Listing 1 - 6 of 6 |
Sort by
|
Choose an application
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Complex analysis --- Discrete mathematics --- Mathematics --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- toegepaste wiskunde --- complexiteit --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- bedrijfssoftware --- wachtwoorden (informatica) --- computers --- informatica --- informatiesystemen --- wiskunde --- computerbeveiliging --- informatica management --- computerkunde
Choose an application
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Complex analysis --- Discrete mathematics --- Mathematics --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- toegepaste wiskunde --- complexiteit --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- bedrijfssoftware --- wachtwoorden (informatica) --- computers --- informatica --- informatiesystemen --- wiskunde --- computerbeveiliging --- informatica management --- computerkunde
Choose an application
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Ergodic theory. Information theory --- Mathematical control systems --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- applicatiebeheer --- apps --- informatica --- computerbeveiliging --- OS (operating system) --- architectuur (informatica) --- informatietheorie
Choose an application
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- cryptografie --- applicatiebeheer --- apps --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- mobiele communicatie
Choose an application
Applied marketing --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- e-business --- informatica --- maatschappij --- e-commerce --- informatica management --- computernetwerken
Choose an application
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance.
Applied marketing --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- MIS (management informatie systeem) --- cryptografie --- e-business --- computers --- informatica --- maatschappij --- e-commerce --- informatica management --- computernetwerken --- computerkunde
Listing 1 - 6 of 6 |
Sort by
|