1
2
3
Table of Contents:
“... -- Conducting a Web Browsing Behaviour Study – An Educational Scenario -- A Uniform Programmning Language for Implementing XML Standards -- OntoSDM: An Approach to Improve Quality on Spatial Data Mining Algorithms -- Cryptography, Security, and Verification...”
Full text
Full text
4
5
6
7
Katz, Jonathan.
2015
Table of Contents:
“... Cryptography -- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks -- Pairing-Based Cryptography -- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds -- A Profitable Sub-prime Loan: Obtaining...”2015
Full text
8
9
10
Focardi, Riccardo.
2015
Table of Contents:
“... Cryptography Framework -- On the Flow of Data, Information, and Time -- Pareto Efficient Solutions of Attack-Defence Trees -- Analysis of XACML Policies with SMT -- Automatically Checking Commitment Protocols in ProVerif without False Attacks -- Generalizing Multi...”2015
Full text
11
12
Foo, Ernest.
2015
Table of Contents:
“...Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital signatures -- Security protocols -- Privacy protocols -- Symmetric constructions -- Homomorphic encryption and obfuscation....”2015
Full text
13
Du, Dingzhu.
2015
Table of Contents:
“...Algorithms and data structures -- Algorithmic game theory; approximation algorithms and online algorithms -- Automata, languages, logic and computability -- Complexity theory -- Computational learning theory -- Cryptography, reliability and security...”2015
Full text
14
15
Gennaro, Rosario.
2015
Table of Contents:
“...Lattice-based cryptography -- Cryptanalytic insights -- Modes and constructions -- Multilinear maps and IO -- Pseudorandomness -- Block cipher cryptanalysis -- Integrity -- Assumptions -- Hash functions and stream cipher cryptanalysis -- Implementations...”2015
Full text
16
Gennaro, Rosario.
2015
Table of Contents:
“...Lattice-based cryptography -- Cryptanalytic insights -- Modes and constructions -- Multilinear maps and IO -- Pseudorandomness -- Block cipher cryptanalysis -- Integrity -- Assumptions -- Hash functions and stream cipher cryptanalysis -- Implementations...”2015
Full text
17
18
19
Hui, Lucas C. K.
2015
Table of Contents:
“...Security -- Cryptography -- Secure protocols -- Secure applications -- Security proofs -- Secure systems -- Applied cryptography -- Access control -- Privacy protection -- Network security....”2015
Full text
20