1
Table of Contents: ... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...
View full text
Electronic eBook
2
Table of Contents: ...Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation...
View full text
Electronic eBook
3
Published 2006
Table of Contents: ... Against Active Insiders -- Security Protocols and Formal Methods -- Formalising Receipt-Freeness...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... Cryptosystems -- Constructions of Almost Resilient Functions -- Privacy and Tracing -- A Novel Method...
View full text
Electronic eBook
5
Published 2008
Table of Contents: ... -- Cryptographic Foundations -- Construction of Resilient Functions with Multiple Cryptographic Criteria...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... -- Preventing Unofficial Information Propagation -- A Novel Method for Micro-Aggregation in Secure Statistical...
View full text
Electronic eBook
8
Published 2013
Table of Contents: ... Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... Attacks on the One-Way Function Tree (OFT) Scheme -- Bayesian Methods for Practical Traitor Tracing...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ... -- Generic Security-Amplifying Methods of Ordinary Digital Signatures -- New Differential-Algebraic Attacks...
View full text
Electronic eBook
13
Published 2015
Table of Contents: ... (V. Gupta) -- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E...
View full text
Electronic eBook
14
Published 2013
Table of Contents: ... -- The Importance of Being Earnest [In Security Warnings] (Short Paper) -- Exploring Extrinsic Motivation for Better...
View full text
Electronic eBook
15
Published 2015
Table of Contents: ... -- A Method for Improving the Precision and Coverage of Atomicity Violation Predictions...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ...: An Experiment of Formal Methods -- Correct Channel Passing by Construction -- Semantics -- A Process Semantics...
View full text
Electronic eBook
17
Published 2012
Table of Contents: ... and Environmental Security: The Dietary Grape Polyphenol Concentrate Enoant as Functional Food in Prevention...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ...ASIAN’2006 -- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers -- A...
View full text
Electronic eBook
19
Published 2008
Table of Contents: ...-Service Construction -- Applications of Formal Approaches to Service-Oriented Computing -- A Use-Case...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... -- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Thematic Track...
View full text
Electronic eBook