / Toshiki Nakasone ... [et al.] -- Digital Signature. Efficient Group Signatures in the Standard Model / Laila El Aimani, Olivier Sanders -- Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures / Keisuke Hakuta ... [et al.] -- Linear Recurring Sequences for the UOV Key Generation Revisited / Albrecht Petzoldt, Stanislav Bulygin -- Galindo-Garcia Identity-Based Signature Revisited / Sanjit Chatterjee, Chethan Kamath, Vikas Kumar -- Privacy Enhancement. Private Over-Threshold Aggregation Protocols / Myungsun Kim ... [et al.] -- An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard / Kyung-kug Kim, Myung-Hwan Kim -- Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System / Nasima Begum, Toru Nakanishi, Nobuo Funabiki.
Record Nr. UPENN-9960105783503681
[ICISC (Conference) (15th : 2012 : Seoul, Korea)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Computer safety, reliability, and security [electronic resource] : SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings / Frank Ortmeier, Peter Daniel (eds.)
Computer safety, reliability, and security [electronic resource] : SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE, Magdeburg, Germany, September 25-28, 2012. Proceedings / Frank Ortmeier, Peter Daniel (eds.)
Creatore [SAFECOMP (Conference) (2012 : Magdeburg, Germany)]
Estensione 1 online resource.
Disciplina 005.8
Accesso persona Ortmeier, Frank
Daniel, Peter, 1950-
Accesso convegno Sassur 2012 (2012 : Magdeburg, Germany)
ASCoMS 2012 (2012 : Magdeburg, Germany)
DESEC4LCCI 2012 (2012 : Magdeburg, Germany)
ERCIM/EWICS 2012 (2012 : Magdeburg, Germany)
International Workshop on Digital Engineering (2012 : Magdeburg, Germany)
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data protection
Logic design
Artificial intelligence
Systems and Data Security
Logics and Meanings of Programs
Computers and Society
ISBN 9783642336751 (electronic bk.)
3642336752 (electronic bk.)
9783642336744
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction to Sassur 2012 / Alejandra Ruiz, Tim P. Kelly, Mehrdad Sabetzadeh and Didier Van Den Abeele -- AdvoCATE: An Assurance Case Automation Toolset / Ewen Denney, Ganesh Pai and Josef Pohl -- Towards a Case-Based Reasoning Approach for Safety Assurance Reuse / Alejandra Ruiz, Ibrahim Habli and Huáscar Espinoza -- Modeling for Safety in a Synthesis-Centric Systems Engineering Framework / Jasen Markovski and J. M. van de Mortel-Fronczak -- A Model Based Approach for Safety Analysis / Fabien Belmonte and Elie Soubiran -- Towards a Model-Based Evolutionary Chain of Evidence for Compliance with Safety Standards / Jose Luis de la Vara, Sunil Nair, Eric Verhulst, Janusz Studzizba and Piotr Pepek, et al. -- A New Approach to Assessment of Confidence in Assurance Cases / Xingyu Zhao, Dajian Zhang, Minyan Lu and Fuping Zeng -- An Unified Meta-model for Trustworthy Systems Engineering / Eric Verhulst and Bernhard H. C. Sputh -- A Preliminary Fault Injection Framework for Evaluating Multicore Systems / Anna Lanzaro, Antonio Pecchia, Marcello Cinque, Domenico Cotroneo and Ricardo Barbosa, et al. --
Meeting Real-Time Requirements with Multi-core Processors / Daniel Kästner, Marc Schlickling, Markus Pister, Christoph Cullmann and Gernot Gebhard, et al. -- Assessing Software Interference Management When Modifying Safety-Related Software / Patrick J. Graydon and Tim P. Kelly -- Introduction to ASCoMS 2012 / António Casimiro and Jörg Kaiser -- Towards Dependable and Stable Perception in Smart Environments with Timing and Value Faults / Luís Marques and António Casimiro -- An Approach Supporting Fault-Propagation Analysis for Smart Sensor Systems / Sebastian Zug, Tino Brade, Jörg Kaiser and Sasanka Potluri -- Use of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles / Kenneth Östberg and Rolf Johansson -- From Autonomous Vehicles to Safer Cars: Selected Challenges for the Software Engineering / Christian Berger -- Modelling of Safety-Related Timing Constraints for Automotive Embedded Systems / Oscar Ljungkrantz, Henrik Lönn, Hans Blom, Cecilia Ekelin and Daniel Karlsson -- Introduction to DESEC4LCCI 2012 / Christian Esposito, Marco Platania and Francesco Brancati --
