Narrow your search

Library

ULB (12)

AP (11)

KDG (11)

KU Leuven (10)

Odisee (10)

Thomas More Kempen (10)

Thomas More Mechelen (10)

UCLL (10)

ULiège (10)

VIVES (10)

More...

Resource type

book (22)

digital (11)


Language

English (30)

German (2)


Year
From To Submit

2017 (2)

2016 (2)

2013 (3)

2012 (8)

2009 (6)

More...
Listing 1 - 10 of 32 << page
of 4
>>
Sort by
Recent advances in RSA cryptography
Author:
ISBN: 079237438X Year: 2001 Volume: 3. Publisher: Boston : Kluwer Academic Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Number Theory and Cryptography : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
Authors: ---
ISBN: 3642420001 364242001X Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students, and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more application-oriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements.

Keywords

Computer science. --- Computer Communication Networks. --- Data encryption (Computer science). --- Computer software. --- Computational complexity. --- Information Systems. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- Discrete Mathematics in Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Engineering & Applied Sciences --- Computer Science --- Complexity, Computational --- Software, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Informatics --- Computer communication systems. --- Algorithms. --- Computer science --- Management information systems. --- Mathematics. --- Number theory. --- Data encryption (Computer science) --- Computer security --- Cryptography --- Number study --- Numbers, Theory of --- Algebra --- Cryptology. --- Electronic data processing --- Machine theory --- Computer systems --- Application software. --- Computer science—Mathematics. --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Algorism --- Arithmetic --- Communication systems --- Distributed processing --- Foundations --- Discrete mathematics. --- Computer networks. --- Cryptography. --- Electronic data processing—Management. --- Computer and Information Systems Applications. --- IT Operations. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis


Book
Trust and trustworthy computing : 5th international conference, TRUST 2012, Vienna, Austria, June 13-15, 2012 : proceedings
Authors: ---
ISSN: 03029743 ISBN: 3642309208 3642309216 Year: 2012 Volume: 7344 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer security --- Data encryption (Computer science) --- Computer networks --- Security measures --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Compilation for secure multi-party computation
Authors: ---
ISBN: 3319675222 3319675214 Year: 2017 Publisher: Cham : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents a holistic view on compiler assisted practical secure multi-party computation (MPC) over Boolean circuits. It discusses that two or more parties jointly evaluate a function over their inputs in such a way that each party keeps its input unknown to the other parties in MPC. MPC provides a generic way to construct Privacy-Enhancing Technologies, which protect sensitive data during processing steps in untrusted environments. A major obstacle in the past was to generate MPC applications by hand. Recently, special compilers have been developed to build all kinds of applications. This book also explains in detail how efficient MPC applications can be created automatically from ANSI-C, thus, bridging the areas of cryptography, compilation and hardware synthesis. It  also gives an insight into the requirements for creating efficient applications for MPC and is hence of interest to not only researchers in the area of MPC but also developers realizing practical applications with MPC. For a better understanding of the complete compile chain from ANSI-C to circuits, which is the ‘machine code’ of MPC, the authors first give the necessary background information on MPC protocols, Boolean logic, and logic synthesis. Then the authors describe the various compilation steps required to translate any code into an adequate circuit description. Afterwards, the authors introduce a variety of optimization techniques for two classes of MPC protocols, namely techniques that improve the runtime of applications in constant- and multi-round MPC protocols. The authors also illustrate  how efficient parallelization of MPC protocols can be achieved using the assistance of compilers. It presents  the effectiveness of the proposed techniques by giving a detailed evaluation on benchmarking applications. Most of the aforementioned techniques are implemented in our open source compiler that is accompanying this book and allows to study compilation for MPC in practice.Researchers who are interested in practical secure multi-party computation (MPC), and developers who are interested in realizing MPC applications in practice will find this book useful as a reference, as well as advanced-level students in computer science.


Digital
Number theory and cryptography : papers in honor of Johannes Buchmann on the occasion of his 60th birthday
Authors: ---
ISBN: 9783642420016 9783642420009 Year: 2013 Publisher: Berlin Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students, and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more application-oriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements.


Digital
Compilation for Secure Multi-party Computation
Authors: ---
ISBN: 9783319675220 Year: 2017 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents a holistic view on compiler assisted practical secure multi-party computation (MPC) over Boolean circuits. It discusses that two or more parties jointly evaluate a function over their inputs in such a way that each party keeps its input unknown to the other parties in MPC. MPC provides a generic way to construct Privacy-Enhancing Technologies, which protect sensitive data during processing steps in untrusted environments. A major obstacle in the past was to generate MPC applications by hand. Recently, special compilers have been developed to build all kinds of applications. This book also explains in detail how efficient MPC applications can be created automatically from ANSI-C, thus, bridging the areas of cryptography, compilation and hardware synthesis. It  also gives an insight into the requirements for creating efficient applications for MPC and is hence of interest to not only researchers in the area of MPC but also developers realizing practical applications with MPC. For a better understanding of the complete compile chain from ANSI-C to circuits, which is the ‘machine code’ of MPC, the authors first give the necessary background information on MPC protocols, Boolean logic, and logic synthesis. Then the authors describe the various compilation steps required to translate any code into an adequate circuit description. Afterwards, the authors introduce a variety of optimization techniques for two classes of MPC protocols, namely techniques that improve the runtime of applications in constant- and multi-round MPC protocols. The authors also illustrate  how efficient parallelization of MPC protocols can be achieved using the assistance of compilers. It presents  the effectiveness of the proposed techniques by giving a detailed evaluation on benchmarking applications. Most of the aforementioned techniques are implemented in our open source compiler that is accompanying this book and allows to study compilation for MPC in practice.Researchers who are interested in practical secure multi-party computation (MPC), and developers who are interested in realizing MPC applications in practice will find this book useful as a reference, as well as advanced-level students in computer science.


Book
Transactions on data hiding and multimedia security VIII : special issue on pattern recognition for IT security
Authors: ---
ISSN: 03029743 ISBN: 364231970X 3642319718 Year: 2012 Volume: 7228 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This special issue contains five selected papers that were presented at the Workshop on Pattern Recognition for IT Security, held in Darmstadt, Germany, in September 2010, in conjunction with the 32nd Annual Symposium of the German Association for Pattern Recognition, DAGM 2010. It demonstrates the broad range of security-related topics that utilize graphical data. The contributions explore the security and reliability of biometric data, the power of machine learning methods to differentiate forged images from originals, the effectiveness of modern watermark embedding schemes and the use of information fusion in steganalysis.

Keywords

Engineering & Applied Sciences --- Computer Science --- Optical pattern recognition --- Information technology --- Security measures --- IT (Information technology) --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Image processing. --- Pattern recognition. --- Biometrics (Biology). --- Computer Science. --- Systems and Data Security. --- Biometrics. --- Data Encryption. --- Coding and Information Theory. --- Pattern Recognition. --- Image Processing and Computer Vision. --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Statistical methods --- Protection --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Optical pattern recognition. --- Computer vision. --- Cryptology. --- Pattern perception --- Perceptrons --- Visual discrimination --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Information theory. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Communication theory --- Communication --- Cybernetics --- Optical equipment


Book
ICT Systems Security and Privacy Protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings
Authors: ---
ISBN: 3319336290 3319336304 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2016, held in Ghent, Belgium, in May/June 2016. The 27 revised full papers presented were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on cryptographic protocols, human aspects of security, cyber infrastructure, social networks, software vulnerabilities, TPM and internet of things, sidechannel analysis, software security, and privacy.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computers and Society. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Civilization and computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Civilization --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Distributed processing --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Digital
Information Hiding : 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers
Authors: ---
ISBN: 9783642044311 Year: 2009 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Digital
Transactions on Data Hiding and Multimedia Security VIII : Special Issue on Pattern Recognition for IT Security
Authors: ---
ISBN: 9783642319716 Year: 2012 Publisher: Berlin, Heidelberg Imprint: Springer

Listing 1 - 10 of 32 << page
of 4
>>
Sort by