Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002. The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography.
Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Congresses --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Congrès --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Coding and Information Theory. --- Data Encryption. --- Computer Communication Networks. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer software. --- Computational complexity. --- Cryptology. --- Software, Computer --- Computer systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Complexity, Computational --- Electronic data processing --- Machine theory --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Operating systems --- Information theory. --- Computer science—Mathematics. --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication theory --- Communication --- Cybernetics --- Foundations --- Distributed processing
Choose an application
Reconfigurable RF-frontends aim to cope with the continuous pursuit of wider frequency coverage, higher efficiency, further compactness and lower cost of ownership. They are expected to lay the foundations of future software defined or cognitive radios. As a potential enabling technology for the frontends, the tunable ferroelectric devices have shown not only enhanced performance but also new functionalities. This book explores the recent developments in the field. It provides a cross-sectional perspective on the interdisciplinary research. With attention to the devices based on ceramic thick-films and crystal thin-films, the book reviews the adapted technologies of material synthesis, film deposition and multilayer circuitry. Next, it highlights the original classes of thin-film ferroelectric devices, including stratified metal-insulator-metal varactors with suppression of acoustic resonance and programmable bi-stable high frequency capacitors. At the end the book analyzes how the frontends can be reformed by tunable multiband antennas, tunable single- and multiband impedance matching networks and tunable substrate integrated waveguide filters, which are all built on low cost ferroelectric thick-films. For all the above devices, the theoretical analyses, modeling and design methods are elaborated, while through demonstrative prototypes the application potential is evaluated.
Electrical engineering. --- Multiband ferroelectric devices. --- RF-Frontends. --- Ferroelectric devices --- Software radio --- Ferroelectric devices. --- Microwaves. --- Telecommunication. --- Microwaves, RF and Optical Engineering. --- Communications Engineering, Networks. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Hertzian waves --- Electric waves --- Electromagnetic waves --- Geomagnetic micropulsations --- Radio waves --- Shortwave radio --- Electronic apparatus and appliances --- Solid state electronics --- Piezoelectric devices --- Optical engineering. --- Electric engineering --- Engineering --- Mechanical engineering --- Software radio.
Choose an application
Reconfigurable RF-frontends aim to cope with the continuous pursuit of wider frequency coverage, higher efficiency, further compactness and lower cost of ownership. They are expected to lay the foundations of future software defined or cognitive radios. As a potential enabling technology for the frontends, the tunable ferroelectric devices have shown not only enhanced performance but also new functionalities. This book explores the recent developments in the field. It provides a cross-sectional perspective on the interdisciplinary research. With attention to the devices based on ceramic thick-films and crystal thin-films, the book reviews the adapted technologies of material synthesis, film deposition and multilayer circuitry. Next, it highlights the original classes of thin-film ferroelectric devices, including stratified metal-insulator-metal varactors with suppression of acoustic resonance and programmable bi-stable high frequency capacitors. At the end the book analyzes how the frontends can be reformed by tunable multiband antennas, tunable single- and multiband impedance matching networks and tunable substrate integrated waveguide filters, which are all built on low cost ferroelectric thick-films. For all the above devices, the theoretical analyses, modeling and design methods are elaborated, while through demonstrative prototypes the application potential is evaluated.
Fluid mechanics --- Spectrometric and optical chemical analysis --- Telecommunication technology --- Applied physical engineering --- Mass communications --- akoestiek --- tekstverwerking --- telecommunicatie --- ingenieurswetenschappen --- communicatietechnologie --- spectrometrie
Choose an application
Computers --- Access control --- Congresses --- Cryptography
Choose an application
Choose an application
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the "encrypt-then-sign" method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.
Computer science --- Data structures (Computer science) --- Information systems --- Informatique --- Structures de données (Informatique) --- Information storage and retrieval systems --- Systèmes d'information --- Structures de données (Informatique) --- Systèmes d'information --- EPUB-LIV-FT LIVINFOR SPRINGER-B
Choose an application
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the “encrypt-then-sign” method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.
Computer security. --- Internet -- Security measures. --- Data encryption (Computer science) --- Cryptography --- Engineering & Applied Sciences --- Computer Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Data structures (Computer science). --- Computers. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Information Systems and Communication Service. --- Data protection --- Security systems --- Hacking --- Computer security --- Data structures (Computer scienc. --- Information systems. --- Data Structures and Information Theory. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science)
Choose an application
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the “encrypt-then-sign” method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.
Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- computers --- informatica --- informatiesystemen --- informatietechnologie
Choose an application
Computer security --- Computers --- Sécurité informatique --- Congresses --- Access control --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Congrès --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Mathematics. --- Computer software. --- Computational complexity. --- Information Systems. --- Cryptology. --- Complexity, Computational --- Electronic data processing --- Machine theory --- Software, Computer --- Computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer science—Mathematics. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Algorism --- Algebra --- Arithmetic --- Communication systems --- Distributed processing --- Foundations
Choose an application
The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend c- tinuedintheprogramofthisyear’sconference.Theprogramcommitteereceived 106 submissions, from which 36 were selected for presentation. Each submission was reviewed by at least three experts in the relevant research area. We would liketothankalltheauthorsfortakingtheirtimetopreparethesubmissions,and wehopethatthosewhosepapersweredeclinedwillbeableto?ndanalternative forum for their work. We were fortunate to have an energetic team of experts who took on the task of the program committee. Their names may be found overleaf, and we thank them warmly for their time and e?orts. This team was helped by an even larger number of external reviewers who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete. We would also like to thank the advisory committee for their advice and s- port.TheexcellentlocalarrangementswerehandledbyDirkBalfanzandJessica Staddon. We made use of the electronic submission and reviewing software s- plied by COSIC at the Katholieke Universiteit Leuven. Both the software and the ISC 2004 website were run on a server at UNC Charlotte, and were perfectly maintained by Seung-Hyun Im. We also appreciate assistance from Lawrence Teo in editing the proceedings.
Computer science. --- Computer Communication Networks. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computer software. --- Information Systems. --- Computer Science. --- Data Encryption. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer security --- Computers --- Computer Science --- Engineering & Applied Sciences --- Access control --- Sécurité informatique --- Ordinateurs --- Congresses --- Congrès --- Accès --- Contrôle --- Computer communication systems. --- Algorithms. --- Computers and civilization. --- Management information systems. --- Cryptology. --- Informatics --- Science --- Software, Computer --- Computer systems --- Computer operating systems --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Operating systems --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Foundations --- Distributed processing
Listing 1 - 10 of 13 | << page >> |
Sort by
|