281
282
Abadi, Martin
2014
Table of Contents:
“... Framework for the Cryptographic Verification of Java Programs -- Compiling CAO: From Cryptographic Specifications to C Implementations -- Decentralized Composite Access Control -- Temporal Logics for Hyperproperties -- Time-Dependent Analysis of Attacks....”2014
Full text
283
284
Cuzzocrea, Alfredo.
2013
Table of Contents:
“...Symmetric-key cryptography -- Public-key cryptography -- Algorithmic cryptanalysis -- Software and hardware implementation of cryptographic algorithms -- Database encryption -- Interaction between cryptographic theory and implementation issues -- Cyber...”2013
Full text
285
Table of Contents:
“...Cryptographic Schemas and Protocols -- Efficient Public Key Encryption Admitting Decryption by Sender -- Public Key Infrastructure -- How to Avoid the Breakdown of Public Key Infrastructures Forward Secure Signatures for Certificate Authorities...”
Full text
Full text
286
Sakiyama, Kazuo.
2013
Table of Contents:
“... -- Unconditionally Secure Oblivious Transfer from Real Network Behavior -- Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption -- Public Key Cryptosystems -- Efficient Algorithm for Tate Pairing of Composite Order...”2013
Full text
287
Fischlin, Marc.
2013
Table of Contents:
“...Personal Tributes -- Computational Number Theory -- Hardness of Cryptographic Assumptions -- Hardware Security -- Privacy and Security -- Application Security....”2013
Full text
288
Sako, Kazue.
2013
Table of Contents:
“...Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash...”2013
Full text
289
Sako, Kazue.
2013
Table of Contents:
“...Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash...”2013
Full text
290
Mustofa, Khabib.
2013
Table of Contents:
“... Information Leakage on Social Network Services: A Case Study on Twitter.-Â On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).-Â DiffSig: Resource Differentiation Based Malware Behavioral Concise...”2013
Full text
291
Table of Contents:
“... Unification Paradigm for Cryptographic Protocol Analysis -- Hierarchical Combination -- PRocH: Proof Reconstruction for HOL Light -- An Improved BDD Method for Intuitionistic Propositional Logic: BDDIntKt System Description -- Towards Modularly Comparing Programs...”
Full text
Full text
292
293
Hancock, Edwin.
2013
Table of Contents:
“... -- On the Dissimilarity Representation and Prototype Selection for Signature-Based Bio-cryptographic Systems -- A Repeated Local Search Algorithm for BiClustering of Gene Expression Data....”2013
Full text
294
295
296
Kwon, Taekyoung.
2013
Table of Contents:
“...Attack and defense -- Software and Web security -- Cryptanalysis -- Cryptographic protocol -- Identity-based encryption -- Efficient implementation -- Cloud computing security -- Side channel analysis -- Digital signature -- Privacy enhancement....”2013
Full text
297
Deng, Robert H.
2013
Table of Contents:
“... with Message Recovery -- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme -- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures -- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release -- About Hash...”2013
Full text
298
Johansson, Thomas.
2013
Table of Contents:
“... Power Residue Symbols -- Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions -- How to Watermark Cryptographic Functions -- Security Evaluations beyond Computing Power: How to Analyze Side-Channel Attacks You Cannot Mount...”2013
Full text
299
Cavallaro, Lorenzo.
2013
Table of Contents:
“...Cryptography and Cryptanalysis -- Multiplicative Homomorphic E-Auction with Formally Provable Security -- Malleable Signatures for Resource Constrained Platforms -- Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks -- Mobile Security...”2013
Full text
300