1
Bhasin, Shivam
2024
Table of Contents:
“...Symmetric-key cryptography, Hash functions, Authenticated Encryption Modes -- Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and cyclic shift -- On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweak Size...”2024
Full text
2
Bhasin, Shivam
2024
Table of Contents:
“... Functions -- Distributed Protocols for Oblivious Transfer and Polynomial Evaluation -- Obfuscating Decision Trees -- Privacy-Preserving Plagiarism Checking -- PURED: A unified framework for resource-hard functions -- Post-quantum cryptography -- Implementing...”2024
Full text
3
Isobe, Takanori
2022
Table of Contents:
“...Foundation -- Symmetric Key Cryptology -- Protocols and Implementation -- Cryptanalysis -- Boolean Functions -- Quantum Cryptography and Cryptanalysis -- Post Quantum Cryptography -- Author Index....”2022
Full text
4
5
Hsieh, Sun-Yuan
2022
Table of Contents:
“... -- Vision-Based Lightweight Facial Respiration and Heart Rate Measurement Technology -- GAN-based Criminal Suspect Face Generator -- Cryptography and Information Security -- Automatic Summarization of Critial Threat Intelligence Using Transfer Learning -- Anti...”2022
Full text
6
7
Catania, Barbara
2016
Table of Contents:
“...Foundations of Computer Science -- Cryptography in a Quantum World -- Relating Sublinear Space Computability among Graph Connectivity and Related Problems -- Learning Automatic Families of Languages -- Software Engineering: Methods, Tools, Applications...”2016
Full text
8
9
Khooshabeh, Peter
2016
Table of Contents:
“...Attribute/Role-based Cryptography -- Data in Cloud -- Searchable Encryption -- Key Management -- Encryption -- Leakage Analysis -- Homomorphic Encryption. ....”2016
Full text
10
Ogawa, Kazuto
2016
Table of Contents:
“...System security -- Searchable encryption -- Cryptanalysis -- Permutation and symmetric encryption -- Privacy preserving -- Hardware security -- Post-quantum cryptography -- Paring computation....”2016
Full text
11
Dinh, Thang N.
2016
Table of Contents:
“...Game Theory and Algorithms -- Parameterized Complexity and Algorithms -- Database and Data Structures -- Computational Complexity -- Approximation Algorithms -- Cryptography -- Network and Algorithms -- Graph Theory and Algorithms.-Computational Geometry...”2016
Full text
12
Table of Contents:
“... -- Conducting a Web Browsing Behaviour Study – An Educational Scenario -- A Uniform Programmning Language for Implementing XML Standards -- OntoSDM: An Approach to Improve Quality on Spatial Data Mining Algorithms -- Cryptography, Security, and Verification...”
Full text
Full text
13
14
Du, Dingzhu.
2015
Table of Contents:
“...Algorithms and data structures -- Algorithmic game theory; approximation algorithms and online algorithms -- Automata, languages, logic and computability -- Complexity theory -- Computational learning theory -- Cryptography, reliability and security...”2015
Full text
15
16
Sano, Kentaro.
2015
Table of Contents:
“... Management Inside Configurable Regions of Interest in Mesh-Based Networks-on-Chip -- Survey on Real-Time Network-on-Chip Architectures -- Cryptography Applications Efficient SR-Latch PUF -- Hardware Benchmarking of Cryptographic Algorithms Using High-Level...”2015
Full text
17
Gupta, Prosenjit.
2014
Table of Contents:
“... Management: An Elliptic Curve Cryptography Based Approach -- Automata for Modeling the Distributed Probabilistic Reversible Processes -- Finding Influential Nodes in Social Networks Using Minimum k-Hop Dominating Set -- Efficient Heuristics for the Time Dependent...”2014
Full text
18
19
Ferro, Alfredo.
2014
Table of Contents:
“... Chameleons.- Another Look at the Shoelace TSP: The Case of Very Old Shoes -- Playing Dominoes Is Hard, Except by Yourself.- UNO Gets Easier for a Single Player -- Secure Auctions without Cryptography.- Towards an Algorithmic Guide to Spiral Galaxies -- Competitive...”2014
Full text
20
Cai, Zhipeng.
2014
Table of Contents:
“... Theory and Algorithms -- Theory and Cryptography -- Scheduling Algorithms and Circuit Complexity -- CSoNet....”2014
Full text