top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cryptographic hardware and embedded systems--CHES 2011 : 13th international workshop, Nara, Japan, September 28-October 1, 2011 : proceedings / Bart Preneel, Tsuyoshi Takagi, (eds.).
Cryptographic hardware and embedded systems--CHES 2011 : 13th international workshop, Nara, Japan, September 28-October 1, 2011 : proceedings / Bart Preneel, Tsuyoshi Takagi, (eds.).
Creatore [CHES (Workshop) (13th : 2011 : Nara-shi, Japan)]
Estensione 1 online resource (xiv, 524 pages) : illustrations (some color).
Disciplina 005.8
Accesso persona Preneel, Bart, 1963-
Takagi, Tsuyoshi (Mathematician)
Genere/Forma Electronic books
Soggetto non controllato Computer science
Data protection
Data structures (Computer science)
Data encryption (Computer science)
Coding theory
Computer software
Computational complexity
Data Encryption
Coding and Information Theory
Data Structures, Cryptology and Information Theory
Systems and Data Security
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 9783642239519
364223951X
9783642239502
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-005710737
[CHES (Workshop) (13th : 2011 : Nara-shi, Japan)]  
Materiale a stampa
Lo trovi qui: New York University
Mobile phone security and forensics : a practical approach / Iosif I. Androulidakis
Mobile phone security and forensics : a practical approach / Iosif I. Androulidakis
Creatore [Androulidakis, Iosif I.]
Estensione 1 online resource (xi, 105 pages) : color illustrations.
Disciplina 621.3845/6
Genere/Forma Electronic books
Soggetto non controllato Engineering
Data protection
Telecommunication
Communications Engineering, Networks
Systems and Data Security
Security Science and Technology
Forensic Science
ISBN 9781461416500
1461416507
1461416493
9781461416494
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: Confidentiality, Integrity, and Availability Threats in Mobile Phones -- A Multinational Survey on Users' Practices, Perceptions, and Awareness Regarding Mobile Phone Security -- Voice, SMS, and Identification Data Interception in GSM -- Software and Hardware Mobile Phone Tricks -- SMS Security Issues -- Mobile Phone Forensics -- Conclusion.
Record Nr. NYU-004374787
[Androulidakis, Iosif I.]  
Materiale a stampa
Lo trovi qui: New York University
Advanced computing, networking and security : International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised selected papers / edited by P. Santhi Thilagam [and others]
Advanced computing, networking and security : International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised selected papers / edited by P. Santhi Thilagam [and others]
Creatore [ADCONS (Conference) (2011 : Surathkal, India)]
Estensione 1 online resource (xvii, 641 pages).
Disciplina 004
Accesso persona Thilagam, P. Santhi
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data protection
Computer software
Information storage and retrieval systems
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
Systems and Data Security
Information Storage and Retrieval
ISBN 9783642292804
3642292801
3642292798
9783642292798
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A New Small World Lattice / Abhishek Parakh and Subhash Kak -- SLA -- Driven Dynamic Resource Allocation on Clouds / Siddesh G.M. and Srinivasa K.G. -- An Intelligent Cloud System Adopting File Pre-fetching / Jagadeesh Balasubramaniyan and Sumalatha Ramachandran -- Replication Infrastructure for RESTful Web Services / Marcin Bazydło, Szymon Francuzik, Cezary Sobaniec and Dariusz Wawrzyniak -- Context Awareness Acquisition for Safety Sensor Data Processing on Industrial Sensor Network / Joon-Mo Yang, Jun-Yong Park and Ryum-Duck Oh -- Content Based Service Discovery in Semantic Web Services Using WordNet / D. Paulraj and S. Swamynathan -- Optimal Selection of Web Services for Efficient QoS Driven Web Service Compositions / Demian Antony D'Mello, Manasa Shetty, Akshatha Prabhu, Akshaya and Adithi Shenoy -- Reconfigurable Web Service Composition Using Belief Revision / Deivamani Mallayya and Baskaran Ramachandran -- Semantic Web Service Discovery with Structural Level Matching of Operations / PonHarshavardhanan, J. Akilandeswari and K.A. Anjali Krishna -- A Novel Way of Tracking People in an Indoor Area / Aditya Narang, Sagar Prakash Joglekar, Karthikeyan Balaji Dhanapal and Arun Agrahara Somasundara.
Image Reconstruction in Electrical Impedance Tomography (EIT) with Projection Error Propagation-based Regularization (PEPR): A Practical Phantom Study / Tushar Kanti Bera, Samir Kumar Biswas, K. Rajan and J. Nagaraju -- Improved Hand Tracking and Isolation from Face by ICondensation Multi Clue Algorithm for Continuous Indian Sign Language Recognition / J. Rekha, J. Bhattacharya and S. Majumder -- An Approach for Color Edge Detection with Automatic Threshold Detection / Arpitha M.D., Megha P. Arakeri and G. Ram Mohan Reddy -- Detection of Straight Lines Using Rule Directed Pixel Comparison (RDPC) Method / Anand T.V., Madhu S. Nair and Rao Tatavarti -- Performance Analysis of Pedestrian Detection at Night Time with Different Classifiers / Praveen Cyriac and Philomina Simon -- Enhanced Quality Preserved Image Compression Technique Using Edge Assisted Wavelet Based Interpolation / A. Benjamin Joseph and Baskaran Ramachandran -- Multilayer Feedforward Neural Network Models for Pattern Recognition Tasks in Earthquake Engineering / T. Ashwini Reddy, K. Renuka Devi and Suryakanth V. Gangashetty -- A Sensitive Attribute Based Clustering Method for k-Anonymization / Pawan Bhaladhare and Devesh Jinwala.
