1
Theory of Cryptography [E-Book] : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part II /
Table of Contents: ... -- On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger -- BKW Meets Fourier: New Algorithms for LPN with Sparse Parities -- Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy -- Polynomial-time...

Full text 
2
Advances in Cryptology - CRYPTO 2021 [E-Book] : 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part IV /
Table of Contents: ... -- Low-Complexity Cryptography -- Low-Complexity Weak Pseudorandom Functions in AC0[MOD2] -- MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications -- No Time to Hash: On Super-Efficient Entropy Accumulation...

Full text 
3
SOFSEM 2016: Theory and Practice of Computer Science [E-Book] : 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings /
Table of Contents: ... for PAMs -- On the Effects of Nondeterminism on Ordered Restarting Automata -- Quantum Walks on Two-Dimensional Grids with Multiple Marked Locations -- How to Smooth Entropy? -- Bounded TSO-to-SC Linearizability is Decidable -- Probabilistic Autoreductions...

Full text 
4
Information Theoretic Security [E-Book] : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers /
Table of Contents: ...Secret sharing -- Quantum cryptography -- Visual cryptography -- Cryptographic protocols.-Entropy, extractors and privacy....

Full text 
5
Digital-Forensics and Watermarking [E-Book] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers /
Table of Contents: ... and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients...

Full text 
6
Cryptographic Hardware and Embedded Systems -- CHES 2015 [E-Book] : 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings /
7
Cryptographic Hardware and Embedded Systems – CHES 2014 [E-Book] : 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings /
Table of Contents: ... Characterization of Arbiter PUFs -- Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM -- RNGs and SCA Issues in Hardware -- Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG -- Entropy Evaluation for Oscillator-Based True...

Full text 
8
Information Theoretic Security [E-Book] : 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings /
Table of Contents: ... -- New Lower Bounds for Privacy in Communication Protocols -- On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis -- Information Theoretic Security for Encryption Based on Conditional Renyi Entropies -- Insider-proof encryption...

Full text 
9
Privacy in Statistical Databases [E-Book] : UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings /
Table of Contents: ... -- Comparison of Different Sensitivity Rules for Tabular Data and Presenting a New Rule – The Interval Rule -- Pre-tabular Perturbation with Controlled Tabular Adjustment: Some Considerations -- Measuring Disclosure Risk with Entropy in Population Based Frequency...

Full text 
10
Foundations and Practice of Security [E-Book] : 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers /
Table of Contents: ...On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous...

Full text 
11
Advanced Infocomm Technology [E-Book] : 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012. Revised Papers /
Table of Contents: ...-Party Authenticated Key Exchange Protocol Using One-Time Key.- Mechanisms to Locate Non-cooperative Transmitters in Wireless Networks.- Mantle: A Novel DOSN Leveraging Free Storage and Local Software.- Descriptional Entropy: Application to Security Software...

Full text 
12
Computer Network Security [E-Book]: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings /
Table of Contents: ... Security -- A Study of Entropy Sources in Cloud Computers: Random Number -- Generation on Cloud Hosts -- Security Modeling of Grid Systems Using Petri Nets -- Using Graph Theory for Cloud System Security Modeling.....

Full text