Narrow your search

Library

VUB (10)

AP (8)

KDG (8)

KU Leuven (8)

Odisee (7)

Thomas More Kempen (7)

Thomas More Mechelen (7)

UCLL (7)

ULB (7)

ULiège (7)

More...

Resource type

book (18)

digital (8)


Language

English (23)


Year
From To Submit

2020 (6)

2017 (1)

2014 (2)

2012 (3)

2011 (3)

More...
Listing 1 - 10 of 23 << page
of 3
>>
Sort by

Book
Financial Cryptography and Data Security : 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers
Author:
ISBN: 3319709720 3319709712 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017. The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.


Digital
Topics in Cryptology – CT-RSA 2011 : The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings
Author:
ISBN: 9783642190742 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Book
Encryption for digital content
Authors: ---
ISBN: 1441900438 9786612980855 1282980858 1441900446 Year: 2010 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel  fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks.   It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.

Keywords

Combinatorial designs and configurations. --- Data encryption (Computer science). --- Digital media -- Security measures. --- Electronic books. -- local. --- Data encryption (Computer science) --- Digital media --- Combinatorial designs and configurations --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Security measures. --- Configurations and designs, Combinatorial --- Designs and configurations, Combinatorial --- Electronic media --- New media (Digital media) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Coding theory. --- Computer Science. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- Coding and Information Theory. --- Data Structures. --- Computer Communication Networks. --- Combinatorial analysis --- Mass media --- Digital communications --- Online journalism --- Computer security --- Cryptography --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Information theory. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication theory --- Communication --- Cybernetics --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing


Digital
E-Voting and Identity : Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers
Authors: ---
ISBN: 9783642327476 Year: 2012 Publisher: Berlin, Heidelberg Imprint: Springer


Digital
Encryption for Digital Content
Authors: ---
ISBN: 9781441900449 9781441900982 9781441900432 9781461427216 Year: 2010 Publisher: New York, NY Springer US

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.


Book
Topics in Cryptology - CT-RSA 2011 : The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings
Authors: ---
ISBN: 9783642190742 Year: 2011 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011. The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.


Book
Topics in cryptology - CT-RSA 2011 : the cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14-18, 2011 : proceedings
Authors: ---
ISSN: 03029743 ISBN: 3642190731 364219074X Year: 2011 Volume: 6558 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011. The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.

Keywords

Engineering & Applied Sciences --- Computer Science --- Data encryption (Computer science) --- Computer security --- Cryptography --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Discrete Mathematics in Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Foundations --- Protection --- Security measures --- Distributed processing --- Computational complexity. --- Computer software. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics.


Book
E-voting and identity : third international conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011 : revised selected papers
Authors: --- ---
ISBN: 364232746X 3642327478 Year: 2012 Volume: 7187 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, prêt à voter and trivitas, and experiences.

Keywords

Electronic voting --- Data encryption (Computer science) --- Computer software --- Government - General --- Engineering & Applied Sciences --- Law, Politics & Government --- Political Institutions & Public Administration - General --- Computer Science --- Verification --- E-voting --- eVoting --- Computer science. --- Computer communication systems. --- Special purpose computers. --- Computer security. --- Data encryption (Computer science). --- Application software. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Computer Appl. in Administrative Data Processing. --- Computers and Society. --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Voting --- Software engineering. --- Information systems. --- Cryptology. --- Computer software engineering --- Engineering


Book
Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings
Authors: --- ---
ISBN: 3319122797 3319122800 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Coding and Information Theory. --- Management of Computing and Information Systems. --- Information Systems. --- Cryptology. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Data encryption (Computer science) --- Information theory. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication theory --- Communication --- Cybernetics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing --- Computer networks.


Book
E-Voting and Identity : Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers
Authors: --- ---
ISBN: 9783642327476 Year: 2012 Publisher: Berlin Heidelberg Springer Berlin Heidelberg Imprint Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, prêt à voter and trivitas, and experiences.

Listing 1 - 10 of 23 << page
of 3
>>
Sort by