Generalization Capability of Artificial Neural Network Incorporated with Pruning Method / Siddhaling Urolagin, Prema K.V. and N.V. Subba Reddy -- Post Mining of Diversified Multiple Decision Trees for Actionable Knowledge Discovery / Sudha Subramani and Sathiyabhama Balasubramaniam -- Clustering Biological Data Using Voronoi Diagram / Damodar Reddy Edla and Prasanta K. Jana -- Knowledge Management Techniques for Analysis of Clinical Databases / T. Deepa, Sathiyabhama Balasubramaniam, J. Akilandeswari and N.P. Gopalan -- Digital Microscopic Bacterial Cell Growth Analysis and Cell Division Time Determination for Escherichia coli Using Fuzzy Inference System / P.S. Hiremath and Parashuram Bannigidad -- Combining Load Balancing with Shared Storage and Primary Backup Replicaton / Marcin Bazydło -- Smart Playlist Generation Using Data Mining Techniques / Prafulla Kalapatapu and Aruna Malapati -- Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors / Durgaprasad Gangodkar, Sachin Gupta, Gurbinder Singh Gill, Padam Kumar and Ankush Mittal -- EgressBug: A Real Time Path Planning Algorithm for a Mobile Robot in an Unknown Environment / K.R. Guruprasad -- PEAL-Packed Executable AnaLysis / Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki and Smita Naval.
Qualitative and Quantitative Evaluation of Correlation Based Stereo Matching Algorithms / Raghavendra U., Krishnamoorthi Makkithaya and Karunakar A.K. -- Variable Neighborhood Search Guided Differential Evolution for Non Convex Economic Load Dispatch / J. Jasper and T Aruldoss Albert Victoire -- Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm in an Indoor Environment / D. Tamilselvi, S. Mercy Shalinie, A. Fathima Thasneem and S. Gomathi Sundari -- Recent Advancements in Parallel Algorithms for String Matching on Computing Models -- A Survey and Experimental Results / Chinta Someswararao, K. Butchi Raju, S.V. Appaji, S. Viswanadha Raju and K.K.V.V.V.S. Reddy -- Electronic Governance in Rural Areas: A Performance Case Study with WiMAX Technology / Rakesh Kumar Jha and Upena D. Dalal -- Scalable Video Delivery over Peer-to-Peer Network / Karunakar A.K., Younsong Qio and Brian Lee -- K-Resilient Server Synchronization Protocol for Session Guarantees in MANET Environments / Łukasz Piątkowski -- Performance Analysis of AODV and DSR Routing Protocols for Ad-Hoc Networks / Anshuman Biswas, Banani Saha and Saswati Guha.
Data Distribution Service on Top of FlexRay Vehicle Networks / Houda Jaouani, Rim Bouhouch, Wafa Najjar and Salem Hasnaoui -- CAMP: Congestion Adaptive Multipath Routing Protocol for VANETs / Raviteja B.L., Annappa B. and Mohit P. Tahiliani -- Bit-Based Fairness in IEEE802.11p MAC for Vehicle-to-Infrastructure Networks / Harigovindan V.P., A.V. Babu and Lillykutty Jacob -- CBRM -- Cluster Based Replica Management in Mobile Adhoc Networks / Rajeev Kumar, Prashant Kumar and Naveen Chauhan -- A Linear Model of Call Intercepting Probability of Integrated WLANs in a 3G Cell / S. Nandakumar and Sibaram Khara -- An Optimum Approach for Radio Resource Allocation(RRA) in Mobile WiMAX Network / Rakesh Kumar Jha, Wankhade Visal A. and Upena D. Dalal -- Strong Minimum Interference Topology for Wireless Sensor Networks / B.S. Panda and D. Pushparaj Shetty -- Distributed Localization for Anisotropic Sensor Networks Using Spatial Clustering / Lakshmi Priya M. and Lalit K. Awasthi -- CAs-based QoS Scheme for Remote Health Monitoring over WMSN / Bhargavi K. and Sathish Babu B.
Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs / N. Chandrakant, A.P. Bijil, P. Deepa Shenoy, K.R. Venugopal and L.M. Patnaik -- Improved Load Balanced Clustering Algorithm for Wireless Sensor Networks / Pratyay Kuila and Prasanta K. Jana -- Node -- Link Disjoint Multipath Routing Protocols for Wireless Sensor Networks -- A Survey and Conceptual Modeling / Muni Venkateswarlu K., K. Chandra Sekaran and A. Kandasamy -- Self Healing Wireless Sensor Network / Sumathi S. and Chandrasekaran M. -- Contention Detection and Minimization in All Optical Routers / Surinder Singh and Meenakshi Garg -- FARED: Fast Adapting RED Gateways for TCP/IP Networks / Mohit P. Tahiliani, K.C. Shet and T.G. Basavaraju -- An Efficient and Reliable Centralized Connection Management Scheme for Computer Networks / Shreesha Kashyap, Shravan I.V., Anuraj Suman, Ramesh T.K. and Vaya P.R. -- Obstacle Aware Routing in 3D Integrated Circuits / Prasun Ghosal, Hafizur Rahaman, Satrajit Das, Arindam Das and Parthasarathi Dasgupta -- A Mathematical Model to Realize the Parallel Computing Based Diminution Tree with List Ranking Based BD-TTCS as a New IPv4/IPv6 Transition Mechanism / J. Hanumanthappa and Manjaiah D.H. -- Consistency Maintenance of Modern Security Policies / Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak and Michał Szychowiak.
Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation / P. Vijayakumar, S. Bose and A. Kannan -- Reputation-Based Trust for Mobile Agents / Priyanka Dadhich, Kamlesh Dutta and M.C. Govil -- Anonymity in Attribute-Based Group Signatures / Bhumika K. Patel and Devesh Jinwala -- Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography / K. Kumar, J. Nafeesa Begum and V. Sumathy -- Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext / Nishant Doshi and Devesh Jinwala -- SQL Injection Attack Mechanisms and Prevention Techniques / Roshni Chandrashekhar, Manoj Mardithaya, Santhi Thilagam and Dipankar Saha -- Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks / Abhinav Bhandari, A.L. Sangal and Krishan Kumar Saluja -- Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER Testbed / Ketki Arora, Krishan Kumar and Monika Sachdeva -- A Robust Defense Mechanism to Prevent Phishing Attack Using Parse Tree Validation / V. Shanmughaneethi, Regan Abraham and S. Swamynathan.
Correlation in Distributed Intrusion Detection System Using Mobile Agent / Zakiya Malek, Asha Koshti, Chintan Bhatt, Hemant Agrwal and Bhushan Trivedi -- A Novel Architecture for the Generation of Picture Based CAPTCHA / S. Benson Edwin Raj, V.S. Jayanthi and V. Muthulakshmi -- Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images / Sachin Mehta, Vijayaraghavan Varadharajan and Rajarathnam Nallusamy -- Covertness Analysis of Subliminal Channels in Legitimate Communication / H.S. Gururaja, M. Seetha and Anjan K. Koundinya -- Dynamic Substitution and Diffusion Based Image Encryption Using Modified Logistic Map / P. Devaraj -- Misbehavior Detection Based on Ensemble Learning in VANET / Jyoti Grover, Vijay Laxmi and Manoj Singh Gaur -- An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration / Poonam Saini and Awadhesh Kumar Singh -- Application of IP Traceback Mechanism to OnlineVoting System / V.K. Soundar Rajam, B. Sundaresa Pandian, S. Mercy Shalinie and Tulika Pandey -- Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network / K. Ganesh Reddy and P. Santhi Thilagam.
Record Nr. NYU-004374875
[ADCONS (Conference) (2011 : Surathkal, India)]  
Materiale a stampa
Lo trovi qui: New York University
Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings / edited by Werner Schindler, Sorin A. Huss
Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings / edited by Werner Schindler, Sorin A. Huss
Creatore [COSADE 2012 (2012 : Darmstadt, Germany)]
Estensione 1 online resource (x, 264 pages) : illustrations (some color).
Disciplina 005.8/2
Accesso persona Schindler, Werner, 1963-
Huss, Sorin A. (Sorin Alexander)
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Computers and Society
ISBN 9783642299124
3642299121
3642299113
9783642299117
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Exploiting the Difference of Side-Channel Leakages / Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt and Stefan Mangard -- Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario / Thomas Korak, Thomas Plos and Michael Hutter -- 700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy / Mathias Wagner -- An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation / Wei He, Eduardo de la Torre and Teresa Riesgo -- An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers / Shohreh Sharif Mansouri and Elena Dubrova -- Conversion of Security Proofs from One Leakage Model to Another: A New Issue / Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner and Matthieu Rivain, et al. -- Attacking Exponent Blinding in RSA without CRT / Sven Bauer -- A New Scan Attack on RSA in Presence of Industrial Countermeasures / Jean Da Rolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes and Bruno Rouzeyre, et al.
