Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Mathematical logic --- Number theory --- Ergodic theory. Information theory --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- cryptologie --- informatica --- wiskunde --- computerbeveiliging --- logica --- getallenleer --- informatietheorie
Choose an application
Ergodic theory. Information theory --- Complex analysis --- Mathematical control systems --- Discrete mathematics --- Mathematics --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- cryptografie --- discrete wiskunde --- complexe analyse (wiskunde) --- informatica --- externe fixatie (geneeskunde --- algoritmen --- computerbeveiliging --- computernetwerken --- informatietheorie
Choose an application
The4thInternationalConferenceonPairing-BasedCryptography(Pairing2010) was held in Yamanaka Hot Spring, Japan, during December 13-15, 2010. It was jointly co-organized by the National Institute of Advanced Industrial Science and Technology (AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). The goal of Pairing 2010 was to bring together leading researchersand pr- titioners from academia and industry, all concerned with problems related to pairing-based cryptography. We hope that this conference enhanced com- nication among specialists from various research areas and promoted creative interdisciplinary collaboration. Theconferencereceived64submissionsfrom17countries,outofwhich25- pers from 13 countries were accepted for publication in these proceedings. At least three Program Committee (PC) members reviewed each submitted paper, while submissions co-authored by a PC member were submitted to the more stringent evaluation of ?ve PC members. In addition to the PC members, many externalreviewersjoinedthereviewprocessintheirparticularareasofexpertise. We were fortunate to have this energetic team of experts, and are deeply gra- ful to all of them for their hard work, which included a very active discussion phase. The paper submission, review and discussion processes were e?ectively and e?ciently made possible by the Web-based system iChair. Furthermore,theconferencefeaturedthreeinvitedspeakers:JensGrothfrom University College London, Joseph H. Silverman from Brown University, and Gene Tsudik from University of California at Irvine, whose lectures on cutti- edge research areas Pairing-Based Non-interactive Zero-Knowledge Proofs, A Survey of Local and Global Pairings on Elliptic Curves and Abelian Va- eties, and Some Security Topics with Possible Applications for Pairing-Based Cryptography, respectively contributed in a signi?cant part to the richness of the program.
Ergodic theory. Information theory --- Complex analysis --- Mathematical control systems --- Discrete mathematics --- Mathematics --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- cryptografie --- discrete wiskunde --- complexe analyse (wiskunde) --- informatica --- externe fixatie (geneeskunde --- algoritmen --- computerbeveiliging --- computernetwerken --- informatietheorie
Choose an application
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009. The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on cryptographic protocols and schemes; cryptanalysis; wireless and sensor security; network security; privacy and anonymity; functional and searchable encryption; authentication; block cipher design; and algebraic and number-theoretic schemes.
Mathematical logic --- Number theory --- Ergodic theory. Information theory --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- cryptologie --- informatica --- wiskunde --- computerbeveiliging --- logica --- getallenleer --- informatietheorie
Choose an application
Cryptography --- Computer security --- Sets of pairs of functions to be distinguished --- Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Discrete Mathematics in Computer Science. --- Coding and Information Theory. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Systems and Data Security. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Foundations --- Protection --- Security measures --- Distributed processing --- Computational complexity. --- Computer software. --- Cryptology. --- Software, Computer --- Complexity, Computational --- Computer science—Mathematics. --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009. The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on cryptographic protocols and schemes; cryptanalysis; wireless and sensor security; network security; privacy and anonymity; functional and searchable encryption; authentication; block cipher design; and algebraic and number-theoretic schemes.
Computer networks --- Cryptography --- Computer Science --- Engineering & Applied Sciences --- Security measures --- Computer security --- Data encryption (Computer science) --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Coding theory. --- Mathematical logic. --- Computer science --- Number theory. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Number Theory. --- Coding and Information Theory. --- Mathematical Logic and Formal Languages. --- Mathematics of Computing. --- Mathematics. --- Number study --- Numbers, Theory of --- Algebra --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Distributed processing --- Cryptology. --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics
Listing 1 - 6 of 6 |
Sort by
|