Quantitative Security Evaluation of a Multi-biometric Authentication System / Leonardo Montecchi, Paolo Lollini, Andrea Bondavalli and Ernesto La Mattina -- Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology / Luigi Romano, Salvatore D'Antonio, Valerio Formicola and Luigi Coppolino -- On Securing Communications among Federated Health Information Systems / Mario Ciampi, Giuseppe De Pietro, Christian Esposito, Mario Sicuranza and Paolo Mori, et al. -- How Secure Is ERTMS? / Richard Bloomfield, Robin Bloomfield, Ilir Gashi and Robert Stroud -- International Cooperation Experiences: Results Achieved, Lessons Learned, and Way Ahead / Craig Gibson, Matteo Melideo, Luigi Romano and Salvatore D'Antonio -- A Federated Simulation Framework with ATN Fault Injection Module for Reliablity Analysis of UAVs in Non-controlled Airspace / Magali Andreia Rossi, Jorge Rady de Almeida Junior, Andrea Bondavalli and Paolo Lollini -- HSIENA: A Hybrid Publish/Subscribe System / Fabio Petroni and Leonardo Querzoni --
WSDM-Enabled Autonomic Augmentation of Classical Multi-version Software Fault-Tolerance Mechanisms / Roeland Dillen, Jonas Buys, Vincenzo De Florio and Chris Blondia -- Formal Verification of a Safety Argumentation and Application to a Complex UAV System / Julien Brunel and Jacques Cazin -- Electronic Reliability Estimation: How Reliable Are the Results? / Nuno Silva and Rui Lopes -- Model-Based Assessment of Multi-region Electric Power Systems Showing Heterogeneous Characteristics / Silvano Chiaradonna, Felicita Di Giandomenico and Nicola Nostro -- Introduction to the ERCIM/EWICS Cyberphysical Systems Workshop 2012 / Erwin Schoitsch and Amund Skavhaug -- The Cyber-Physical Attacker / Roberto Vigo -- Dependable and Secure Embedded Node Demonstrator / Przemysław Osocha, João Carlos Cunha and Fabio Giovagnini -- Towards Secure Time-Triggered Systems / Florian Skopik, Albert Treytl, Arjan Geven, Bernd Hirschler and Thomas Bleier, et al. -- Towards a Framework for Simulation Based Design, Validation and Performance Analysis of Electronic Control Systems / Alexander Hanzlik and Erwin Kristen -- Compiling for Time Predictability / Peter Puschner, Raimund Kirner, Benedikt Huber and Daniel Prokesch --
Towards the Automated Qualification of Tool Chain Design / Fredrik Asplund, Matthias Biehl and Frédéric Loiret -- A Systematic Elaboration of Safety Requirements in the Avionic Domain / Antoaneta Kondeva, Martin Wassmuth and Andreas Mitschke -- Parallel NuSMV: A NuSMV Extension for the Verification of Complex Embedded Systems / Orlando Ferrante, Luca Benvenuti, Leonardo Mangeruca, Christos Sofronis and Alberto Ferrari -- Supporting Assurance by Evidence-Based Argument Services / Janusz Górski, Aleksander Jarzębowicz, Jakub Miler, Michał Witkowicz and Jakub Czyżnikiewicz, et al. -- Towards Composable Robotics: The R3-COP Knowledge-Base Driven Technology Platform / Erwin Schoitsch, Wolfgang Herzner, Carmen Alonso-Montes, P. Chmelar and Lars Dalgaard -- Addressing the Needs of an Aging Population: An Experiment for Monitoring Behaviour in a Domestic Environment / Marte E. B. Skjønsfjell, Aslak R. Normann, Dag Sjong and Amund Skavhaug --
Introduction to IWDE 2012 / Veit Köppen and Gunter Saake -- Modeling the Effects of Software on Safety and Reliability in Complex Embedded Systems / Max Steiner, Patric Keller and Peter Liggesmeyer -- Towards Artificial Perception / André Dietrich, Sebastian Zug and Jörg Kaiser -- A Case Study of Radio-Based Monitoring System for Enhanced Safety of Logistics Processes / Michael Soffner, Mykhaylo Nykolaychuk, Friederike Adler and Klaus Richter -- Visual Approach Facilitating the Importance Analysis of Component Fault Trees / Yi Yang, Patric Keller and Peter Liggesmeyer -- Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation / Sven Kuhlmann, Jana Fruth, Tobias Hoppe and Jana Dittmann -- From Discrete Event Simulation to Virtual Reality Environments / Sebastian Nielebock, Frank Ortmeier, Marco Schumann and André Winge -- Program Comprehension in Preprocessor-Based Software / Janet Siegmund, Norbert Siegmund, Jana Fruth, Sven Kuhlmann and Jana Dittmann, et al.