RSA Key Generation: New Attacks / Camille Vuillaume, Takashi Endo and Paul Wooderson -- A Fault Attack on the LED Block Cipher / Philipp Jovanovic, Martin Kreuzer and Ilia Polian -- Differential Fault Analysis of Full LBlock / Liang Zhao, Takashi Nishide and Kouichi Sakurai -- Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator / Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer and François Poucheret, et al. -- A Closer Look at Security in Random Number Generators Design / Viktor Fischer -- Same Values Power Analysis Using Special Points on Elliptic Curves / Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst and David Naccache -- The Schindler-Itoh-attack in Case of Partial Information Leakage / Alexander Krüger -- Butterfly-Attack on Skein's Modular Addition / Michael Zohner, Michael Kasper and Marc Stöttinger -- MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation / Xinjie Zhao, Fan Zhang, Shize Guo, Tao Wang and Zhijie Shi, et al. -- Intelligent Machine Homicide / Breaking Cryptographic Devices Using Support Vector Machines / Annelie Heuser and Michael Zohner.
Record Nr. NYU-004375032
[COSADE 2012 (2012 : Darmstadt, Germany)]  
Materiale a stampa
Lo trovi qui: New York University
Crittografia nel Paese delle Meraviglie [electronic resource] / Daniele Venturi
Crittografia nel Paese delle Meraviglie [electronic resource] / Daniele Venturi
Creatore [Venturi, Daniele]
Estensione 1 online resource (xiv, 500 pages) : illustrations.
Disciplina 005.8/2
Genere/Forma Electronic books
Soggetto non controllato Computer science
Data protection
Data encryption (Computer science)
Mathematics
Data Structures, Cryptology and Information Theory
Systems and Data Security
Applications of Mathematics
ISBN 9788847024816
8847024811
8847024803
9788847024809
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Nota di contenuto Part 1. Introduzione -- Introduzione -- Parte I. Crittografia di Base -- Sicurezza incondizionata -- Randomicità e pseudorandomicità -- Funzioni hash -- Cifrari simmetrici -- Cifrari asimmetrici -- Tecniche simmetriche di integrità -- Tecniche asimmetriche di integrità -- Reticoli e crittografia -- Crittografia su base identità -- Parte II. Protocolli -- "Scambi di mano" sicuri -- Password in crittografia -- Conoscenza nulla -- Computazione a parti multiple.
Record Nr. NYU-004375214
[Venturi, Daniele]  
Materiale a stampa
Lo trovi qui: New York University
Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers / Pavel Gladyshev, Marcus K. Rogers (eds.).
Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers / Pavel Gladyshev, Marcus K. Rogers (eds.).
Creatore [International Conference on Digital Forensics and Cyber Crime (3rd : 2011 : Dublin, Ireland)]
Estensione 1 online resource (xi, 296 pages) : illustrations.
Disciplina 364.16/8
Accesso persona Gladyshev, Pavel
Rogers, Marcus K.
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer network architectures
Data protection
Systems and Data Security
Management of Computing and Information Systems
Computer System Implementation
ISBN 9783642355158
3642355153
9783642355141
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cybercrime Investigations -- The Role of Perception in Age Estimation / Cynthia A. Murphy -- Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers / Kathryn C. Seigfried-Spellar, Gary R. Bertoline, Marcus K. Rogers -- Law Enforcement 2.0: Regulating the Lawful Interception of Social Media / Esti Peshin -- Mobile Device Forensics -- All Bot Net: A Need for Smartphone P2P Awareness / Kelly A. Cole, Ramindu L. Silva, Richard P. Mislan -- Results of Field Testing Mobile Phone Shielding Devices / Eric Katz, Richard Mislan, Marcus Rogers, Anthony Smith -- Windows Phone 7 from a Digital Forensics' Perspective / Thomas Schaefer, Hans Höfken, Marko Schuba -- An Agent Based Tool for Windows Mobile Forensics / S. Satheesh Kumar, Bibin Thomas, K.L. Thomas -- Forensic Extractions of Data from the Nokia N900 / Mark Lohrum.
New Developments in Digital Forensics -- A Strategy for Testing Metadata Based Deleted File Recovery Tools / James R. Lyle -- Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus / Neil C. Rowe, Simson L. Garfinkel -- A Novel Methodology for Malware Intrusion Attack Path Reconstruction / Ahmed F. Shosha, Joshua I. James, Pavel Gladyshev -- Performance Issues About Context-Triggered Piecewise Hashing / Frank Breitinger, Harald Baier -- Short Papers -- Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment / Sean Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert France -- Yahoo! Messenger Forensics on Windows Vista and Windows 7 / Matthew Levendoski, Tejashree Datar, Marcus Rogers -- Robust Hashing for Efficient Forensic Analysis of Image Sets / Martin Steinebach.
Tracking User Activity on Personal Computers / Anthony Keane, Stephen O'Shaughnessy -- Digital Forensics Techniques -- The Forensic Value of the Windows 7 Jump List / Alexander G. Barnett -- Finding Forensic Information on Creating a Folder in LogFile of NTFS / Gyu-Sang Cho, Marcus K. Rogers -- Rescuing Digital Data from Submerged HDD / Toshinobu Yasuhira, Kazuhiro Nishimura, Tomofumi Koida -- Digital Forensics Education -- Evaluating the Forensic Image Generator Generator / Christian Moch, Felix C. Freiling -- Internet and Network Investigations -- Forensic Extractions of Data from the Nokia N900 / Mark Lohrum -- Formal Methods of Digital Forensics -- A Forensic Framework for Incident Analysis Applied to the Insider Threat / Clive Blackwell -- Reasoning About a Simulated Printer Case Investigation with Forensic Lucid / Serguei A. Mokhov, Joey Paquet, Mourad Debbabi.
