1
Published 2008
Table of Contents: ... over Small Finite Fields of Odd Characteristic -- Secure Computation of the Vector Dominance Problem...
View full text
Electronic eBook
2
Published 2014
Table of Contents: ... Sensor Networks -- Data Security and Privacy in the Cloud -- Forbidden City Model – Towards a Practice...
View full text
Electronic eBook
3
Published 2014
Table of Contents: ... Expansion Functions Using Pseudorandom Permutations -- Towards More Practical Time-Driven Cache Attacks...
View full text
Electronic eBook
4
Table of Contents: ... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... Device Interactions -- Identification and Verification of Security Relevant Functions in Embedded Systems...
View full text
Electronic eBook
6
Published 2015
Subjects: ...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ...Theory of Security with Noisy Data -- Unbreakable Keys from Random Noise -- Fuzzy Commitment -- A...
View full text
Electronic eBook
8
Published 2013
Table of Contents: ...Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks -- Practical Everlasting...
View full text
Electronic eBook
9
Published 2005
Table of Contents: ... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... Revisited -- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions -- Secure Multiparty...
View full text
Electronic eBook
11
Published 2005
Table of Contents: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
View full text
Electronic eBook
12
Published 2007
Table of Contents: ...-interactive Manual Channel Message Authentication Based on eTCR Hash Functions -- E-Commerce -- A Practical...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...
View full text
Electronic eBook
14
Published 2012
Table of Contents: ...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...
View full text
Electronic eBook
15
Published 2005
Table of Contents: ... Talk -- Potential Impacts of a Growing Gap Between Theory and Practice in Information Security...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ... Protocol for Dynamic Groups -- A Practical Universal Circuit Construction and Secure Evaluation of Private...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...
View full text
Electronic eBook
18
Published 2013
Table of Contents: ...1: Towards a Unified Modeling and Verification of Network and System Security Configurations -- 2...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ...? -- Phishing Across Interaction Channels: Methods, Experience and Best Practice -- IT-Security Beyond Borders...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree...
View full text
Electronic eBook