Listing 1 - 10 of 27 | << page >> |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016. The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Protection --- Security measures --- Distributed processing --- Computer software. --- Cryptology. --- Software, Computer --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Computer science. --- Data encryption (Computer science) --- Data protection. --- Computer software. --- Computational complexity. --- Information Systems. --- Mathematics. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Discrete Mathematics in Computer Science. --- Systems and Data Security. --- Applications of Mathematics. --- Engineering & Applied Sciences --- Computer Science --- Math --- Complexity, Computational --- Software, Computer --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Applied mathematics. --- Engineering mathematics. --- Computer Science. --- Computer security --- Cryptology. --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Electronic data processing --- Machine theory --- Cryptography --- Protection --- Security measures --- Computer science—Mathematics. --- Engineering --- Engineering analysis --- Mathematical analysis --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Mathematics --- Communication systems --- Foundations
Choose an application
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Computer science. --- Data protection. --- Data encryption (Computer science). --- Computer software. --- Computational complexity. --- Information Systems. --- Mathematics. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Discrete Mathematics in Computer Science. --- Systems and Data Security. --- Applications of Mathematics. --- Engineering & Applied Sciences --- Computer Science --- Informatics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Math --- Complexity, Computational --- Software, Computer --- Computer security. --- Algorithms. --- Computer science --- Management information systems. --- Applied mathematics. --- Engineering mathematics. --- Computer security --- Data encryption (Computer science) --- Cryptology. --- Computer systems --- Cryptography --- Science --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Electronic data processing --- Machine theory --- Protection --- Security measures --- Computer science—Mathematics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Engineering --- Engineering analysis --- Mathematical analysis --- Communication systems --- Foundations --- Mathematics
Choose an application
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.
Data encryption (Computer science). --- Computer network architectures. --- Computer science. --- Computers --- Software engineering. --- Coding theory. --- Cryptology. --- Computer Systems Organization and Communication Networks. --- Computers and Society. --- Legal Aspects of Computing. --- Software Engineering. --- Coding and Information Theory. --- Law and legislation. --- Computer organization. --- Computers and civilization. --- Computers. --- Information theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication theory --- Communication --- Cybernetics --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Organization, Computer --- Electronic digital computers --- Public key cryptography. --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture
Choose an application
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.
Data encryption (Computer science). --- Computer network architectures. --- Computer science. --- Computers --- Software engineering. --- Coding theory. --- Cryptology. --- Computer Systems Organization and Communication Networks. --- Computers and Society. --- Legal Aspects of Computing. --- Software Engineering. --- Coding and Information Theory. --- Law and legislation. --- Computer organization. --- Computers and civilization. --- Computers. --- Information theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication theory --- Communication --- Cybernetics --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Organization, Computer --- Electronic digital computers --- Data encryption (Computer science)
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Conference on Financial Cryptography and Data Security, FC 2018, held in Nieuwport, Curaçao, in February/ March 2018. The 27 revised full papers and 2 short papers were carefully selected and reviewed from 110 submissions. The papers are grouped in the following topical sections: Financial Cryptography and Data Security, Applied Cryptography, Mobile Systems Security and Privacy, Risk Assessment and Management, Social Networks Security and Privacy and much more. .
Computer security. --- Software engineering. --- Data structures (Computer scienc. --- Systems and Data Security. --- Software Engineering/Programming and Operating Systems. --- Information Systems Applications (incl. Internet). --- Data Structures and Information Theory. --- Computer software engineering --- Engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Data encryption (Computer science) --- Application software. --- Data structures (Computer science). --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Complex analysis --- Discrete mathematics --- Mathematics --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- toegepaste wiskunde --- complexiteit --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- bedrijfssoftware --- wachtwoorden (informatica) --- computers --- informatica --- informatiesystemen --- wiskunde --- computerbeveiliging --- informatica management --- computerkunde
Choose an application
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Complex analysis --- Discrete mathematics --- Mathematics --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- toegepaste wiskunde --- complexiteit --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- bedrijfssoftware --- wachtwoorden (informatica) --- computers --- informatica --- informatiesystemen --- wiskunde --- computerbeveiliging --- informatica management --- computerkunde
Choose an application
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Computer security. --- Computer organization. --- Coding theory. --- Information theory. --- Application software. --- Operating systems (Computers). --- Systems and Data Security. --- Computer Systems Organization and Communication Networks. --- Coding and Information Theory. --- Information Systems Applications (incl. Internet). --- Operating Systems. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Organization, Computer --- Electronic digital computers --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Operating systems --- Protection --- Security measures --- Xifratge (Informàtica) --- Xarxes d'ordinadors --- Seguretat informàtica --- Xarxes d'ordinadors.
Choose an application
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Computer security. --- Computer communication systems. --- Data encryption (Computer science). --- Application software. --- Computer networks --- Systems and Data Security. --- Computer Communication Networks. --- Cryptology. --- Information Systems Applications (incl. Internet). --- Mobile and Network Security. --- Security measures. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures --- Data encryption (Computer science) --- Xifratge (Informàtica) --- Xarxes d'ordinadors --- Seguretat informàtica --- Xarxes d'ordinadors.
Listing 1 - 10 of 27 | << page >> |
Sort by
|