Narrow your search

Library

VUB (7)

AP (6)

EhB (6)

KDG (6)

KU Leuven (5)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

ULB (5)

More...

Resource type

book (12)

digital (6)


Language

English (18)


Year
From To Submit

2019 (2)

2011 (9)

2008 (2)

2006 (5)

Listing 1 - 10 of 18 << page
of 2
>>
Sort by

Digital
Advances in Cryptology -- ASIACRYPT 2006 : 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings
Authors: ---
ISBN: 9783540494768 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Book
Advances in Cryptology - ASIACRYPT 2006 : 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings
Authors: --- ---
ISBN: 9783540494768 Year: 2006 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

ASIACRYPT 2006 was held in Shanghai, China, during December 3-7, 2006. This was the 12th annual ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with theStateKeyLabsofInformationSecurity,ChineseAcademyofSciences(LOIS), Lab for Cryptography and Information Security, Shanghai Jiaotong University (CIS/SJTU) and Natural Science Foundation of China (NSFC). This year we received a record number of 314 submissions, of which 303 re- lar submissions were reviewed by 32 members of the Program Committee, with thehelp of250externalreferees.After a two-monthreviewprocess,the Program Committee selected 30 papers for presentation. This volume of proceedings c- tains the revisedversionof the 30 selected papers. The IACR 2006 distinguished lecture by Ivan Damgaard was also in the program. The paper Finding SHA-1 Characteristics  by Christophe De Canni´ ere and Christian Rechberger received the best paper award. Thereviewingprocesswasachallengingtask,andwehadto rejectmanygood submissions that could have been accepted under normal circumstances. I am verygratefultoProgramCommitteefortheire?ortstocarryoutthischallenging task and to keep the high standard of ASIACRYPT conferences. We gratefully acknowledge our 250 external referees; without their help it would be infeasible to provide1008high-quality,oftenextensive,reviews.Moreimportantly,Iwould like to thank all the authors who submitted their work to ASIACRYPT 2006. This year submissions were processed using Web-based software iChair, and would like to thank Thomas Baigneres, Matthieu Finiasz and Serge Vaudenay for providing this valuable tool. I am grateful to Ruimin Shen for his generous and indispensable support and I would like to thank Changzhe Gao, Haining Lu and Jingjing Wu for the smooth operation of our Web-sites.


Digital
Information Security and Cryptology : 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers
Authors: --- ---
ISBN: 9783642215186 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Digital
Information Security : 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings
Authors: --- ---
ISBN: 9783642248610 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Book
Information security : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011 : proceedings
Authors: --- --- ---
ISBN: 3642248608 3642248616 Year: 2011 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.


Book
Information security and cryptology : 6th international conference, Inscrypt 2010 Shanghai, China, October 20-24, 2010: revised selected papers
Authors: --- --- ---
ISBN: 3642215173 3642215181 Year: 2011 Publisher: Berlin ; Heidelberg : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010. The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.

Keywords

Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Computer security --- Cryptography --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Systems and Data Security. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer networks. --- Cryptography. --- Electronic data processing—Management. --- Data protection. --- IT Operations. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)


Book
Information Security and Cryptology : 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers
Authors: --- --- ---
ISBN: 9783642215186 Year: 2011 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010. The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.


Book
Information Security : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings
Authors: --- --- ---
ISBN: 9783642248610 Year: 2011 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.


Digital
Information Security Practice and Experience (vol. # 3903) : Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings
Authors: --- --- ---
ISBN: 9783540330585 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Digital
Forensics in Telecommunications, Information, and Multimedia : Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers
Authors: --- --- --- ---
ISBN: 9783642236020 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Listing 1 - 10 of 18 << page
of 2
>>
Sort by