281
Decision and Game Theory for Security [E-Book] : 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings /
282
Principles of security and trust : third international conference, POST 2014, held as part of the european joint conferences on theory and practice of software, ETAPS 2014, Grenoble, France, April 5-13, 2014, proceedings [E-Book] /
Table of Contents: ... Framework for the Cryptographic Verification of Java Programs -- Compiling CAO: From Cryptographic Specifications to C Implementations -- Decentralized Composite Access Control -- Temporal Logics for Hyperproperties -- Time-Dependent Analysis of Attacks....

Full text 
283
Trust Extension As a Mechanism for Secure Code Execution on Commodity Computers [E-Book]
284
Security Engineering and Intelligence Informatics [E-Book] : CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings /
Table of Contents: ...Symmetric-key cryptography -- Public-key cryptography -- Algorithmic cryptanalysis -- Software and hardware implementation of cryptographic algorithms -- Database encryption -- Interaction between cryptographic theory and implementation issues -- Cyber...

Full text 
285
Public Key Infrastructures, Services and Applications [E-Book] : 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers /
Table of Contents: ...Cryptographic Schemas and Protocols -- Efficient Public Key Encryption Admitting Decryption by Sender -- Public Key Infrastructure -- How to Avoid the Breakdown of Public Key Infrastructures Forward Secure Signatures for Certificate Authorities...

Full text 
286
Advances in Information and Computer Security [E-Book] : 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings /
Table of Contents: ... -- Unconditionally Secure Oblivious Transfer from Real Network Behavior -- Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption -- Public Key Cryptosystems -- Efficient Algorithm for Tate Pairing of Composite Order...

Full text 
287
Number Theory and Cryptography [E-Book] : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday /
Table of Contents: ...Personal Tributes -- Computational Number Theory -- Hardness of Cryptographic Assumptions -- Hardware Security -- Privacy and Security -- Application Security....

Full text 
288
Advances in Cryptology - ASIACRYPT 2013 [E-Book] : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I /
Table of Contents: ...Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash...

Full text 
289
Advances in Cryptology - ASIACRYPT 2013 [E-Book] : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II /
Table of Contents: ...Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash...

Full text 
290
Information and Communicatiaon Technology [E-Book] : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings /
Table of Contents: ... Information Leakage on Social Network Services: A Case Study on Twitter.- On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).- DiffSig: Resource Differentiation Based Malware Behavioral Concise...

Full text 
291
Automated Deduction – CADE-24 [E-Book] : 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013. Proceedings /
Table of Contents: ... Unification Paradigm for Cryptographic Protocol Analysis -- Hierarchical Combination -- PRocH: Proof Reconstruction for HOL Light -- An Improved BDD Method for Intuitionistic Propositional Logic: BDDIntKt System Description -- Towards Modularly Comparing Programs...

Full text 
292
Post-Quantum Cryptography [E-Book] : 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings /
293
Similarity-Based Pattern Recognition [E-Book] : Second International Workshop, SIMBAD 2013, York, UK, July 3-5, 2013. Proceedings /
Table of Contents: ... -- On the Dissimilarity Representation and Prototype Selection for Signature-Based Bio-cryptographic Systems -- A Repeated Local Search Algorithm for BiClustering of Gene Expression Data....

Full text 
294
Constructive Side-Channel Analysis and Secure Design [E-Book] : 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers /
295
Cryptographic Hardware and Embedded Systems - CHES 2013 [E-Book] : 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings /
296
Information Security and Cryptology – ICISC 2012 [E-Book] : 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers /
Table of Contents: ...Attack and defense -- Software and Web security -- Cryptanalysis -- Cryptographic protocol -- Identity-based encryption -- Efficient implementation -- Cloud computing security -- Side channel analysis -- Digital signature -- Privacy enhancement....

Full text 
297
Information Security Practice and Experience [E-Book] : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings /
Table of Contents: ... with Message Recovery -- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme -- Cryptographic Primitives Accountable Trapdoor Sanitizable Signatures -- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release -- About Hash...

Full text 
298
Advances in Cryptology – EUROCRYPT 2013 [E-Book] : 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings /
Table of Contents: ... Power Residue Symbols -- Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions -- How to Watermark Cryptographic Functions -- Security Evaluations beyond Computing Power: How to Analyze Side-Channel Attacks You Cannot Mount...

Full text 
299
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems [E-Book] : 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings /
Table of Contents: ...Cryptography and Cryptanalysis -- Multiplicative Homomorphic E-Auction with Formally Provable Security -- Malleable Signatures for Resource Constrained Platforms -- Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks -- Mobile Security...

Full text 
300
Progress in Cryptology – AFRICACRYPT 2013 [E-Book] : 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings /