Narrow your search
Listing 1 - 10 of 14 << page
of 2
>>
Sort by

Book
Provable Security : 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings
Authors: ---
ISBN: 3319260588 3319260596 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption.


Digital
Provable Security : 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings
Authors: ---
ISBN: 9783319260594 9783319260587 9783319260600 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption.


Book
Mobile security and privacy
Authors: ---
ISBN: 0128047461 0128046295 9780128047460 9780128046296 Year: 2016 Publisher: Cambridge, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges. Presents the most current and leading edge research on mobile security and privacy, featuring a panel of top experts in the field Provides a strategic and international overview of the security issues surrounding mobile technologies Covers key technical topics and provides readers with a complete understanding of the most current research findings along with future research directions and challenges Enables practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding the implementation of mobile technology security and privacy initiatives


Book
Provable and Practical Security : 17th International Conference, ProvSec 2023, Wuhan, China, October 20–22, 2023, Proceedings
Authors: --- ---
ISBN: 3031455126 3031455134 Year: 2023 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.


Digital
Mobile security and privacy : advances, challenges and future research directions
Authors: ---
ISBN: 9780128047460 0128047461 Year: 2016 Publisher: Cambridge, MA Syngress is an imprint of Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Annotation

Keywords


Book
Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings
Authors: --- --- ---
ISBN: 3319686372 3319686364 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.  .

Keywords

Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Application software. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computers and Society. --- Computer Appl. in Administrative Data Processing. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Civilization and computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Algorism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Sociotechnical systems --- Information resources management --- Management --- Civilization --- Computer software --- Algebra --- Arithmetic --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Communication systems --- Foundations --- Information systems. --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Data encryption (Computer science)


Book
Network and System Security : 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings
Authors: --- ---
ISBN: 3319116975 3319116983 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014. The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- e-Commerce/e-business. --- Information Systems. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer networks --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing


Book
Provable and Practical Security
Authors: --- --- ---
ISBN: 9783031455131 Year: 2023 Publisher: Cham Springer Nature Switzerland :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.


Digital
Network and System Security : 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings
Authors: --- ---
ISBN: 9783319116983 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014. The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution.


Book
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop
Authors: --- --- ---
Year: 2021 Publisher: New York NY : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is our great pleasure to welcome you to CPSS 2021, the seventh ACM Cyber-Physical System Security Workshop, co-located with ACM AsiaCCS 2021. Due to the COVID-19 pandemic, the workshop will be held online, on 7 June 2021. The call for papers attracted 16 submissions with authors from 10 countries: China, Germany, India, Italy, Netherlands, Singapore, Sweden, Switzerland, United Kingdom, and the United States. Submissions were evaluated based on their significance, novelty, technical quality and relevance for the field. The review process was single-blinded. The program committee members have put in a significant effort in paper evaluation, and most of the papers received three reviews. Finally, we accepted six papers for presentation at the workshop, with an acceptance rate of 37.5%.

Keywords

Cyberbullying.

Listing 1 - 10 of 14 << page
of 2
>>
Sort by