Protocols, Strands, and Logic [E-Book] : Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday /
Table of Contents: ...Cryptography -- Cryptographic Protocols -- Protocol Analysis -- CPSA -- Cybersecurity -- Formal Methods -- Strand Spaces -- Automated Verification -- Model Finding -- Logic -- Attestation -- Accountability -- Differential Privacy -- Quantum Computing...

Full text 
Advances in Cryptology - ASIACRYPT 2021 [E-Book] : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II /
Table of Contents: ... Function Evaluation -- Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation -- Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH -- Reverse Firewalls for Adaptively Secure MPC without Setup -- On Time-Lock Cryptographic...

Full text 
Discrete Mathematics with Cryptographic Applications : A Self-Teaching Introduction [E-Book]
Applied Cryptography in Computer and Communications [E-Book] : First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings /
Security of Ubiquitous Computing Systems [E-Book] : Selected Topics /
Table of Contents: ...Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques...

Full text 
Selected Areas in Cryptography [E-Book] : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers /
Table of Contents: ... on GIFT -- Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath -- Boolean Ring Cryptographic Equation Solving -- Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions -- Unintended Features...

Full text 
Network and System Security [E-Book] : 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings /
Chen, Chao
Table of Contents: ... SDN Network Deployment -- Group Key Exchange Compilers from Generic Key Exchanges -- An architecture for processing a dynamic heterogeneous information network of security intelligence -- The Complexity of Testing Cryptographic Devices on Input Faults -- A...

Full text 
Innovative Security Solutions for Information Technology and Communications [E-Book] : 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers /
Table of Contents: ...Elementary Attestation of Cryptographically Useful Composite Moduli -- Off -the-Shelf Security Testing Platform for Contactless Systems -- A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption -- New...

Full text 
Public-Key Cryptography - PKC 2021 [E-Book] : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part I /
Table of Contents: ... -- On the Integer Polynomial Learning with Errors Problem -- Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments -- Multivariate Public Key Cryptosystem from Sidon Spaces -- Banquet: Short and Fast Signatures from AES -- Cryptographic Primitives...

Full text 
Public-Key Cryptography - PKC 2021 [E-Book] : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part II /
Table of Contents: ...Cryptographic Primitives and Schemes -- More Efficient Digital Signatures with Tight Multi-User Security -- Multiparty Cardinality Testing for Threshold Private Set Intersection -- Verifiable Random Functions with Optimal Tightness -- A Geometric...

Full text 
Advances in Cryptology - EUROCRYPT 2021 [E-Book] : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part I /
Internet of Things, Infrastructures and Mobile Applications [E-Book] : Proceedings of the 13th IMCL Conference /
Table of Contents: ... Narrative Mediator For Enhancing Empathy In Moral Development -- RSSI Fingerprinting Techniques for Indoor Localization Datasets -- Mulsemedia Data Representation Based on Multi-Image Concept -- Cryptographic Systems And Threats In E-commerce -- Work in Progress...

Full text 
Machine Intelligence and Big Data Analytics for Cybersecurity Applications [E-Book] /
Table of Contents: ...-Malware Detection Engine -- Classifying Common Vulnerabilities and Exposures Database Using Text Mining and Graph Theoretical Analysis -- Robust Cryptographical Applications for a Secure Wireless Network Protocol....

Full text 
Advances in Computational Intelligence and Communication Technology [E-Book] : Proceedings of CICT 2019 /
Table of Contents: ... Cryptographic Techniques - A Study -- Chapter 20. Current trends in Cryptography, Steganography and Metamorphic Cryptography: A survey....

Full text 
Advanced Machine Learning Technologies and Applications [E-Book] : Proceedings of AMLTA 2020 /
Table of Contents: ...: Empirical study -- Synchronization Control in Fractional Discrete-Time Systems with Chaotic Hidden Attractors -- Employment of Cryptographic Modus Operandi based on Trigonometric Algorithm and Resistor Color Code -- Experimental & Dimensional Analysis Approach...

Full text 
Data-Centric Business and Applications [E-Book] : ICT Systems-Theory, Radio-Electronics, Information Technologies and Cybersecurity (Volume 5) /
Table of Contents: ... of Entomophages -- Information Technologies for Analysis and Modeling of Computer Network`s Development -- The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments -- Fusion the Coordinate Data of Airborne Objects...

Full text 
Blockchain Technology: Applications and Challenges [E-Book] /
Innovative Systems for Intelligent Health Informatics [E-Book] : Data Science, Health Informatics, Intelligent Systems, Smart Computing /
Table of Contents: ... Cryptographically-based Securing Applica-tive Protocols MQTT and CoAP to Optimize Medical-IOT Supervis-ing Platforms -- Pulmonary Nodule Classification Based on Three Convolutional Neural Networks Models....

Full text 
Modern Cryptography [E-Book] : Applied Mathematics for Encryption and Information Security /
Table of Contents: ... Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS...

Full text 
Privacy and Security Issues in Big Data [E-Book] : An Analytical View on Business Intelligence /
Table of Contents: ... Analysis of Anonymization Techniques -- Standarlization of Big Data and Polices -- Privacy Preserving Cryptographic Model for Big Data Analytics -- Application of Big Data Analytics in Healthcare Industry along with its Security Issues -- An Analytical...

Full text