Record Nr. UPENN-9960100243503681
[SAFECOMP (Conference) (2012 : Magdeburg, Germany)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Theory of cryptography [electronic resource] : 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings / Ronald Cramer (ed.).
Theory of cryptography [electronic resource] : 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings / Ronald Cramer (ed.).
Creatore [Theory of Cryptography Conference (9th : 2012 : Taormina, Italy)]
Estensione 1 online resource (xiv, 656 p.)
Disciplina 005.8/2
Accesso persona Cramer, Ronald, Ph. D.
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Coding theory
Computer software
Systems and Data Security
Coding and Information Theory
Math Applications in Computer Science
Algorithm Analysis and Problem Complexity
ISBN 9783642289149 (electronic bk.)
3642289142 (electronic bk.)
9783642289132
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UPENN-9960092823503681
[Theory of Cryptography Conference (9th : 2012 : Taormina, Italy)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
Stabilization, safety, and security of distributed systems [electronic resource] : 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings / Andréa W. Richa, Christian Scheideler (eds.).
Stabilization, safety, and security of distributed systems [electronic resource] : 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings / Andréa W. Richa, Christian Scheideler (eds.).
Creatore [SSS 2012 (2012 : Toronto, Ont.)]
Estensione 1 online resource.
Disciplina 004.2
Accesso persona Richa, Andréa W.
Scheideler, Christian
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data protection
Computer software
Logic design
Information Systems Applications (incl. Internet)
Logics and Meanings of Programs
Algorithm Analysis and Problem Complexity
Systems and Data Security
ISBN 9783642335365 (electronic bk.)
3642335365 (electronic bk.)
9783642335358
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Communication-Efficient Self-stabilization in Wireless Networks / Tomoya Takimoto, Fukuhito Ooshita, Hirotsugu Kakugawa and Toshimitsu Masuzawa -- Self-stabilizing Local k-Placement of Replicas with Minimal Variance / Sven Köhler, Volker Turau and Gerhard Mentges -- Self-stabilizing Algorithm for Maximal Graph Partitioning into Triangles / Brahim Neggazi, Mohammed Haddad and Hamamache Kheddouci -- Brief Announcement: Self-stabilizing Synchronization of Arbitrary Digraphs in Presence of Faults / Mahyar R. Malekpour -- Brief Announcement: Self-stabilizing Silent Disjunction in an Anonymous Network / Ajoy K. Datta, Stéphane Devismes and Lawrence L. Larmore -- On the Self-stabilization of Mobile Oblivious Robots in Uniform Rings / Fukuhito Ooshita and Sébastien Tixeuil -- Optimal Grid Exploration by Asynchronous Oblivious Robots / Stéphane Devismes, Anissa Lamani, Franck Petit, Pascal Raymond and Sébastien Tixeuil -- Terminating Population Protocols via Some Minimal Global Knowledge Assumptions / Othon Michail, Ioannis Chatzigiannakis and Paul G. Spirakis --
