Narrow your search

Library

KU Leuven (7)

Odisee (7)

Thomas More Kempen (7)

Thomas More Mechelen (7)

UCLL (7)

ULB (7)

ULiège (7)

VIVES (7)

KBC (1)

UGent (1)


Resource type

book (7)


Language

English (7)


Year
From To Submit

2020 (2)

2017 (1)

2014 (1)

2012 (1)

2011 (1)

More...
Listing 1 - 7 of 7
Sort by

Book
Financial Cryptography and Data Security : 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers
Author:
ISBN: 3319709720 3319709712 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017. The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.


Book
Encryption for digital content
Authors: ---
ISBN: 1441900438 9786612980855 1282980858 1441900446 Year: 2010 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel  fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks.   It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.

Keywords

Combinatorial designs and configurations. --- Data encryption (Computer science). --- Digital media -- Security measures. --- Electronic books. -- local. --- Data encryption (Computer science) --- Digital media --- Combinatorial designs and configurations --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Security measures. --- Configurations and designs, Combinatorial --- Designs and configurations, Combinatorial --- Electronic media --- New media (Digital media) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Coding theory. --- Computer Science. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- Coding and Information Theory. --- Data Structures. --- Computer Communication Networks. --- Combinatorial analysis --- Mass media --- Digital communications --- Online journalism --- Computer security --- Cryptography --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Information theory. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication theory --- Communication --- Cybernetics --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing


Book
Topics in cryptology - CT-RSA 2011 : the cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14-18, 2011 : proceedings
Authors: ---
ISSN: 03029743 ISBN: 3642190731 364219074X Year: 2011 Volume: 6558 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011. The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.

Keywords

Engineering & Applied Sciences --- Computer Science --- Data encryption (Computer science) --- Computer security --- Cryptography --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Discrete Mathematics in Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Foundations --- Protection --- Security measures --- Distributed processing --- Computational complexity. --- Computer software. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics.


Book
E-voting and identity : third international conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011 : revised selected papers
Authors: --- ---
ISBN: 364232746X 3642327478 Year: 2012 Volume: 7187 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, prêt à voter and trivitas, and experiences.

Keywords

Electronic voting --- Data encryption (Computer science) --- Computer software --- Government - General --- Engineering & Applied Sciences --- Law, Politics & Government --- Political Institutions & Public Administration - General --- Computer Science --- Verification --- E-voting --- eVoting --- Computer science. --- Computer communication systems. --- Special purpose computers. --- Computer security. --- Data encryption (Computer science). --- Application software. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Computer Appl. in Administrative Data Processing. --- Computers and Society. --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Voting --- Software engineering. --- Information systems. --- Cryptology. --- Computer software engineering --- Engineering


Book
Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings
Authors: --- ---
ISBN: 3319122797 3319122800 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Coding and Information Theory. --- Management of Computing and Information Systems. --- Information Systems. --- Cryptology. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Data encryption (Computer science) --- Information theory. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication theory --- Communication --- Cybernetics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing --- Computer networks.


Book
Public-Key Cryptography – PKC 2020 : 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I
Authors: --- --- ---
ISBN: 303045374X 3030453731 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.

Keywords

Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Data encryption (Computer science). --- Computer networks --- Computer communication systems. --- Coding theory. --- Information theory. --- Computers. --- Cryptology. --- Security Services. --- Mobile and Network Security. --- Computer Communication Networks. --- Coding and Information Theory. --- Computing Milieux. --- Security measures. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication theory --- Communication --- Distributed processing


Book
Public-Key Cryptography – PKC 2020 : 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II
Authors: --- --- ---
ISBN: 303045388X 3030453871 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.

Keywords

Public key cryptography --- Computer security. --- Computer organization. --- Computer networks --- Computers. --- Computer communication systems. --- Computer Systems Organization and Communication Networks. --- Security Services. --- Mobile and Network Security. --- Computing Milieux. --- Computer Communication Networks. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures. --- Protection --- Security measures --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Organization, Computer --- Distributed processing

Listing 1 - 7 of 7
Sort by