Record Nr. NYU-004389298
[International Conference on Digital Forensics and Cyber Crime (3rd : 2011 : Dublin, Ireland)]  
Materiale a stampa
Lo trovi qui: New York University
Formal aspects of security and trust : 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised selected papers / Gilles Barthe, Anupam Datta, Sandro Etalle (eds.).
Formal aspects of security and trust : 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised selected papers / Gilles Barthe, Anupam Datta, Sandro Etalle (eds.).
Creatore [FAST (Workshop) (8th : 2011 : Leuven, Belgium)]
Estensione 1 online resource (x, 277 pages) : illustrations.
Disciplina 005.8
Accesso persona Barthe, Gilles, 1967-
Datta, Anupam
Etalle, Sandro
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Information storage and retrieval systems
Information Systems
Systems and Data Security
Computers and Society
Management of Computing and Information Systems
Information Storage and Retrieval
ISBN 9783642294204
3642294200
9783642294198
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Verifying Cryptographic Code in C: Some Experience and the Csec Challenge / Mihhail Aizatulin, François Dupressoir, Andrew D. Gordon and Jan Jürjens -- Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation / Willem De Groef, Dominique Devriese and Frank Piessens -- Differential Privacy: On the Trade-Off between Utility and Information Leakage / Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano and Catuscia Palamidessi -- On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information Flow / Luciano Bello and Eduardo Bonelli -- Min-Entropy Leakage of Channels in Cascade / Barbara Espinoza and Geoffrey Smith -- Secure Recharge of Disposable RFID Tickets / Riccardo Focardi and Flaminia L. Luccio -- Avoiding Delegation Subterfuge Using Linked Local Permission Names / Simon N. Foley and Samane Abdi -- Verifiable Control Flow Policies for Java Bytecode / Arnaud Fontaine, Samuel Hym and Isabelle Simplot-Ryl -- Concepts and Proofs for Configuring PKCS#11 / Sibylle Fröschle and Nils Sommer -- Service Automata / Richard Gay, Heiko Mantel and Barbara Sprick -- Analysing Applications Layered on Unilaterally Authenticating Protocols / Thomas Gibson-Robinson and Gavin Lowe -- Type-Based Enforcement of Secure Programming Guidelines -- Code Injection Prevention at SAP / Robert Grabowski, Martin Hofmann and Keqin Li -- TBA : A Hybrid of Logic and Extensional Access Control Systems / Timothy L. Hinrichs, William C. Garrison III, Adam J. Lee, Skip Saunders and John C. Mitchell -- Diffie-Hellman without Difficulty / Sebastian Mödersheim -- Is Cryptyc Able to Detect Insider Attacks? / Behnam Sattarzadeh and Mehran S. Fallah -- Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes / Ben Smyth, Mark Ryan and Liqun Chen -- Risk Balance in Optimistic Non-repudiation Protocols / Mohammad Torabi Dashti, Jan Cederquist and Yanjing Wang.
Record Nr. NYU-004375844
[FAST (Workshop) (8th : 2011 : Leuven, Belgium)]  
Materiale a stampa
Lo trovi qui: New York University
Pervasive computing : 10th International Conference, Pervasive 2012, Newcastle, UK, June 18-22, 2012. Proceedings / Judy Kay [and others] (eds.).
Pervasive computing : 10th International Conference, Pervasive 2012, Newcastle, UK, June 18-22, 2012. Proceedings / Judy Kay [and others] (eds.).
Creatore [Pervasive (Conference) (10th : 2012 : Newcastle upon Tyne, England)]
Estensione 1 online resource (xvi, 480 pages) : illustrations.
