feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_1869167899
    Format: 1 Online-Ressource (308 p.)
    ISBN: 9783036582283 , 9783036582290
    Content: The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power-constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks
    Note: English
    Language: Undetermined
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV046190027
    Format: 1 Online-Ressource (xi, 382 Seiten) , 131 Illustrationen, 9 in Farbe
    ISBN: 9783030319199
    Series Statement: Lecture notes in computer science 11821
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-31918-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-31920-5
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptoanalyse ; Computersicherheit ; Datensicherung ; Beweisbarkeit ; Sicherheitsprotokoll ; Beweisbarkeit ; Hash-Algorithmus ; Computersicherheit ; Datensicherung ; Kryptologie ; Chiffrierung ; Kryptosystem ; Schlüsselaustauschprotokoll ; Elektronische Unterschrift ; Beweisbarkeit ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Interaktives Beweissystem ; Sicherheitsprotokoll ; Interaktives Beweissystem ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9947364354802882
    Format: XVI, 506 p. 120 illus. , online resource.
    ISBN: 9783642341298
    Series Statement: Lecture Notes in Computer Science, 7618
    Content: This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
    Note: Audio Steganalysis Based on Lossless Data-Compression Techniques -- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme -- Impact of the Revocation Service in PKI Prices -- Cryptanalysis of Multi-Prime RSA with Small Prime Difference -- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem -- Improved Related-Key Differential Attacks on Reduced-Round LBlock -- Countermeasures on Application Level Low-Rate Denial-of-Service Attack -- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test -- Group Behavior Metrics for P2P Botnet Detection -- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA -- Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model -- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain -- Perfect Ambiguous Optimistic Fair Exchange -- Privacy-Preserving Noisy Keyword Search in Cloud Computing -- Forward Secure Attribute-Based Signatures -- On Constant-Round Precise Zero-Knowledge -- Outsourcing Encryption of Attribute-Based Encryption with MapReduce -- Security Enhancement of Identity-Based Identification with Reversibility -- Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture -- Permission-Based Abnormal Application Detection for Android -- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data -- Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic Approach for Providing Revocation Support in Secret Handshake -- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy -- Exploring Mobile Proxies for Better Password Authentication --  On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying’s Attack -- Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack -- Comparison between Side-Channel Analysis Distinguishers -- Acceleration of Composite Order Bilinear Pairing on Graphics Hardware -- Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme -- Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition -- Cookie-Proxy: A Scheme to Prevent SSLStrip Attack -- Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer -- Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding -- Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance -- A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains -- Efficient Attribute Proofs in Anonymous Credential Using Attribute-Based Cryptography -- F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances -- Location Privacy Policy Management System -- Privacy Protection in Social Networks Using l-Diversity -- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner -- A Key Sharing Fuzzy Vault Scheme -- A New Version of McEliece PKC Based on Convolutional Codes -- Flexible Attribute-Based Encryption -- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles -- A Comparative Study of Malware Family Classification -- A Fine-Grained Classification Approach for the Packed Malicious Code.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783642341281
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948170570402882
    Format: XI, 382 p. 131 illus., 9 illus. in color. , online resource.
    Edition: 1st ed. 2019.
    ISBN: 9783030319199
    Series Statement: Security and Cryptology ; 11821
    Content: This book constitutes the refereed proceedings of the 13th International Conference on Provable Security, ProvSec 2019, held in Cairns, QLD, Australia, in October 2019. The 18 full and 6 short papers presented were carefully reviewed and selected from 51 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives, including a special theme on “Practical Security.”.
    Note: Lattice-based IBE with equality test in standard model -- A critique of game-based definitions of receipt-freeness for voting -- One-Round Authenticated Group Key Exchange from Isogenies -- History-Free Sequential Aggregate MAC Revisited -- An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature -- Secure Online/Offline Attribute-based Encryption for IOT Users in Cloud Computing -- Identity-Concealed Authenticated Encryption from Ring Learning With Errors -- Towards Enhanced Security for Certificateless Public-key Authenticated Encryption with Keyword Search -- TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-invisibility -- A Lattice-Based Anonymous Distributed E-Cash from Bitcoin -- Plaintext-Verifiably-Checkable Encryption -- Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem -- Hierarchical Functional Signcryption: Notion and Construction -- FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme -- A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection -- Password-based Authenticated Key Exchange from Standard Isogeny Assumptions -- A centralized digital currency system with rich functions -- A Practical Lattice-Based Sequential Aggregate Signature -- Provably Secure Proactive Secret Sharing Without the Adjacent Assumption -- Space-Efficient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWG -- A Coin-Free Oracle-Based Augmented Black Box Framework -- Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks -- Solving ECDLP via List Decoding -- On-demand Privacy Preservation for Cost-Efficient Edge Intelligence Model Training.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783030319182
    Additional Edition: Printed edition: ISBN 9783030319205
    Language: English
    Keywords: Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV049476469
    Format: 1 Online-Ressource (xi, 294 Seiten)
    ISBN: 9783036582290
    Note: Special issue reprint "Electronics"
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-3-0365-8228-3
    Language: English
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages