Listing 1 - 10 of 23 | << page >> |
Sort by
|
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017. The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.
Computer science. --- Software engineering. --- Data encryption (Computer science). --- Computers. --- Computers and civilization. --- Law and legislation. --- Computer Science. --- Data Encryption. --- Legal Aspects of Computing. --- Computers and Society. --- Software Engineering/Programming and Operating Systems. --- Information Systems and Communication Service. --- Civilization and computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer software engineering --- Informatics --- Civilization --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer security --- Cryptography --- Engineering --- Science --- Computers --- Information systems. --- Cryptology. --- Law and legislation --- Electronic funds transfers --- Security measures.
Choose an application
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- computernetwerken
Choose an application
Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.
Combinatorial designs and configurations. --- Data encryption (Computer science). --- Digital media -- Security measures. --- Electronic books. -- local. --- Data encryption (Computer science) --- Digital media --- Combinatorial designs and configurations --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Security measures. --- Configurations and designs, Combinatorial --- Designs and configurations, Combinatorial --- Electronic media --- New media (Digital media) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Coding theory. --- Computer Science. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- Coding and Information Theory. --- Data Structures. --- Computer Communication Networks. --- Combinatorial analysis --- Mass media --- Digital communications --- Online journalism --- Computer security --- Cryptography --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Information theory. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication theory --- Communication --- Cybernetics --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing
Choose an application
Office management --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- informatica --- maatschappij --- bedrijfsadministratie --- software engineering --- computerbeveiliging --- computernetwerken
Choose an application
Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.
Ergodic theory. Information theory --- Mathematical control systems --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- coderen --- cryptografie --- informatica --- database management --- informatietechnologie --- programmatielogica --- computerbeveiliging --- computernetwerken --- informatietheorie
Choose an application
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011. The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011. The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.
Engineering & Applied Sciences --- Computer Science --- Data encryption (Computer science) --- Computer security --- Cryptography --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Discrete Mathematics in Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Foundations --- Protection --- Security measures --- Distributed processing --- Computational complexity. --- Computer software. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics.
Choose an application
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, prêt à voter and trivitas, and experiences.
Electronic voting --- Data encryption (Computer science) --- Computer software --- Government - General --- Engineering & Applied Sciences --- Law, Politics & Government --- Political Institutions & Public Administration - General --- Computer Science --- Verification --- E-voting --- eVoting --- Computer science. --- Computer communication systems. --- Special purpose computers. --- Computer security. --- Data encryption (Computer science). --- Application software. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Computer Appl. in Administrative Data Processing. --- Computers and Society. --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Voting --- Software engineering. --- Information systems. --- Cryptology. --- Computer software engineering --- Engineering
Choose an application
This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.
Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Coding and Information Theory. --- Management of Computing and Information Systems. --- Information Systems. --- Cryptology. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Data encryption (Computer science) --- Information theory. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication theory --- Communication --- Cybernetics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing --- Computer networks.
Choose an application
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, prêt à voter and trivitas, and experiences.
Office management --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- informatica --- maatschappij --- bedrijfsadministratie --- software engineering --- computerbeveiliging --- computernetwerken
Listing 1 - 10 of 23 | << page >> |
Sort by
|