Disciplina 004
Accesso persona Kay, Judy
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Computer simulation
Information Systems Applications (incl. Internet)
User Interfaces and Human Computer Interaction
Systems and Data Security
Simulation and Modeling
Computers and Society
ISBN 9783642312052
3642312055
9783642312045
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Personalized Driving Behavior Monitoring and Analysis for Emerging Hybrid Vehicles / Kun Li, Man Lu, Fenglong Lu, Qin Lv and Li Shang, et al. -- Mimic Sensors: Battery-Shaped Sensor Node for Detecting Electrical Events of Handheld Devices / Takuya Maekawa, Yasue Kishino, Yutaka Yanagisawa and Yasushi Sakurai -- Leveraging Children's Behavioral Distribution and Singularities in New Interactive Environments: Study in Kindergarten Field Trips / Inseok Hwang, Hyukjae Jang, Taiwoo Park, Aram Choi and Youngki Lee, et al. -- Urban Traffic Modelling and Prediction Using Large Scale Taxi GPS Traces / Pablo Samuel Castro, Daqing Zhang and Shijian Li -- A Unified Framework for Modeling and Predicting Going-Out Behavior / Shoji Tominaga, Masamichi Shimosaka, Rui Fukui and Tomomasa Sato -- The Hidden Image of the City: Sensing Community Well-Being from Urban Mobility / Neal Lathia, Daniele Quercia and Jon Crowcroft -- Scalable Mining of Common Routes in Mobile Communication Network Traffic Data / Olof Görnerup -- Accounting for Energy-Reliant Services within Everyday Life at Home / Oliver Bates, Adrian K. Clear, Adrian Friday, Mike Hazas and Janine Morley -- Smart Blueprints: Automatically Generated Maps of Homes and the Devices Within Them / Jiakang Lu and Kamin Whitehouse -- Hacking the Natural Habitat: An In-the-Wild Study of Smart Homes, Their Development, and the People Who Live in Them / Sarah Mennicken and Elaine M. Huang -- The Design of a Segway AR-Tactile Navigation System / Ming Li, Lars Mahnkopf and Leif Kobbelt -- Route Guidance Modality for Elder Driver Navigation / SeungJun Kim, Jin-Hyuk Hong, Kevin A. Li, Jodi Forlizzi and Anind K. Dey -- Interactive Environment-Aware Handheld Projectors for Pervasive Computing Spaces / David Molyneaux, Shahram Izadi, David Kim, Otmar Hilliges and Steve Hodges, et al. -- .NET Gadgeteer: A Platform for Custom Devices / Nicolas Villar, James Scott, Steve Hodges, Kerry Hammil and Colin Miller -- Recognizing Handheld Electrical Device Usage with Hand-Worn Coil of Wire / Takuya Maekawa, Yasue Kishino, Yutaka Yanagisawa and Yasushi Sakurai -- Self-calibration of RFID Reader Probabilities in a Smart Real-Time Factory / Bilal Hameed, Farhan Rashid, Frank Dürr and Kurt Rothermel -- AWESOM: Automatic Discrete Partitioning of Indoor Spaces for WiFi Fingerprinting / Teemu Pulkkinen and Petteri Nurmi -- Indoor Pedestrian Navigation Based on Hybrid Route Planning and Location Modeling / Kari Rye Schougaard, Kaj Grønbæk and Tejs Scharling -- Estimating Position Relation between Two Pedestrians Using Mobile Phones / Daisuke Kamisaka, Takafumi Watanabe, Shigeki Muramatsu, Arei Kobayashi and Hiroyuki Yokoyama -- Clearing a Crowd: Context-Supported Neighbor Positioning for People-Centric Navigation / Takamasa Higuchi, Hirozumi Yamaguchi and Teruo Higashino -- Paying in Kind for Crowdsourced Work in Developing Regions / Navkar Samdaria, Akhil Mathur and Ravin Balakrishnan -- Tangible and Casual NFC-Enabled Mobile Games / Luis F.G. Sarmenta -- Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks / Igor Bilogrevic, Murtuza Jadliwala, István Lám, Imad Aad and Philip Ginzboorg, et al. -- Map-Aware Position Sharing for Location Privacy in Non-trusted Systems / Pavel Skvortsov, Frank Dürr and Kurt Rothermel -- Sense and Sensibility in a Pervasive World / Christos Efstratiou, Ilias Leontiadis, Marco Picone, Kiran K. Rachuri and Cecilia Mascolo, et al. -- From School Food to Skate Parks in a Few Clicks: Using Public Displays to Bootstrap Civic Engagement of the Young / Simo Hosio, Vassilis Kostakos, Hannu Kukka, Marko Jurmu and Jukka Riekki, et al. -- Increasing Brand Attractiveness and Sales through Social Media Comments on Public Displays -- Evidence from a Field Experiment in the Retail Industry / Erica Dubach Spiegler, Christian Hildebrand and Florian Michahelles -- Automatic Description of Context-Altering Services through Observational Learning / Katharina Rasch, Fei Li, Sanjin Sehic, Rassul Ayani and Schahram Dustdar.
Record Nr. NYU-004375880
[Pervasive (Conference) (10th : 2012 : Newcastle upon Tyne, England)]  
Materiale a stampa
Lo trovi qui: New York University
Topics in cryptology-- CT-RSA 2012 : the Cryptographers' track at the RSA Conference 2012, San Francisco, CA, USA, February 27-March 2, 2012. Proceedings / Orr Dunkelman (ed.).
Topics in cryptology-- CT-RSA 2012 : the Cryptographers' track at the RSA Conference 2012, San Francisco, CA, USA, February 27-March 2, 2012. Proceedings / Orr Dunkelman (ed.).
Creatore [Cryptographers' Track at RSA Conference (2012 : San Francisco, Calif.)]
Estensione 1 online resource (xiii, 434 pages).
Disciplina 005.8/2
Accesso persona Dunkelman, Orr.
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Computational complexity
Discrete Mathematics in Computer Science
Systems and Data Security
Algorithm Analysis and Problem Complexity
ISBN 9783642279546
3642279546
9783642279539
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004621869
[Cryptographers' Track at RSA Conference (2012 : San Francisco, Calif.)]  