Brief Announcement: The Degrading Effect of Forgetting on a Synchronizer / Matthias Függer, Alexander Kö€ler, Thomas Nowak and Martin Zeiner -- Brief Announcement: Mobile Agent Rendezvous on Edge Evolving Rings / Tomoko Izumi, Yukiko Yamauchi and Sayaka Kamei -- High-Level Executable Specifications of Distributed Algorithms / Yanhong A. Liu, Scott D. Stoller and Bo Lin -- Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud / Yosr Jarraya, Arash Eghtesadi, Mourad Debbabi, Ying Zhang and Makan Pourzandi -- Evaluating Practical Tolerance Properties of Stabilizing Programs through Simulation: The Case of Propagation of Information with Feedback / Jordan Adamek, Mikhail Nesterenko and Sébastien Tixeuil -- Self-stabilizing End-to-End Communication in (Bounded Capacity, Omitting, Duplicating and non-FIFO) Dynamic Networks (Extended Abstract) / Shlomi Dolev, Ariel Hanemann, Elad Michael Schiller and Shantanu Sharma -- Self-stabilizing Distributed Data Fusion / Bertrand Ducourthial, Véronique Cherfaoui and Thierry Denoeux --
From Self- to Self-stabilizing with Service Guarantee 1-hop Weight-Based Clustering / Colette Johnen and Fouzi Mekhaldi -- Brief Announcement: Verification of Stabilizing Programs with SMT Solvers / Jingshu Chen and Sandeep Kulkarni -- Brief Announcement: MP-State: State-Aware Software Model Checking of Message-Passing Systems / Can Arda Muftuoglu, Péter Bokor and Neeraj Suri -- Oblivious Assignment with m Slots / Giuseppe Ateniese, Roberto Baldoni, Silvia Bonomi and Giuseppe Antonio Di Luna -- BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters / Mohammad Alaggan, Sébastien Gambs and Anne-Marie Kermarrec -- DQMP: A Decentralized Protocol to Enforce Global Quotas in Cloud Environments / Johannes Behl, Tobias Distler and Rüdiger Kapitza -- Brief Announcement: KARYON: Towards Safety Kernels for Cooperative Vehicular Systems / António Casimiro, Jörg Kaiser, Johan Karlsson, Elad Michael Schiller and Philippas Tsigas, et al. -- Brief Announcement: Arbitrators in the Security Infrastructure / Shlomi Dolev, Niv Gilboa and Ofer Hermoni --
Optimization in a Self-stabilizing Service Discovery Framework for Large Scale Systems / Eddy Caron, Florent Chuffart, Anissa Lamani and Franck Petit -- Scalable Byzantine Agreement with a Random Beacon / Olumuyiwa Oluwasanmi and Jared Saia -- On Finding Better Friends in Social Networks / Philipp Brandes and Roger Wattenhofer -- Brief Announcement: Detecting Users' Connectivity on Online Social Networks / Na Li, Sajal K. Das and Nan Zhang -- Brief Announcement: Discovering and Assessing Fine-Grained Metrics in Robot Networks Protocols / François Bonnet, Xavier Défago, Franck Petit, Maria Gradinariu Potop-Butucaru and Sébastien Tixeuil -- All-to-All Gradecast Using Coding with Byzantine Failures / John F. Bridgman III and Vijay K. Garg -- Fault-Tolerant Exploration of an Unknown Dangerous Graph by Scattered Agents / Paola Flocchini, Matthew Kellett, Peter C. Mason and Nicola Santoro -- A Theory of Fault Recovery for Component-Based Models / Borzoo Bonakdarpour, Marius Bozga and Gregor Gössler.
Record Nr. UPENN-9960100953503681
[SSS 2012 (2012 : Toronto, Ont.)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
E-voting and identify [electronic resource] : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings / James Heather, Steve Schneider, Vanessa Teague (eds.).
E-voting and identify [electronic resource] : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings / James Heather, Steve Schneider, Vanessa Teague (eds.).
Creatore [Vote-ID (Conference) (4th : 2013 : Guildford, England)]
Estensione 1 online resource.
Disciplina 324.6/50285
Accesso persona Heather, James
Schneider, Steve
Teague, Vanessa
Genere/Forma Electronic books
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data protection
Data encryption (Computer science)
Information systems
Systems and Data Security
Special Purpose and Application-Based Systems
Computer Appl. in Administrative Data Processing
ISBN 9783642391859 (electronic bk.)
3642391850 (electronic bk.)
