221
222
223
Lin, Dongdai
2016
Table of Contents:
“...Hash function -- Signature schemes -- Symmetric ciphers -- Elliptic curve and cryptographic fundamentals -- Web and applications security -- Cloud security -- Key management and public key encryption -- Zero knowledge and secure computations -- Software...”2016
Full text
224
Bishop, Matt
2016
Table of Contents:
“...Cryptanalysis -- Cryptographic Protocols -- Network and Systems Security and Access Control -- Privacy and Watermarking -- Software Security -- Encryption, Signatures and Fundamentals....”2016
Full text
225
226
227
228
Bica, Ion
2016
Table of Contents:
“... Set Decoding -- A Cryptographic Approach for Implementing Semantic Web's Trust Layer -- Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret -- Homomorphic Encryption Based On Group Algebras and Goldwasser-Micali...”2016
Full text
229
Hirt, Martin
2016
Table of Contents:
“... for Cryptographic Agents -- Attribute-Based Encryption -- Deniable Attribute Based Encryption for Branching Programs from LWE -- Targeted Homomorphic Attribute-Based Encryption -- Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy -- Functional...”2016
Full text
230
Barreto, Paulo
2016
Table of Contents:
“...Secret sharing -- Quantum cryptography -- Visual cryptography -- Cryptographic protocols.-Entropy, extractors and privacy....”2016
Full text
231
Chi, Chi-Hung
2016
Table of Contents:
“...IoT security -- Cloud security -- Applied cryptography -- Attack behaviour analytics -- Authentication and authorization -- Engineering issues of cryptographic and security systems -- Privacy protection -- Risk evaluation and security -- Key management...”2016
Full text
232
Cheon, Jung Hee
2016
Table of Contents:
“... and Homomorphic Cryptography -- ABE and IBE -- Foundation -- Cryptographic Protocol -- Multi-Party Computation....”2016
Full text
233
Cheon, Jung Hee
2016
Table of Contents:
“... and Homomorphic Cryptography -- ABE and IBE -- Foundation -- Cryptographic Protocol -- Multi-Party Computation....”2016
Full text
234
235
Qiu, Meikang.
2015
Table of Contents:
“...Wireless security and privacy -- Smartphone security -- Systems security.-Applications security -- Security management -- Applied cryptography.-Cryptosystems -- Cryptographic mechanisms -- Security mechanisms -- Mobile and cloud security -- Applications...”2015
Full text
236
Cuppens, Frédéric.
2015
Table of Contents:
“...Privacy -- Software security and malware analysis -- Network security and protocols -- Access control models and policy analysis -- Protocol verification -- Cryptographic technologies....”2015
Full text
237
Böhme, Rainer.
2015
Table of Contents:
“...Sidechannels -- Cryptography in the cloud -- Payment and fraud detection -- Authentication and access control -- Cryptographic primitives -- Mobile security; privacy and incentives -- Applications and attacks -- Authenticated data structures....”2015
Full text
238
Lauter, Kristin.
2015
Table of Contents:
“...Cryptographic Protocols -- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions -- Simulation-Based Secure Functional Encryption in the Random Oracle Model -- The Simplest Protocol for Oblivious Transfer -- Foundations -- Depth Optimized...”2015
Full text
239
Calinescu, Radu.
2015
Table of Contents:
“... by Augmenting Existing Cryptographic Libraries with Specifications -- Specification and Verification of Atomic Operations in GPGPU Programs -- History-based Verification of Functional Behaviour of Concurrent Programs -- Investigating Instrumentation Techniques...”2015
Full text
240