Materiale a stampa
Lo trovi qui: New York University
Emerging trends and applications in information communication technologies : second International Multi Topic Conference, IMTIC 2012, Jamshoro, Pakistan, March 28-30, 2012. Proceedings / Bhawani Shankar Chowdhry [and others] (eds.).
Emerging trends and applications in information communication technologies : second International Multi Topic Conference, IMTIC 2012, Jamshoro, Pakistan, March 28-30, 2012. Proceedings / Bhawani Shankar Chowdhry [and others] (eds.).
Creatore [IMTIC 2012 (2012 : Jamshoro, Pakistan)]
Estensione 1 online resource (xv, 554 pages) : illustrations (some color).
Disciplina 004
Accesso persona Chowdhry, Bhawani Shankar
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Computer software
Information storage and retrieval systems
Artificial intelligence
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Systems and Data Security
ISBN 9783642289620
3642289622
9783642289613
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Impact Analysis of Renewable Energy in National Grids for Energy Deficit Countries / Muhammad Aamir, Javier Poncela, Bhawani Shankar Chowdhry and Muhammad Aslam Uqaili -- Chebyshev Multiband Patch Antenna / Syed Muzahir Abbas, Ilyas Saleem, Abida Parveen, Hijab Zahra and Shahid Ahmed Khan -- A Compact Multiband Antenna for GSM and WiMAX Applications / M. Ali Babar Abbasi, M. Rizwan, Saleem Shahid, Sabaina Rafique and Haroon Tariq Awan, et al. -- Haplotype Segment Algorithm for Predicting Disease Gene Locus Based on Distance/Similarity Measures / Adeel Ahmed and Khalid Saleem -- Effect of Fast Moving Object on RSSI in WSN: An Experimental Approach / Syed Hassan Ahmed, Safdar Hussain Bouk, Amjad Mehmood, Nadeem Javaid and Sasase Iwao -- Performance Analysis of Bessel Beamformer and LMS Algorithm for Smart Antenna Array in Mobile Communication System / Pervez Akhtar and Muhammad Yasin -- Adaptive Minimum Entropy Beamforming Algorithms for Narrowband Signals / Anum Ali and Shafayat Abrar -- Gender Classification Using Local Binary Pattern and Particle Swarm Optimization / Sajid Ali Khan, Muhammad Nazir, Naveed Riaz, M. Hussain and Nawazish Naveed -- Parametric Study of Nonlinear Adaptive Cruise Control Vehicle Model by Vehicle Mass / Zeeshan Ali and Dur Muhammad Pathan -- ECAODV: Enhanced Classified Ad-Hoc on Demand Distance Vector Routing Protocol / Noorul Amin, Nizamuddin and Abdelmuttlib Ibrahim.
An External Approach to Improve the Information Content of Diagnostic Ultrasound Images / Samreen Amir, Bhawani Shankar Chowdhry, Muhammad Asif and Bhibekshan Chowdhry -- Comparative Analysis of Group Centric Access Control Models / Hirra Anwar and Muhammad Awais Shibli -- Nonlinear System Identification Using Neural Network / Muhammad Asif Arain, Helon Vicente Hultmann Ayala and Muhammad Adil Ansari -- Intrusion Damage Assessment for Multi-stage Attacks for Clouds / Junaid Arshad, Imran Ali Jokhio and Mahmood Shah -- Emotions in Robots / Muhammad Mansoor Azeem, Jamshed Iqbal, Pekka Toivanen and Abdul Samad -- On the Use of the Universal Okumura-Hata Model for Defining Different ICT Areas / Dipashree M. Bhalerao, M. Tahir Riaz, Ole Brun Madsen and Ramjee Prasad -- A Novel Approach for Automatic Generation of UML Class Diagrams from XMI / Kashif Hameed, Imran Sarwar Bajwa and Muhammad Asif Naeem -- An Efficient Link Bundling Transport Layer Protocol for Achieving Higher Data Rate and Availability / Muhammad Adnan Hashmi, Imran Shafi, Syed Ismail Shah and Jamil Ahmad -- Improvement of Small Signal Performance of Multi Machine Power System Using SMIB Based PSS and STATCOM Designs / Bilal Hussain, Muhammad Usman, Affan Ahsan, Ahmad Talha and Farhan Mahmood -- Are QoE Requirements for Multimedia Services Different for Men and Women? Analysis of Gender Differences in Forming QoE in Virtual Acoustic Environments / Mansoor Hyder, Khalil ur Rehman Laghari, Noel Crespi, Michael Haun and Christian Hoene.
