close
1.

電子ブック

EB
Pierangela Samarati, Takeo Kanade, Konstantinos Markantonakis, Joachim Posegga, Damien Sauveron, Michael Tunstall
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Embedded Security
Efficient and Effective Buffer Overflow Protection on ARM Processors / Raoul Strackx ; Yves Younan ; Pieter Philippaerts ; Frank Piessens
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines / Alexandre Venelli
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones / Tansu Alpcan ; Christian Bauckhage ; Aubrey-Derrick Schmidt
A Smart Card Implementation of the McEliece PKC / Falko Strenzke
Evaluation Metrics of Physical Non-invasive Security / Huiyun Li ; Keke Wu ; Fengqi Yu ; Hai Yuan
Protocols
Trust in Peer-to-Peer Content Distribution Protocols / Nicolai Kuntze ; Carsten Rudolph ; Andreas Fuchs
Generic Constructions of Biometric Identity Based Encryption Systems / Neyire Deniz Sarier
Design and Analysis of a Generalized Canvas Protocol / Marián Novotný
Highly Constrained Embedded Systems
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures / Michael Braun ; Ulrike Meyer ; Susanne Wetzel
Practical Schemes for Privacy and Security Enhanced RFID (Extended Abstract) / Jaap-Henk Hoepman ; Rieks Joosten
MoteAODV - An AODV Implementation for TinyOS 2.0 / Werner Backes ; Jared Cordasco
Security
Random Number Generation Based on Fingerprints / Shkodran Gerguri ; Václav Matyáš ; Zdenek Ríha ; Ludek Smolík
Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML / Sergio Sánchez García ; Ana Gómez Oliva
Fraud Detection for Voice over IP Services on Next-Generation Networks / Igor Ruiz-Agundez ; Yoseba K. Penya ; Pablo Garcia Bringas
Smart Card Security
Proxy Smart Card Systems / Giuseppe Cattaneo ; Pompeo Faruolo ; Vincenzo Palazzo ; Ivan Visconti
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? / Nicola Dragoni ; Olga Gadyatskaya ; Fabio Massacci
Website Credential Storage and Two-Factor Web Authentication with a Java SIM / Jonathan Hart ; Konstantinos Markantonakis ; Keith Mayes
Algorithms
Attribute-Based Encryption with Break-Glass / Achim D. Brucker ; Helmut Petritsch ; Stefan G. Weber
On the Security of a Two-Factor Authentication Scheme / Luigi Catuogno ; Clemente Galdi
The Design of Secure and Efficient P2PSIP Communication Systems / Xianghan Zheng ; Vladimir Oleshchuk
Hardware Implementations
Novel FPGA-Based Signature Matching for Deep Packet Inspection / Nitesh B. Guinde ; Sotirios G. Ziavras
Towards Electrical, Integrated Implementations of SIMPL Systems / Ulrich Rührmair ; Qingqing Chen ; Martin Stutzmann ; Paolo Lugli ; Ulf Schlichtmann ; György Csaba
A Very Compact Hardware Implementation of the KASUMI Block Cipher / Dai Yamamoto ; Kouichi Itoh ; Jun Yajima
Embedded Systems
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions / Ronald Kainda ; Ivan Flechais ; A.W. Roscoe
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions / Johannes Loinig ; Christian Steger ; Reinhold Weiss ; Ernst Haselsteiner
Security Analysis of Mobile Phones Used as OTP Generators / Håvard Raddum ; Lars Hopland Nestås ; Kjell Jørgen Hole
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks / Oscar Delgado-Mohatar ; José M. Sierra ; Ljiljana Brankovic ; Amparo Fúster-Sabater
Anonymity/Database Security
The Market Failure of Anonymity Services / Heiko Rossnagel
Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios / Giovanni Russello ; Enrico Scalavino
Predicting and Preventing Insider Threat in Relational Database Systems / Qussai Yaseen ; Brajendra Panda
Author Index
Embedded Security
Efficient and Effective Buffer Overflow Protection on ARM Processors / Raoul Strackx ; Yves Younan ; Pieter Philippaerts ; Frank Piessens
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines / Alexandre Venelli
2.

電子ブック

EB
David Hutchison, Takeo Kanade, Pierangela Samarati, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
3.

電子ブック

EB
Sushil Jajodia (ed), Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang
出版情報: SpringerLink Books - AutoHoldings , Springer New York, 2014
所蔵情報: loading…
4.

電子ブック

EB
Gilles. Markatos, Evangelos. Samarati, Pierangela. Barthe, Evangelos Markatos, Pierangela Samarati
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2016
所蔵情報: loading…
5.