9783642391842
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UPENN-9960108813503681
[Vote-ID (Conference) (4th : 2013 : Guildford, England)]  
Materiale a stampa
Lo trovi qui: University of Pennsylvania
IT-Risiko-Management mit System [electronic resource] : Von den Grundlagen bis zur Realisierung -- Ein praxisorientierter Leitfaden / von Hans-Peter Königs
IT-Risiko-Management mit System [electronic resource] : Von den Grundlagen bis zur Realisierung -- Ein praxisorientierter Leitfaden / von Hans-Peter Königs
Creatore [Königs, Hans-Peter]
Edizione [3., überarbeitete und erweiterte Auflage.]
Accesso ente SpringerLink (Online service)
Soggetto non controllato Systems and Data Security
Computer Science
ISBN 9783834899934
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Record Nr. UCHICAGO-8395151
[Königs, Hans-Peter]  
Materiale a stampa
Lo trovi qui: University of Chicago
Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings / Javier Lopez, Xinyi Huang, Ravi Sandhu (eds.).
Network and system security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings / Javier Lopez, Xinyi Huang, Ravi Sandhu (eds.).
Creatore [International Conference on Network and System Security (7th : 2013 : Madrid, Spain)]
Estensione 1 online resource.
Accesso persona Lopez, Javier
Huang, Xinyi
Sandhu, Ravi
Genere/Forma Electronic books
Conference papers and proceedings
Ebook
Congresses
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Information Systems
Systems and Data Security
Management of Computing and Information Systems
e-Commerce/e-business
ISBN 9783642386312
3642386318
9783642386305
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto NSS 2013 Regular Papers. Network Security: Modeling and Evaluation. Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study / Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro -- A Technology Independent Security Gateway for Real-Time Multimedia Communication / Fudong Li, Nathan Clarke, Steven Furnell -- Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network / Y. Sreenivasa Rao, Ratna Dutta -- Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection / Yuxin Meng, Wenjuan Li, Lam-for Kwok -- Model the Influence of Sybil Nodes in P2P Botnets / Tianzuo Wang [and others] -- Network Security: Security Protocols and Practice. A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture / Mahdi Aiash -- The OffPAD: Requirements and Usage / Kent Are Varmedal [and others] -- Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks / Sashi Gurung [and others] -- Using Trusted Platform Modules for Location Assurance in Cloud Networking / Christoph Krauß, Volker Fusenig.
Network Security: Network Attacks and Defense. Tracing Sources of Anonymous Slow Suspicious Activities / Harsha K. Kalutarage [and others] -- Static Analysis for Regular Expression Denial-of-Service Attacks / James Kirrage, Asiri Rathnayake, Hayo Thielecke -- Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding / Gabriel Cartier, Jean-François Cartier, José M. Fernandez -- Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning / Tamas K. Lengyel [and others] -- System Security: Malware and Intrusions. MADS: Malicious Android Applications Detection through String Analysis / Borja Sanz [and others] -- X-TIER: Kernel Module Injection / Sebastian Vogl [and others] -- Leveraging String Kernels for Malware Detection / Jonas Pfoh, Christian Schneider, Claudia Eckert -- Insiders Trapped in the Mirror Reveal Themselves in Social Media / Miltiadis Kandias [and others].
System Security: Applications Security. On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework / George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis -- Using the Smart Card Web Server in Secure Branchless Banking / Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis -- Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach / Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto -- Efficient and Private Three-Party Publish/Subscribe / Giovanni Di Crescenzo [and others] -- System Security: Security Algorithms and Systems. Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks / Aditi Gupta [and others] -- Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform / Wei Feng [and others] -- Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines / Suaad Alarifi, Stephen Wolthusen -- JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms / Benoît Bertholon, Sébastien Varrette, Pascal Bouvry.
Cryptographic Algorithms I. Forward Secure Certificateless Proxy Signature Scheme / Jiguo Li, Yanqiong Li, Yichen Zhang -- Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP / Hongda Li, Qihua Niu, Bei Liang -- On the Security of an Efficient Attribute-Based Signature / Yan Zhang [and others] -- Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method / Yao Lu, Rui Zhang, Dongdai Lin -- Cryptographic Algorithms II. Performance Prediction Model for Block Ciphers on GPU Architectures / Naoki Nishikawa [and others] -- Threshold-Oriented Optimistic Fair Exchange / Yang Wang [and others] -- Secure Storage and Fuzzy Query over Encrypted Databases / Zheli Liu [and others] -- A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation / Yunhui Zhuang [and others].
