241
Security and Trust Management [E-Book] : 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings /
242
Transactions on Data Hiding and Multimedia Security X [E-Book] /
243
Trusted Systems [E-Book] : 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers /
Table of Contents: ...Signature and authentication -- Secure protocols and access control -- Cloud security -- cryptographic aspects -- Software security -- Security analysis -- Secure communication and privacy....

Full text 
244
Innovative Security Solutions for Information Technology and Communications [E-Book] : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers /
Bica, Ion
2015
Table of Contents: ... of Sponge based MAC-PHOTON -- A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption -- A Novel Key Management for Virtually Limitless Key Size -- Efficient Montgomery Multiplication on GPUs -- Applying Cryptographic Acceleration Techniques to Error...

Full text 
245
Applied Cryptography and Network Security [E-Book] : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers /
Table of Contents: ...Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement...

Full text 
246
Information Security and Cryptology - ICISC 2014 [E-Book] : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers /
247
Topics in Cryptology –- CT-RSA 2015 [E-Book] : The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings /
248
Information Security and Cryptology [E-Book] : 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers /
249
Advances in Cryptology -- EUROCRYPT 2015 [E-Book] : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I /
250
Advances in Cryptology - EUROCRYPT 2015 [E-Book] : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II /
Table of Contents: ... Knowledge -- Hosting Services on an Untrusted Cloud -- How to Obfuscate Programs Directly -- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data -- Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World...

Full text 
251
Cryptography and Information Security in the Balkans [E-Book] : First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers /
Table of Contents: ... Architectures Using Trusted Hardware -- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box -- An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform -- Preventing Scaling of Successful Attacks: A Cross-Layer...

Full text 
252
Cryptographic Hardware and Embedded Systems -- CHES 2015 [E-Book] : 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings /
253
Security Standardisation Research [E-Book] : Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings /
254
Genetic Programming [E-Book] : 18th European Conference, EuroGP 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings /
Table of Contents: ... and Question-Answer Ranking in IBM Watson -- Automatic Evolution of Parallel Recursive Programs -- Proposal and Preliminary Investigation of a Fitness Function for Partial Differential Models -- Evolutionary Methods for the Construction of Cryptographic Boolean...

Full text 
255
Data and Applications Security and Privacy XXIX [E-Book] : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings /
Table of Contents: ... Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data....

Full text 
256
Information theory [E-Book] /
Table of Contents: ...8. Theoretical cryptography -- 8.1 Introduction -- 8.2 Cryptographic aspects of computer networks -- 8.3 Principles of cryptography -- 8.4 Information theoretical aspects of cryptography -- 8.5 Mutual information for cryptosystems --...

Full text 
257
Applied Reconfigurable Computing [E-Book] : 11th International Symposium, ARC 2015, Bochum, Germany, April 13-17, 2015, Proceedings /
Table of Contents: ... Management Inside Configurable Regions of Interest in Mesh-Based Networks-on-Chip -- Survey on Real-Time Network-on-Chip Architectures -- Cryptography Applications Efficient SR-Latch PUF -- Hardware Benchmarking of Cryptographic Algorithms Using High-Level...

Full text 
258
Progress in Cryptology - LATINCRYPT 2014 [E-Book] : Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papers /
259
Candidate Multilinear Maps [E-Book]
260
Sequences and Their Applications - SETA 2014 [E-Book] : 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings /
Table of Contents: ...Relationships Between CCZ and EA Equivalence Classes and Corresponding Code Invariants -- Boolean Functions -- Results on Constructions of Rotation Symmetric Bent and Semi-bent Functions -- Properties of a Family of Cryptographic Boolean Functions -- A...

Full text