feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9947364108802882
    Format: XIX, 606 p. 75 illus. , online resource.
    ISBN: 9783319446189
    Series Statement: Lecture Notes in Computer Science, 9841
    Content: This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.
    Note: Encryption -- Memory Protection -- Multi-party Computation -- Zero-knowledge Proofs -- Efficient Protocols -- Outsourcing Computation -- Digital Signatures -- Cryptanalysis -- Two-party Computation -- Secret Sharing -- Obfuscation.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319446172
    Language: English
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_BV021742347
    Format: XI, 364 S. : , graph. Darst.
    ISBN: 978-3-540-38080-1 , 3-540-38080-9
    Series Statement: Lecture notes in computer science 4116
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Kryptologie ; Rechnernetz ; Computersicherheit ; Datensicherung ; Verteiltes System ; Advanced Encryption Standard ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9947971903602882
    Format: XIII, 584 p. 57 illus. , online resource.
    ISBN: 9783319981130
    Series Statement: Lecture Notes in Computer Science, 11035
    Content: This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018. The 30 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on signatures and watermarking; composability; encryption; multiparty computation; anonymity and zero knowledge; secret sharing and oblivious transfer; lattices and post quantum cryptography; obfuscation; two-party computation; and protocols.
    Note: Signatures and Watermarking -- Composability -- Encryption I -- Multiparty computation -- Anonymity and Zero Knowledge -- Secret Sharing and Oblivious Transfer -- Lattices and Post Quantum Cryptography -- Obfuscation -- Two-party Computation -- Protocols -- Encryption II.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319981123
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV045164943
    Format: 1 Online-Ressource (XIII, 584 Seiten) , Illustrationen, Diagramme
    ISBN: 9783319981130
    Series Statement: Lecture notes in computer science 11035
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-98112-3
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-98114-7
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Rechnernetz ; Kryptologie ; Authentifikation ; Sicherheitsprotokoll ; Schlüsselverteilung ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV022458083
    Format: 1 Online-Ressource (XI, 364 S.) , graph. Darst.
    ISBN: 3540380809 , 9783540380801
    Series Statement: Lecture notes in computer science 4116
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Kryptologie ; Rechnernetz ; Computersicherheit ; Datensicherung ; Verteiltes System ; Advanced Encryption Standard ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9947364059202882
    Format: XII, 368 p. , online resource.
    ISBN: 9783540380818
    Series Statement: Lecture Notes in Computer Science, 4116
    Content: The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was held in Maiori, Italy, on September 6-8, 2006. The conference was the ?fth in the SCN series, and this year marked a change in its name (the former name was Security in Communication Networks). The name change meant to better describe the scope of the conference while preserving the SCN acronym. This year for the ?rst time we had the proceedings volume ready at the conference. We feel thatthe SCN conferencehas maturedandthat it has becomea tradition to hold it regularly in the beautiful setting of the Amal?tan coast as a biennial event. Theconferencebroughttogetherresearchersinthe?eldsofcryptographyand security in order to foster the extension of cooperation and exchange of ideas among them, aiming at assuring safety and trustworthiness of communication networks. The topics covered by the conference this year included: foundations of distributed systems security, signatures schemes, block ciphers, anonymity, e-commerce, public key encryption and key exchange, secret sharing, symmetric and public key cryptanalysis, randomness, authentication. The international Program Committee consisted of 24 members who are top experts in the conference ?elds. We received 81 submissions amongst which 24 papers were selected for presentation at the conference. These proceedings - clude the extended abstract versions of the 24 accepted papers and the short abstract of the invited talk by Ivan Damg? ard.
    Note: Distributed Systems Security: Foundations -- Edge Eavesdropping Games -- Universally Composable Simultaneous Broadcast -- Signature Schemes Variants -- Relations Among Security Notions for Undeniable Signature Schemes -- Concurrent Blind Signatures Without Random Oracles -- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions -- Block Ciphers Analysis -- Understanding Two-Round Differentials in AES -- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b -- Anonymity and E-Commerce -- Constant-Size Dynamic k-TAA -- On Secure Orders in the Presence of Faults -- Balancing Accountability and Privacy Using E-Cash (Extended Abstract) -- Public Key Encryption and Key Exchange -- About the Security of MTI/C0 and MQV -- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles -- A New Key Exchange Protocol Based on MQV Assuming Public Computations -- Secret Sharing -- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants -- Cheating Immune (2,n)-Threshold Visual Secret Sharing -- Rational Secret Sharing, Revisited -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) -- Distinguishing Stream Ciphers with Convolutional Filters -- On Statistical Testing of Random Numbers Generators -- Applied Authentication -- Lightweight Email Signatures (Extended Abstract) -- Shoehorning Security into the EPC Tag Standard -- Proof-Carrying Proxy Certificates -- Public Key Related Cryptanalysis -- Cryptanalysis of Rainbow -- An Improved LPN Algorithm -- Invited Talk -- Theory and Practice of Multiparty Computation.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540380801
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9947363730302882
    Format: XX, 609 p. 101 illus. , online resource.