Privacy. Privacy Preserving Context Aware Publish Subscribe Systems / Mohamed Nabeel [and others] -- A New Unpredictability-Based RFID Privacy Model / Anjia Yang [and others] -- Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption / Florian Weingarten [and others] -- Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting / Weijia Wang, Lei Hu, Yong Li -- Key Agreement and Distribution. Light Weight Network Coding Based Key Distribution Scheme for MANETs / Jianwei Liu [and others] Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network / Chao Wang [and others] Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards / Shaohua Tang, Lingling Xu -- An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks / Elisavet Konstantinou.
NSS 2013 Short Papers. Human Identification with Electroencephalogram (EEG) for the Future Network Security / Xu Huang [and others] Building Better Unsupervised Anomaly Detector with S-Transform / Sirikarn Pukkawanna [and others] Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs / Jing Chen [and others] Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens / Kannan Karthik On the Use of Key Assignment Schemes in Authentication Protocols / James Alderman, Jason Crampton On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems / Idalides J. Vergara-Laurens, Diego Mendez-Chaves, Miguel A. Labrador Security Authentication of AODV Protocols in MANETs / Ahmad Alomari -- Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach / Markus Gruber [and others].
Towards a Privacy-Preserving Solution for OSNs / Qiang Tang -- Measuring and Comparing the Protection Quality in Different Operating Systems / Zhihui Han [and others] -- Collusion-Resistant Domain-Specific Pseudonymous Signatures / Julien Bringer, Hervé Chabanne, Alain Patey -- On the Applicability of Time-Driven Cache Attacks on Mobile Devices / Raphael Spreitzer, Thomas Plos -- Ancestor Excludable Hierarchical ID-Based Encryption Revisited / Fan Zhang, Hua Guo, Zhoujun Li -- Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks / Yan Li [and others] -- A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks / Jia Hu, Hui Lin, Li Xu -- Distributed and Anonymous Publish-Subscribe / Jörg Daubert [and others] -- Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs / Giovanni Agosta [and others].
NSS 2013 Industrial Track Papers. Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments / Shun-Wen Hsiao [and others] -- Filtering Trolling Comments through Collective Classification / Jorge de-la-Peña-Sordo [and others] Security Analysis of Touch Inputted Passwords / Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto -- A Pairing-Free Identity Based Authentication Framework for Cloud Computing / Dheerendra Mishra, Vinod Kumar, Sourav Mukhopadhyay -- Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols / Alessandro Armando, Roberto Carbone, Luca Zanetti -- Towards a More Secure Apache Hadoop HDFS Infrastructure / Jason Cohen, Subatra Acharya -- A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR / Mahdi Aiash -- A Comprehensive Access Control System for Scientific Applications / Muhammad I. Sarfraz [and others] -- Partial Fingerprint Reconstruction with Improved Smooth Extension / Wei Zhou [and others] -- Modeling and Analysis for Thwarting Worm Propagation in Email Networks / Sheng Wen, Yang Xiang, Wanlei Zhou -- On Secure and Power-Efficient RFID-Based Wireless Body Area Network / Sana Ullah, Waleed Alsalih -- Towards Authenticated Objects / Daniele Midi, Ashish Kundu, Elisa Bertino -- A Finger-Vein Based Cancellable Bio-cryptosystem / Wencheng Yang, Jiankun Hu, Song Wang.
Record Nr. UCHICAGO-11078737
[International Conference on Network and System Security (7th : 2013 : Madrid, Spain)]  
Materiale a stampa
Lo trovi qui: University of Chicago
Advances in information and computer security : 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011 : proceedings / Tetsu Iwata, Masakatsu Nishigaki (eds.).
Advances in information and computer security : 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011 : proceedings / Tetsu Iwata, Masakatsu Nishigaki (eds.).
Creatore [International Workshop on Security (6th : 2011 : Tokyo, Japan)]
Estensione 1 online resource (xii, 229 pages) : illustrations (some color).
Accesso persona Iwata, Tetsu
Nishigaki, Masakatsu
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Systems and Data Security
Management of Computing and Information Systems
Data Encryption
Computers and Society
Algorithm Analysis and Problem Complexity
ISBN 9783642251412
3642251412
9783642251405
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UCHICAGO-11076292
[International Workshop on Security (6th : 2011 : Tokyo, Japan)]  
Materiale a stampa
Lo trovi qui: University of Chicago