1
Security of Ubiquitous Computing Systems [E-Book] : Selected Topics /
2
The Quantum Internet [E-Book] : Ultrafast and Safe from Hackers /
3
SOFSEM 2015: Theory and Practice of Computer Science [E-Book] : 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sněžkou, Czech Republic, January 24-29, 2015. Proceedings /
Table of Contents: ... -- Conducting a Web Browsing Behaviour Study – An Educational Scenario -- A Uniform Programmning Language for Implementing XML Standards -- OntoSDM: An Approach to Improve Quality on Spatial Data Mining Algorithms -- Cryptography, Security, and Verification...

Full text 
4
Advances in Cryptology -- EUROCRYPT 2015 [E-Book] : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I /
5
Genetic Programming [E-Book] : 18th European Conference, EuroGP 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings /
6
Information Security and Cryptology [E-Book] : 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers /
7
Public-Key Cryptography -- PKC 2015 [E-Book] : 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings /
Table of Contents: ... Cryptography -- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks -- Pairing-Based Cryptography -- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds -- A Profitable Sub-prime Loan: Obtaining...

Full text 
8
Theory of Cryptography [E-Book] : 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I /
9
Theory of Cryptography [E-Book] : 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II /
10
Principles of Security and Trust [E-Book] : 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings /
Table of Contents: ... Cryptography Framework -- On the Flow of Data, Information, and Time -- Pareto Efficient Solutions of Attack-Defence Trees -- Analysis of XACML Policies with SMT -- Automatically Checking Commitment Protocols in ProVerif without False Attacks -- Generalizing Multi...

Full text 
11
Lightweight Cryptography for Security and Privacy [E-Book] : Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers /
12
Information Security and Privacy [E-Book] : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings /
Table of Contents: ...Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital signatures -- Security protocols -- Privacy protocols -- Symmetric constructions -- Homomorphic encryption and obfuscation....

Full text 
13
Computing and Combinatorics [E-Book] : 21st International Conference, COCOON 2015, Beijing, China, August 4-6, 2015, Proceedings /
Table of Contents: ...Algorithms and data structures -- Algorithmic game theory; approximation algorithms and online algorithms -- Automata, languages, logic and computability -- Complexity theory -- Computational learning theory -- Cryptography, reliability and security...

Full text 
14
Developments in Language Theory [E-Book] : 19th International Conference, DLT 2015, Liverpool, UK, July 27-30, 2015, Proceedings. /
15
Advances in Cryptology -- CRYPTO 2015 [E-Book] : 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I /
Table of Contents: ...Lattice-based cryptography -- Cryptanalytic insights -- Modes and constructions -- Multilinear maps and IO -- Pseudorandomness -- Block cipher cryptanalysis -- Integrity -- Assumptions -- Hash functions and stream cipher cryptanalysis -- Implementations...

Full text 
16
Advances in Cryptology -- CRYPTO 2015 [E-Book] : 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II /
Table of Contents: ...Lattice-based cryptography -- Cryptanalytic insights -- Modes and constructions -- Multilinear maps and IO -- Pseudorandomness -- Block cipher cryptanalysis -- Integrity -- Assumptions -- Hash functions and stream cipher cryptanalysis -- Implementations...

Full text 
17
Codes, Cryptology, and Information Security [E-Book] : First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger /
18
Advances in Cryptology - EUROCRYPT 2015 [E-Book] : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II /
19
Information and Communications Security [E-Book] : 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers /
Table of Contents: ...Security -- Cryptography -- Secure protocols -- Secure applications -- Security proofs -- Secure systems -- Applied cryptography -- Access control -- Privacy protection -- Network security....

Full text 
20
Advances in Information and Computer Security [E-Book] : 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings /