Plus d’un million de livres à portée de main !
Bookbot

Jan Camenisch

    Privacy and identity management for life
    Future challenges in security and privacy for academia and industry
    Public key infrastructures, services and applications
    Open problems in network security
    Cryptology and Network Security
    Privacy and Identity Management for the Future Internet in the Age of Globalisation
    • Privacy and Identity Management for the Future Internet in the Age of Globalisation

      9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers

      • 277pages
      • 10 heures de lecture

      This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Patras, Greece, in September 2014. The 9 revised full papers and 3 workshop papers included in this volume were carefully selected from a total of 29 submissions and were subject to a two-step review process. In addition, the volume contains 5 invited keynote papers. The regular papers are organized in topical sections on legal privacy aspects and technical concepts, privacy by design and privacy patterns and privacy technologies and protocols.

      Privacy and Identity Management for the Future Internet in the Age of Globalisation
    • Cryptology and Network Security

      17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings

      • 531pages
      • 19 heures de lecture

      This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018. The 26 full papers were carefully reviewed and selected from 79 submissions. The papers are organized in the following topical sections: privacy; Internet misbehavior and protection; malware; symmetric key cryptography; signatures; cryptanalysis; cryptographic primitives; and cryptographic protocols.

      Cryptology and Network Security
    • Open problems in network security

      • 172pages
      • 7 heures de lecture

      This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, in June 2011, co-located and under the auspices of IFIP SEC 2011, the 26th IFIP TC-11 International Information Security Conference. The 12 revised full papers were carefully reviewed and selected from 28 initial submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on assisting users, malware detection, saving energy, policies, and problems in the cloud.

      Open problems in network security
    • This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.

      Public key infrastructures, services and applications
    • This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network security and security protocols, software security, policy compliance and obligations, privacy attacks and privacy-enhancing technologies, risk analysis and security metrics, and intrusion detection.

      Future challenges in security and privacy for academia and industry
    • At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.

      Privacy and identity management for life
    • This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds.

      Open research problems in network security
    • This book documents the R& D outcome of the PRIME Project, an R& D project partially funded by the European Union’s Sixth Framework Programme and the Swiss Federal Office for Education and Science. PRIME has focused on privacy-enhancing identity management techniques and systems to support users’ sovereignty over their personal privacy and enterprises’ privacy-compliant data processing. During the course of four years, the project has involved over a hundred researchers and professionals from 22 major European academic and industrial organizations conducting R& D work in areas relevant to digital privacy. The book presents 28 detailed chapters organized in five parts: Introductory summary, legal, social, and economic aspects, realization of privacy-enhancing user-centric identity management, exploitation of PRIME results for applications, conclusions drawn and an outlook on future work. As the first coherent presentation of the topic, this book will serve as a valuable source of reference and inspiration for anybody working on digital privacy.

      Digital privacy
    • Information hiding

      • 387pages
      • 14 heures de lecture

      Inhaltsverzeichnis Hamiltonian Mechanics. Natural Watermarking: A Secure Spread Spectrum Technique for WOA. An Improved Asymmetric Watermarking System Using Matrix Embedding. A Cryptographic Method for Secure Watermark Detection. Steganographic Communication in Ordered Channels. Analyzing Network-Aware Active Wardens in IPv6. Video Watermarking Using Geometric Warping Without Visible Artifacts. Time-Scale Invariant Audio Watermarking Based on Statistical Features in Time Domain. Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. Noisy Timing Channels with Binary Inputs and Outputs. A Computational Model for Watermark Robustness. Hiding Information Hiding. Reversible Watermarking of NURBS-Based CAD Models. A High-Capacity Data Hiding Method for Polygonal Meshes. Steganography for Radio Amateurs—A DSSS Based Approach for Slow Scan Television. Delayed and Controlled Failures in Tamper-Resistant Software. A Model for Self-Modifying Code. A Markov Process Based Approach to Effective Attacking JPEG Steganography. Batch Steganography and Pooled Steganalysis. On Steganographic Embedding Efficiency. Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. Modified Matrix Encoding Technique for Minimal Distortion Steganography. Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. A Collusion-Resistant Video Watermarking Scheme. An El

      Information hiding