Listing 1 - 10 of 18 | << page >> |
Sort by
|
Choose an application
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
ASIACRYPT 2006 was held in Shanghai, China, during December 3-7, 2006. This was the 12th annual ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with theStateKeyLabsofInformationSecurity,ChineseAcademyofSciences(LOIS), Lab for Cryptography and Information Security, Shanghai Jiaotong University (CIS/SJTU) and Natural Science Foundation of China (NSFC). This year we received a record number of 314 submissions, of which 303 re- lar submissions were reviewed by 32 members of the Program Committee, with thehelp of250externalreferees.After a two-monthreviewprocess,the Program Committee selected 30 papers for presentation. This volume of proceedings c- tains the revisedversionof the 30 selected papers. The IACR 2006 distinguished lecture by Ivan Damgaard was also in the program. The paper Finding SHA-1 Characteristics by Christophe De Canni´ ere and Christian Rechberger received the best paper award. Thereviewingprocesswasachallengingtask,andwehadto rejectmanygood submissions that could have been accepted under normal circumstances. I am verygratefultoProgramCommitteefortheire?ortstocarryoutthischallenging task and to keep the high standard of ASIACRYPT conferences. We gratefully acknowledge our 250 external referees; without their help it would be infeasible to provide1008high-quality,oftenextensive,reviews.Moreimportantly,Iwould like to thank all the authors who submitted their work to ASIACRYPT 2006. This year submissions were processed using Web-based software iChair, and would like to thank Thomas Baigneres, Matthieu Finiasz and Serge Vaudenay for providing this valuable tool. I am grateful to Ruimin Shen for his generous and indispensable support and I would like to thank Changzhe Gao, Haining Lu and Jingjing Wu for the smooth operation of our Web-sites.
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- cryptologie --- complexe analyse (wiskunde) --- informatica --- maatschappij --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- wiskunde --- software engineering --- computerbeveiliging
Choose an application
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.
Engineering & Applied Sciences --- Computer Science --- Computer security --- Computers --- Access control --- Computer science. --- Special purpose computers. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Math Applications in Computer Science. --- Special Purpose and Application-Based Systems. --- Information Systems Applications (incl. Internet). --- Mathematics. --- Computer software. --- Software engineering. --- Cryptology. --- Computer software engineering --- Engineering --- Informatics --- Science --- Software, Computer --- Computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer science—Mathematics. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Special purpose computers --- Algorism --- Algebra --- Arithmetic --- Foundations
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010. The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.
Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Computer security --- Cryptography --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Systems and Data Security. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer networks. --- Cryptography. --- Electronic data processing—Management. --- Data protection. --- IT Operations. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010. The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- cryptologie --- complexe analyse (wiskunde) --- informatica --- maatschappij --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- wiskunde --- software engineering --- computerbeveiliging
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- IR (information retrieval) --- DES (data encryption standard) --- informatica --- maatschappij --- informatica management --- OS (operating system) --- computernetwerken
Choose an application
Mathematical statistics --- Computer architecture. Operating systems --- Computer. Automation --- patroonherkenning --- factoranalyse --- informatica --- maatschappij --- multimedia --- informatica management --- OS (operating system) --- computercriminaliteit --- computernetwerken
Listing 1 - 10 of 18 | << page >> |
Sort by
|