    ISBN: 9783319108797
    Series Statement: Lecture Notes in Computer Science, 8642
    Content: This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption.
    Note: Key exchange -- Multilinear maps and obfuscation.-Pseudorandom function extensions -- Secure computation - foundations and algorithms -- Network security -- Functional encryption -- Cryptanalysis -- Secure computation - implementation -- Zero knowledge -- Message authentication -- Proofs of space and erasure -- Public-key encryption.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319108780
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9947364308802882
    Format: XI, 423 p. , online resource.
    ISBN: 9783540858553
    Series Statement: Lecture Notes in Computer Science, 5229
    Content: This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.
    Note: Invited Talk -- Storage Encryption: A Cryptographer’s View -- Session 1: Implementations -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A Cryptographic Link Layer for Local Area Networks -- Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification -- Session 2: Protocols I -- Privacy Preserving Data Mining within Anonymous Credential Systems -- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function -- Session 3: Encryption I -- Two Generic Constructions of Probabilistic Cryptosystems and Their Applications -- Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption -- Session 4: Encryption II -- General Certificateless Encryption and Timed-Release Encryption -- Efficient Certificate-Based Encryption in the Standard Model -- Session 5: Primitives -- An Improved Robust Fuzzy Extractor -- On Linear Secret Sharing for Connectivity in Directed Graphs -- Session 6: Signatures -- Expressive Subgroup Signatures -- Anonymous Proxy Signatures -- Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem -- Session 7: Hardware and Cryptanalysis -- Using Normal Bases for Compact Hardware Implementations of the AES S-Box -- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes -- Full Cryptanalysis of LPS and Morgenstern Hash Functions -- A New DPA Countermeasure Based on Permutation Tables -- Session 8: Protocols II -- Simplified Submission of Inputs to Protocols -- Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited -- Session 9: Encryption III -- Linear Bandwidth Naccache-Stern Encryption -- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment -- Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework) -- Session 10: Key Exchange -- New Anonymity Notions for Identity-Based Encryption -- A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort -- An Identity-Based Key Agreement Protocol for the Network Layer.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540858546
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_550114920
    Format: Online-Ressource , v.: digital
    Edition: Online-Ausg. Berlin Heidelberg Springer-Verlag GmbH Springer-11645 Electronic reproduction; Available via World Wide Web
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9783540380818
    Series Statement: Lecture Notes in Computer Science 4116
    Note: Includes bibliographical references and index , Electronic reproduction; Available via World Wide Web
    Additional Edition: ISBN 9783540380801
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Kryptologie ; Computersicherheit ; Datensicherung ; Verteiltes System ; Advanced Encryption Standard ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_1647400473
    Format: Online-Ressource (digital)
    ISBN: 9783540858553
    Series Statement: Lecture Notes in Computer Science 5229
    Content: Invited Talk -- Storage Encryption: A Cryptographer’s View -- Session 1: Implementations -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A Cryptographic Link Layer for Local Area Networks -- Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification -- Session 2: Protocols I -- Privacy Preserving Data Mining within Anonymous Credential Systems -- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function -- Session 3: Encryption I -- Two Generic Constructions of Probabilistic Cryptosystems and Their Applications -- Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption -- Session 4: Encryption II -- General Certificateless Encryption and Timed-Release Encryption -- Efficient Certificate-Based Encryption in the Standard Model -- Session 5: Primitives -- An Improved Robust Fuzzy Extractor -- On Linear Secret Sharing for Connectivity in Directed Graphs -- Session 6: Signatures -- Expressive Subgroup Signatures -- Anonymous Proxy Signatures -- Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem -- Session 7: Hardware and Cryptanalysis -- Using Normal Bases for Compact Hardware Implementations of the AES S-Box -- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes -- Full Cryptanalysis of LPS and Morgenstern Hash Functions -- A New DPA Countermeasure Based on Permutation Tables -- Session 8: Protocols II -- Simplified Submission of Inputs to Protocols -- Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited -- Session 9: Encryption III -- Linear Bandwidth Naccache-Stern Encryption -- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment -- Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework) -- Session 10: Key Exchange -- New Anonymity Notions for Identity-Based Encryption -- A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort -- An Identity-Based Key Agreement Protocol for the Network Layer.
    Content: This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.
    Additional Edition: ISBN 9783540858546
    Additional Edition: Buchausg. u.d.T. Security and cryptography for networks Berlin : Springer, 2008 ISBN 3540858547
    Additional Edition: ISBN 9783540858546
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Kryptologie ; Rechnernetz ; Computersicherheit ; Datensicherung ; Verteiltes System ; Advanced Encryption Standard ; Rechnernetz ; Sicherheitsprotokoll ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Nierstrasz, Oscar 1957-
    Author information: Pandu Rangan, C. 1955-
    Author information: Mattern, Friedemann 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages