Narrow your search

Library

AP (2)

EhB (2)

KDG (2)

KU Leuven (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

ULiège (2)

More...

Resource type

book (4)

digital (2)


Language

English (6)


Year
From To Submit

2010 (3)

2009 (3)

Listing 1 - 6 of 6
Sort by

Digital
Cryptology and Network Security : 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings
Authors: --- ---
ISBN: 9783642104336 Year: 2009 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg


Digital
Pairing-Based Cryptography - Pairing 2010 : 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings
Authors: --- ---
ISBN: 9783642174551 9783642174544 9783642174568 Year: 2010 Publisher: Berlin, Heidelberg Springer


Book
Pairing-Based Cryptography - Pairing 2010
Authors: --- --- ---
ISBN: 9783642174551 9783642174544 9783642174568 Year: 2010 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

The4thInternationalConferenceonPairing-BasedCryptography(Pairing2010) was held in Yamanaka Hot Spring, Japan, during December 13-15, 2010. It was jointly co-organized by the National Institute of Advanced Industrial Science and Technology (AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). The goal of Pairing 2010 was to bring together leading researchersand pr- titioners from academia and industry, all concerned with problems related to pairing-based cryptography. We hope that this conference enhanced com- nication among specialists from various research areas and promoted creative interdisciplinary collaboration. Theconferencereceived64submissionsfrom17countries,outofwhich25- pers from 13 countries were accepted for publication in these proceedings. At least three Program Committee (PC) members reviewed each submitted paper, while submissions co-authored by a PC member were submitted to the more stringent evaluation of ?ve PC members. In addition to the PC members, many externalreviewersjoinedthereviewprocessintheirparticularareasofexpertise. We were fortunate to have this energetic team of experts, and are deeply gra- ful to all of them for their hard work, which included a very active discussion phase. The paper submission, review and discussion processes were e?ectively and e?ciently made possible by the Web-based system iChair. Furthermore,theconferencefeaturedthreeinvitedspeakers:JensGrothfrom University College London, Joseph H. Silverman from Brown University, and Gene Tsudik from University of California at Irvine, whose lectures on cutti- edge research areas Pairing-Based Non-interactive Zero-Knowledge Proofs,  A Survey of Local and Global Pairings on Elliptic Curves and Abelian Va- eties,  and Some Security Topics with Possible Applications for Pairing-Based Cryptography,  respectively contributed in a signi?cant part to the richness of the program.


Book
Cryptology and Network Security
Authors: --- --- ---
ISBN: 9783642104336 Year: 2009 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009. The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on cryptographic protocols and schemes; cryptanalysis; wireless and sensor security; network security; privacy and anonymity; functional and searchable encryption; authentication; block cipher design; and algebraic and number-theoretic schemes.


Book
Pairing-Based Cryptography--Pairing 2010 : 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. proceedings
Authors: --- --- ---
ISBN: 364217454X 9786613568489 3642174558 1280390565 Year: 2010 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Cryptography --- Computer security --- Sets of pairs of functions to be distinguished --- Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Discrete Mathematics in Computer Science. --- Coding and Information Theory. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Systems and Data Security. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Foundations --- Protection --- Security measures --- Distributed processing --- Computational complexity. --- Computer software. --- Cryptology. --- Software, Computer --- Complexity, Computational --- Computer science—Mathematics. --- Information theory. --- Communication theory --- Communication --- Cybernetics


Book
Cryptology and network security : 8th international conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. proceedings
Authors: --- --- ---
ISBN: 3642104320 3642104339 Year: 2009 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009. The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on cryptographic protocols and schemes; cryptanalysis; wireless and sensor security; network security; privacy and anonymity; functional and searchable encryption; authentication; block cipher design; and algebraic and number-theoretic schemes.

Keywords

Computer networks --- Cryptography --- Computer Science --- Engineering & Applied Sciences --- Security measures --- Computer security --- Data encryption (Computer science) --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Coding theory. --- Mathematical logic. --- Computer science --- Number theory. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Number Theory. --- Coding and Information Theory. --- Mathematical Logic and Formal Languages. --- Mathematics of Computing. --- Mathematics. --- Number study --- Numbers, Theory of --- Algebra --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Distributed processing --- Cryptology. --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics

Listing 1 - 6 of 6
Sort by