Information Security and Cryptology : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers / / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XXI, 530 p. 84 illus.) |
Disciplina | 303.4834 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Computers and civilization Computers Law and legislation Data mining Systems and Data Security Cryptology Coding and Information Theory Computers and Society Legal Aspects of Computing Data Mining and Knowledge Discovery |
ISBN | 3-319-75160-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910349460403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security and Cryptology [[electronic resource] ] : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers / / edited by Kefei Chen, Dongdai Lin, Moti Yung |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 544 p. 78 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Data encryption (Computer science) Computers and civilization Computer communication systems Application software Systems and Data Security Software Engineering Cryptology Computers and Society Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-319-54705-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Symmetric ciphers -- Public-key cryptosystems -- Signature and authentication -- Homomorphic encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves -- Security and implementation. |
Record Nr. | UNISA-996466335903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security and Cryptology : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers / / edited by Kefei Chen, Dongdai Lin, Moti Yung |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 544 p. 78 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Data encryption (Computer science) Computers and civilization Computer communication systems Application software Systems and Data Security Software Engineering Cryptology Computers and Society Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-319-54705-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Symmetric ciphers -- Public-key cryptosystems -- Signature and authentication -- Homomorphic encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves -- Security and implementation. |
Record Nr. | UNINA-9910483526403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security and Cryptology [[electronic resource] ] : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers / / edited by Dongdai Lin, XiaoFeng Wang, Moti Yung |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 490 p. 102 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Algorithms Computer science—Mathematics Systems and Data Security Cryptology Coding and Information Theory Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science |
ISBN | 3-319-38898-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hash function -- Signature schemes -- Symmetric ciphers -- Elliptic curve and cryptographic fundamentals -- Web and applications security -- Cloud security -- Key management and public key encryption -- Zero knowledge and secure computations -- Software and mobile security. |
Record Nr. | UNISA-996465675303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security and Cryptology : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers / / edited by Dongdai Lin, XiaoFeng Wang, Moti Yung |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 490 p. 102 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Algorithms Computer science—Mathematics Systems and Data Security Cryptology Coding and Information Theory Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science |
ISBN | 3-319-38898-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hash function -- Signature schemes -- Symmetric ciphers -- Elliptic curve and cryptographic fundamentals -- Web and applications security -- Cloud security -- Key management and public key encryption -- Zero knowledge and secure computations -- Software and mobile security. |
Record Nr. | UNINA-9910484215303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security and Cryptology [[electronic resource] ] : 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers / / edited by Dongdai Lin, Moti Yung, Jianying Zhou |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XIII, 547 p. 92 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Coding theory Information theory Algorithms Computer science—Mathematics Discrete mathematics Data and Information Security Cryptology Coding and Information Theory Discrete Mathematics in Computer Science |
ISBN | 3-319-16745-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | An Efficient Privacy-Preserving E-coupon System -- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature -- Revocation in Publicly Verifiable Outsourced Computation -- Private Aggregation with Custom Collusion Tolerance -- Ring Signatures of Constant Size Without Random Oracles -- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control -- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge -- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC -- Optimal Proximity Proofs -- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions -- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization -- Fully Homomorphic Encryption with Auxiliary Inputs -- Trapdoors for Ideal Lattices with Applications -- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails -- The Boomerang Attacks on BLAKE and BLAKE2 -- Second Preimage Analysis of Whirlwind -- Boomerang Attack on Step-Reduced SHA-512 -- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption -- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts -- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks -- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication -- A Note on Diem’s Proof -- Stand-by Attacks on E-ID Password Authentication -- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps -- A Lightweight Security Isolation Approach for Virtual Machines Deployment -- A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors. |
Record Nr. | UNISA-996200343703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security and Cryptology : 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers / / edited by Dongdai Lin, Moti Yung, Jianying Zhou |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XIII, 547 p. 92 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Coding theory Information theory Algorithms Computer science—Mathematics Discrete mathematics Data and Information Security Cryptology Coding and Information Theory Discrete Mathematics in Computer Science |
ISBN | 3-319-16745-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | An Efficient Privacy-Preserving E-coupon System -- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature -- Revocation in Publicly Verifiable Outsourced Computation -- Private Aggregation with Custom Collusion Tolerance -- Ring Signatures of Constant Size Without Random Oracles -- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control -- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge -- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC -- Optimal Proximity Proofs -- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions -- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization -- Fully Homomorphic Encryption with Auxiliary Inputs -- Trapdoors for Ideal Lattices with Applications -- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails -- The Boomerang Attacks on BLAKE and BLAKE2 -- Second Preimage Analysis of Whirlwind -- Boomerang Attack on Step-Reduced SHA-512 -- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption -- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts -- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks -- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication -- A Note on Diem’s Proof -- Stand-by Attacks on E-ID Password Authentication -- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps -- A Lightweight Security Isolation Approach for Virtual Machines Deployment -- A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors. |
Record Nr. | UNINA-9910484615003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security and Cryptology [[electronic resource] ] : 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers / / edited by Dongdai Lin, Shouhuai Xu, Moti Yung |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XIII, 408 p. 51 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Coding theory Information theory Algorithms Data and Information Security Cryptology Coding and Information Theory |
ISBN | 3-319-12087-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Boolean Function and Block Cipher -- Sequence and Stream Cipher -- Applications: Systems and Theory -- Computational Number Theory -- Public Key Cryptography -- Hash Function -- Side-Channel and Leakage -- Application and System Security. |
Record Nr. | UNISA-996213649103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security and Cryptology : 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers / / edited by Dongdai Lin, Shouhuai Xu, Moti Yung |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XIII, 408 p. 51 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Coding theory Information theory Algorithms Data and Information Security Cryptology Coding and Information Theory |
ISBN | 3-319-12087-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Boolean Function and Block Cipher -- Sequence and Stream Cipher -- Applications: Systems and Theory -- Computational Number Theory -- Public Key Cryptography -- Hash Function -- Side-Channel and Leakage -- Application and System Security. |
Record Nr. | UNINA-9910484427703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security and Cryptology [[electronic resource] ] : 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers / / edited by Chuan-Kun Wu, Moti Yung, Dongdai Lin |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (X, 396 p. 56 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Coding theory Information theory Algorithms Information technology—Management Electronic commerce Data and Information Security Cryptology Coding and Information Theory Computer Application in Administrative Data Processing e-Commerce and e-Business |
ISBN | 3-642-34704-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems -- Cryptanalysis vs. Provable Security -- Boosting Scalability in Anomaly-Based Packed Executable Filtering -- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs -- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming -- Adleman-Manders-Miller Root Extraction Method Revisited -- Multi-pixel Encryption Visual Cryptography -- An Improved Electronic Voting Scheme without a Trusted Random Number Generator -- Fault Attacks against the Miller Algorithm in Hessian Coordinates -- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion -- Improved Tradeoff between Encapsulation and Decapsulation of HK09 -- Non-interactive Deniable Authentication Protocols -- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3 -- Efficient Self-certified Signatures with Batch Verification -- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening -- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves -- Weak-Key Class of MISTY1 for Related-Key Differential Attack -- Cryptanalysis of Reduced-Round KLEIN Block Cipher -- An Efficient RSA Implementation without Precomputation -- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures -- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation -- Towards Attack Resilient Social Network Based Threshold Signing -- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings -- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. |
Record Nr. | UNISA-996465661203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|