221
Advances in Cryptology – EUROCRYPT 2016 [E-Book] : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I /
222
Advances in Cryptology – EUROCRYPT 2016 [E-Book] : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II /
223
Information Security and Cryptology [E-Book] : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers /
Table of Contents: ...Hash function -- Signature schemes -- Symmetric ciphers -- Elliptic curve and cryptographic fundamentals -- Web and applications security -- Cloud security -- Key management and public key encryption -- Zero knowledge and secure computations -- Software...

Full text 
224
Information Security [E-Book] : 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings /
Table of Contents: ...Cryptanalysis -- Cryptographic Protocols -- Network and Systems Security and Access Control -- Privacy and Watermarking -- Software Security -- Encryption, Signatures and Fundamentals....

Full text 
225
Theory of Cryptography [E-Book] : 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I /
226
Progress in Cryptology – AFRICACRYPT 2016 [E-Book] : 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings /
227
Cryptographic Hardware and Embedded Systems – CHES 2016 [E-Book] : 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings /
228
Innovative Security Solutions for Information Technology and Communications [E-Book] : 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers /
Bica, Ion
2016
Table of Contents: ... Set Decoding -- A Cryptographic Approach for Implementing Semantic Web's Trust Layer -- Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret -- Homomorphic Encryption Based On Group Algebras and Goldwasser-Micali...

Full text 
229
Theory of Cryptography [E-Book] : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II /
Table of Contents: ... for Cryptographic Agents -- Attribute-Based Encryption -- Deniable Attribute Based Encryption for Branching Programs from LWE -- Targeted Homomorphic Attribute-Based Encryption -- Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy -- Functional...

Full text 
230
Information Theoretic Security [E-Book] : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers /
Table of Contents: ...Secret sharing -- Quantum cryptography -- Visual cryptography -- Cryptographic protocols.-Entropy, extractors and privacy....

Full text 
231
Information and Communications Security [E-Book] : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings /
Table of Contents: ...IoT security -- Cloud security -- Applied cryptography -- Attack behaviour analytics -- Authentication and authorization -- Engineering issues of cryptographic and security systems -- Privacy protection -- Risk evaluation and security -- Key management...

Full text 
232
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I /
Table of Contents: ... and Homomorphic Cryptography -- ABE and IBE -- Foundation -- Cryptographic Protocol -- Multi-Party Computation....

Full text 
233
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II /
Table of Contents: ... and Homomorphic Cryptography -- ABE and IBE -- Foundation -- Cryptographic Protocol -- Multi-Party Computation....

Full text 
234
Topics in Cryptology - CT-RSA 2016 [E-Book] : The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings /
235
Network and System Security [E-Book] : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings /
Table of Contents: ...Wireless security and privacy -- Smartphone security -- Systems security.-Applications security -- Security management -- Applied cryptography.-Cryptosystems -- Cryptographic mechanisms -- Security mechanisms -- Mobile and cloud security -- Applications...

Full text 
236
Foundations and Practice of Security [E-Book] : 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers /
Table of Contents: ...Privacy -- Software security and malware analysis -- Network security and protocols -- Access control models and policy analysis -- Protocol verification -- Cryptographic technologies....

Full text 
237
Financial Cryptography and Data Security [E-Book] : 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers /
Table of Contents: ...Sidechannels -- Cryptography in the cloud -- Payment and fraud detection -- Authentication and access control -- Cryptographic primitives -- Mobile security; privacy and incentives -- Applications and attacks -- Authenticated data structures....

Full text 
238
Progress in Cryptology -- LATINCRYPT 2015 [E-Book] : 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings /
Table of Contents: ...Cryptographic Protocols -- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions -- Simulation-Based Secure Functional Encryption in the Random Oracle Model -- The Simplest Protocol for Oblivious Transfer -- Foundations -- Depth Optimized...

Full text 
239
Software Engineering and Formal Methods [E-Book] : 13th International Conference, SEFM 2015, York, UK, September 7-11, 2015. Proceedings /
Table of Contents: ... by Augmenting Existing Cryptographic Libraries with Specifications -- Specification and Verification of Atomic Operations in GPGPU Programs -- History-based Verification of Functional Behaviour of Concurrent Programs -- Investigating Instrumentation Techniques...

Full text 
240
Security, Privacy, and Applied Cryptography Engineering [E-Book] : 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings /