Listing 1 - 5 of 5 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the Second International Conference on Security Standardisation Research, SSR 2015, held in Tokyo, Japan, in December 2015. The 13 papers presented in this volume were carefully reviewed and selected from 18 submissions. They are organized in topical sections named: bitcoin and payment; protocol and API; analysis on cryptographic algorithm; privacy; and trust and formal analysis. .
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Communication Networks. --- Software Engineering. --- Data Structures. --- Math Applications in Computer Science. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Protection --- Security measures --- Distributed processing --- Data structures (Computer scienc. --- Cryptology. --- Data structures (Computer science) --- Standards --- Computer science—Mathematics.
Choose an application
Blockchains (Databases) --- Bitcoin. --- Database security. --- Data base security --- Databases --- Computer security --- Cryptocurrencies --- Block chains (Databases) --- Database security --- Distributed databases --- Security measures
Choose an application
This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February 2020. The 39 full papers and 3 short papers presented in this book were carefully reviewed and selected from 73 submissions. The papers feature four Workshops: The 1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020. The AsiaUSEC Workshop contributes an increase of the scientific quality of research in human factors in security and privacy. In terms of improving efficacy of secure systems, the research included an extension of graphical password authentication. Further a comparative study of SpotBugs, SonarQube, Cryptoguard and CogniCrypt identified strengths in each and refined the need for improvements in security testing tools. The CoDeFi Workshop discuss multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain. The workshop consists of two parts; presentations by all stakeholders, and unconference style discussions. The VOTING Workshop cover topics like new methods for risk-limited audits, new ethods to increase the efficiency of mixnets, verification of security of voting schemes election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems, and new way of preventing voteselling by de-incentivising this via smart contracts. The WTSC Workshop focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of specialized blockchains.
Data encryption (Computer science). --- Computer organization. --- Data structures (Computer science). --- Computer security. --- Cryptology. --- Computer Systems Organization and Communication Networks. --- Data Structures and Information Theory. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Organization, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Data encryption (Computer science)
Choose an application
This book constitutes the proceedings of the workshops that have been held in conjunction with the 28th International Conference on Financial Cryptography, FC 2024, which took place in Willemstad, Curaçao, during March 4-8, 2024. The total of 23 papers included in this book stem from the following workshops: 9th Workshop on Advances in Secure Electronic Voting Schemes (Voting 2024), focusing on secure voting protocols, has accepted 5 papers out of 13 submissions; 4th Workshop on Decentralized Finance (DeFI 2024), focusing on decentralized finance and a blockchain powered peer-to-peer financial system, has received 32 submissions and accepted 4 papers for inclusion in this book 8th Workshop on Trusted Smart Contracts (WTSC 2024), dealing with smart contracts and other decentralised applications, accepted 5 papers from 11 submissions; and the 5th Workshop on Coordination of Decentralized Finance (CoDecFin 2024), discussing multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain, has accepted 8 full and 1 short paper from 15 submissions.
Cryptography. --- Data encryption (Computer science). --- Application software. --- Computer networks. --- Operating systems (Computers). --- Data protection. --- Cryptology. --- Computer and Information Systems Applications. --- Computer Communication Networks. --- Operating Systems. --- Data and Information Security. --- Data encryption (Computer science) --- Operating systems (Computers)
Choose an application
This book constitutes revised selected papers from the workshops that were affiliated with the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. FC 2022 presents the following four workshops: CoDecFin 2022: 3rd Workshop on Coordination of Decentralized Finance DeFi 2022: 2nd Workshop on Decentralized Finance Voting 2022: 7th Workshop on Advances in Secure Electronic Voting WTSC 2022: 6th Workshop on Trusted Smart Contracts.
Cryptography. --- Data encryption (Computer science). --- Cryptology. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography
Listing 1 - 5 of 5 |
Sort by
|