Facilitating an Off-Site Customer in Product-Based Agile Software Development: An Industrial Case Study / Irum Inayat, Muhammad Asim Noor and Zubaria Inayat -- Segmentation of Brain Tumor Tissue Using Marker Controlled Watershed Transform Method / Muhammad Kaleem, M. Sanaullah, M. Ayyaz Hussain, M. Arfan Jaffar and Tae-Sun Choi -- Performance Evaluation of Statistical Techniques for Adaptive Scheduling in Autonomic Systems / Omer Khalid, Richard Anthony and Miltos Petridis -- Angle Differential Modulation Scheme for Odd-Bit QAM / Syed Safwan Khalid and Shafayat Abrar -- Adaptive Wavelets Based Fuzzy NN Control for Active Suspension Model / Laiq Khan, Shahid Qamar and Muhammad Umair Khan -- Blind Deconvolution of Blurred Images with Fuzzy Size Detection of Point Spread Function / Salman Hameed Khan, Muhammad Sohail, Ahmed Rehan, Zeashan Hameed Khan and Arsalan Hameed Khan -- Bluetooth Usage Control Policy Enforcement Model / Shahryar Khan and Inayatullah Babar -- A Comparative Study on Particle Swarm Optimization and Genetic Algorithms for Fixed Order Controller Design / Faizullah Mahar, Syed Saad Azhar Ali and Zuhaibuddin Bhutto -- Design of WLAN Patch and UWB Monopole Antenna / Faraz Mahmood, Syed Muhammad Usman Ali, Mahmood Alam and Magnus Willander -- Single-Bit Ternary FIR Filter in FPGA Using Canonical Signed Digit Encoding / Tayab D. Memon, Abdullah Alhassani and Paul Beckett.
A Parametric Analysis of Stream Based Joins / Muhammad Asif Naeem, Gillian Dobbie, Gerald Weber and Imran Sarwar Bajwa -- Efficient Usage of Memory Resources in Near-Real-Time Data Warehousing / Muhammad Asif Naeem, Gillian Dobbie, Gerald Weber and Imran Sarwar Bajwa -- Classifier Ensemble Framework Based on Clustering Method / Hamid Parvin, Sajad Parvin, Zahra Rezaei and Moslem Mohamadi -- Usability Cost Benefit Analysis Using a Mathematical Equation / Samina Rajper, Abdul Wahid Shaikh, Zubair A. Shaikh and Imran Amin -- Efficient FPGA Implementation of Secure Hash Algorithm Grøstl -- SHA-3 Finalist / M. Muzaffar Rao, Kashif Latif, Arshad Aziz and Athar Mahboob -- Capture Largest Included Circles: An Approach for Counting Red Blood Cells / Saima Rathore, Aksam Iftikhar, Ahmad Ali, Mutawarra Hussain and Abdul Jalil -- Enhanced Image Encryption Techniques Using Modified Advanced Encryption Standard / Faisal Riaz, Sumira Hameed, Imran Shafi, Rakshanada Kausar and Anil Ahmed -- Virtual Instrumentation for Control Applications / Syed Ali Asad Rizvi, Sham Sunder, Farah Haroon and Ashab Mirza -- Data Management in Mobile Wireless Sensor Networks / Syeda Nida Sahar and Faisal Karim Shaikh -- Implementation of Load Shedding Apparatus for Energy Management in Pakistan / Hira Sakrani, Tooba Tariq Butt, Moezul Hassan, Sarmad Hameed and Imran Amin.
JAM: Mitigating Jellyfish Attacks in Wireless Ad Hoc Networks / Fahad Samad, Qassem Abu Ahmed, Asadullah Shaikh and Abdul Aziz -- Aggregating Node Level Risk Assessment in Grids Using an R-out-of-N Model / Asif Sangrasi, Karim Djemame and Imran Ali Jokhio -- Hybrid Ant Bee Colony Algorithm for Volcano Temperature Prediction / Habib Shah, Rozaida Ghazali and Nazri Mohd Nawi -- Building Wireless Sensor Networks Application Using Sun SPOTs / Asadullah Shaikh, Naveed Anjum, Fahad Samad and Asadullah Shah -- Study of Arduino for Creative and Interactive Artwork Installations / An Open Source Software Knowledge for Creativeness / Murtaza Hussain Shaikh -- Developing and Managing SLAs for Business Applications in Information Systems / Aijaz Soomro and William Song -- Image Retrieval Based on Color and Texture Feature Using Artificial Neural Network / Sajjad Hussain, Manzoor Hashmani, Muhammad Moinuddin, Mikio Yoshida and Hidenori Kanjo -- An Objective Based Classification of Aggregation Techniques for Wireless Sensor Networks / Qurat-ul-Ain I. Tariq, Saneeha Ahmed and Huma Zia -- A New Data Compression Technique Using an Evolutionary Programming Approach / Fahad Ullah and Khawaja M. Yahya -- Evaluation of Dc/Dc Buck Converter Controlled by LMS (Least Mean Square) Algorithm for Different Values of Load Capacitor / Farooq Kifayat Ullah -- Exploiting Multi View Video for Maximizing Lifetime of Wireless Video Sensor Networks / Saima Zareen, Khalid Iqbal, Almas Anjum and Shoaib A. Khan.
Record Nr. NYU-004622624
[IMTIC 2012 (2012 : Jamshoro, Pakistan)]  
Materiale a stampa
Lo trovi qui: New York University