電子ブック

EB
David; Kanade, Takeo; Kittler, Josef Hutchison, Audun Jøsang, Marinella Petrocchi, Pierangela Samarati
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2013
所蔵情報: loading…
6.

電子ブック

EB
Liu, Pierangela Samarati
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2017
所蔵情報: loading…
7.

電子ブック

EB
Pierangela Samarati, Takeo Kanade, Konstantinos Markantonakis, Joachim Posegga, Damien Sauveron, Michael Tunstall
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Embedded Security
Efficient and Effective Buffer Overflow Protection on ARM Processors / Raoul Strackx ; Yves Younan ; Pieter Philippaerts ; Frank Piessens
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines / Alexandre Venelli
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones / Tansu Alpcan ; Christian Bauckhage ; Aubrey-Derrick Schmidt
A Smart Card Implementation of the McEliece PKC / Falko Strenzke
Evaluation Metrics of Physical Non-invasive Security / Huiyun Li ; Keke Wu ; Fengqi Yu ; Hai Yuan
Protocols
Trust in Peer-to-Peer Content Distribution Protocols / Nicolai Kuntze ; Carsten Rudolph ; Andreas Fuchs
Generic Constructions of Biometric Identity Based Encryption Systems / Neyire Deniz Sarier
Design and Analysis of a Generalized Canvas Protocol / Marián Novotný
Highly Constrained Embedded Systems
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures / Michael Braun ; Ulrike Meyer ; Susanne Wetzel
Practical Schemes for Privacy and Security Enhanced RFID (Extended Abstract) / Jaap-Henk Hoepman ; Rieks Joosten
MoteAODV - An AODV Implementation for TinyOS 2.0 / Werner Backes ; Jared Cordasco
Security
Random Number Generation Based on Fingerprints / Shkodran Gerguri ; Václav Matyáš ; Zdenek Ríha ; Ludek Smolík
Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML / Sergio Sánchez García ; Ana Gómez Oliva
Fraud Detection for Voice over IP Services on Next-Generation Networks / Igor Ruiz-Agundez ; Yoseba K. Penya ; Pablo Garcia Bringas
Smart Card Security
Proxy Smart Card Systems / Giuseppe Cattaneo ; Pompeo Faruolo ; Vincenzo Palazzo ; Ivan Visconti
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? / Nicola Dragoni ; Olga Gadyatskaya ; Fabio Massacci
Website Credential Storage and Two-Factor Web Authentication with a Java SIM / Jonathan Hart ; Konstantinos Markantonakis ; Keith Mayes
Algorithms
Attribute-Based Encryption with Break-Glass / Achim D. Brucker ; Helmut Petritsch ; Stefan G. Weber
On the Security of a Two-Factor Authentication Scheme / Luigi Catuogno ; Clemente Galdi
The Design of Secure and Efficient P2PSIP Communication Systems / Xianghan Zheng ; Vladimir Oleshchuk
Hardware Implementations
Novel FPGA-Based Signature Matching for Deep Packet Inspection / Nitesh B. Guinde ; Sotirios G. Ziavras
Towards Electrical, Integrated Implementations of SIMPL Systems / Ulrich Rührmair ; Qingqing Chen ; Martin Stutzmann ; Paolo Lugli ; Ulf Schlichtmann ; György Csaba
A Very Compact Hardware Implementation of the KASUMI Block Cipher / Dai Yamamoto ; Kouichi Itoh ; Jun Yajima
Embedded Systems
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions / Ronald Kainda ; Ivan Flechais ; A.W. Roscoe
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions / Johannes Loinig ; Christian Steger ; Reinhold Weiss ; Ernst Haselsteiner
Security Analysis of Mobile Phones Used as OTP Generators / Håvard Raddum ; Lars Hopland Nestås ; Kjell Jørgen Hole
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks / Oscar Delgado-Mohatar ; José M. Sierra ; Ljiljana Brankovic ; Amparo Fúster-Sabater
Anonymity/Database Security
The Market Failure of Anonymity Services / Heiko Rossnagel
Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios / Giovanni Russello ; Enrico Scalavino
Predicting and Preventing Insider Threat in Relational Database Systems / Qussai Yaseen ; Brajendra Panda
Author Index
Embedded Security
Efficient and Effective Buffer Overflow Protection on ARM Processors / Raoul Strackx ; Yves Younan ; Pieter Philippaerts ; Frank Piessens
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines / Alexandre Venelli
8.

電子ブック

EB
Naccache, Ahmed Meddahi, Gregory Blanc, Pierangela Samarati, Rongxing Lu, Shouhuai Xu, Sihan Qing, Zonghua Zhang, Gregory Blanc, Rongxing Lu, Ahmed Meddahi, Sihan Qing, Pierangela Samarati, Shouhuai Xu, Zonghua Zhang
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2018
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