E-Book, Englisch, 287 Seiten, eBook
Reihe: Security and Cryptology
Bica / Reyhanitabar Innovative Security Solutions for Information Technology and Communications
1. Auflage 2016
ISBN: 978-3-319-47238-6
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers
E-Book, Englisch, 287 Seiten, eBook
Reihe: Security and Cryptology
ISBN: 978-3-319-47238-6
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Circular Security Reconsidered.- Visual Cryptography: Models, Issues, Applications and New Directions.- Paper Tigers: An Endless Fight.- Security of Identity-based Encryption Schemes from Quadratic Residues.- Long-Term Secure One-Round Group Key Establishment from Multilinear Mappings.- RSA Weak Public Keys Available on the Internet.- A Tweak for a PRF Mode of a Compression Function and Its Applications.- May-Ozerov Algorithm for Nearest-Neighbor Problem over mathbb{F}_qandIts Application to Information Set Decoding.- A Cryptographic Approach for Implementing Semantic Web's Trust Layer.- Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret.- Homomorphic Encryption Based On Group Algebras and Goldwasser-Micali Scheme.- Increasing the Robustness of the Montgomery kP-Algorithm against SCA by Modifying its Initialization.- When Pythons Bite.- Secure Virtual Machine for Real Time Forensic Toolson Commodity Workstations.- Pushing the Optimization Limits of Ring Oscillator-based True Random Number Generators.- TOR - Didactic Pluggable Transport.- Preparation of SCA Attacks: Successfully Decapsulating BGA Packages.- Comparative Analysis of Security Operations Center Architectures; Proposals and Architectural Considerations for Frameworks and Operating Models.- Secure Transaction Authentication Protocol.- Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing.