the proceedings contain 27 papers. the special focus in this conference is on theory and application of Cryptographic Techniques. the topics include: On privacy homomorphisms;an Improved Protocol for Demonstrating Pos...
ISBN:
(纸本)9783540191025
the proceedings contain 27 papers. the special focus in this conference is on theory and application of Cryptographic Techniques. the topics include: On privacy homomorphisms;an Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations;a public key analog gyptosystem;message authentication with arbitration of transmitter/receiver disputes;perfect and essentially perfect authentication schemes;message authentication and dynamic passwords;IC-cards in high-securityapplications;collision free hash functions and public key signature schemes;alternating step generators controlled by de Bruijn sequences;hash-functions using modulo-n operations;blinding for unanticipated signatures;non-expanding, key-minimal, robustly-perfect, linear and bilinear ciphers;linear structures in blockciphers;Fast data encipherment algorithm FEAL;modes of blockcipher algorithms and their protection against active eavesdropping;security considerations in the design and implementation of a new DES chip;high-performance interface architectures for cryptographic hardware;generation of binary sequences with controllable complexity and ideal r-tupel distribution;some remarks on the cross correlation analysis of pseudo random generators;sequences with almost perfect linear complexity profile;when shift registers clock themselves;finite state machine modelling of cryptographic systems in loops;random sources for cryptographic systems;physical protection of cryptographic devices.
this conferenceproceedings contains 129 papers. Various aspects of computer communications are presented: computer networks, communication methods, computers, office message systems, public networks, satellite commun...
详细信息
this conferenceproceedings contains 129 papers. Various aspects of computer communications are presented: computer networks, communication methods, computers, office message systems, public networks, satellite communication networks, privacy and security of communications technology, electronic fund transfers, organization of office terminals, international data flows, standardization of networks, modeling of network performance, internetting technology and economic and sociological aspects of communication technologies. Various networking protocols are described. Technical and professional papers from this conference are indexed withthe conference code no. 00069 in the Ei Engineering Meetings (TM) database produced by Engineering Information, Inc.
this conferenceproceedings contains 129 papers. Various aspects of computer communications are presented: computer networks, communication methods, computers, office message systems, public networks, satellite commun...
详细信息
this conferenceproceedings contains 129 papers. Various aspects of computer communications are presented: computer networks, communication methods, computers, office message systems, public networks, satellite communication networks, privacy and security of communications technology, electronic fund transfers, organization of office terminals, international data flows, standardization of networks, modeling of network performance, internetting technology and economic and sociological aspects of communication technologies. Various networking protocols are described. Technical and professional papers from this conference are indexed withthe conference code no. 00069 in the Ei Engineering Meetings (TM) database produced by Engineering Information, Inc.
the design, installation, and maintenance of subsurface and surface safety systems for offshore production platforms require a comprehensive record-keeping program. OCS Orders issued by the U. S. Geological Survey for...
详细信息
Recently a vast amount of publicity and concern has been given to the problems associated withsecurity and privacy in computer systems. there has been legislation proposed and passed which attempts to provide safegua...
详细信息
ISBN:
(纸本)9781450374040
Recently a vast amount of publicity and concern has been given to the problems associated withsecurity and privacy in computer systems. there has been legislation proposed and passed which attempts to provide safeguards for the storage of data-what is to be stored, who may have access to the data and for what purpose the data is to be stored and/or accessed. Much of the publicity and legislation has been aimed at the legal and what I would call the "moral" side of computer security and privacy. However, there are really two sides to this problem. the first of these is the legal/moral one and the other is the physical/technological side.
Popular definitions of privacy and security have often been given as: privacy-the rights of individuals regarding the collection, storage, use and dissemination of personal information pertaining to them. security-the...
详细信息
this book constitutes the refereed post-conferenceproceedings of the 5th International Workshop on Lightweight Cryptography for security and privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016.
ISBN:
(数字)9783319557144
ISBN:
(纸本)9783319557137
this book constitutes the refereed post-conferenceproceedings of the 5th International Workshop on Lightweight Cryptography for security and privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016.
the two-volume set CCIS 1896 and 1897 constitutes the refereed post-conferenceproceedings of the 5th International conference on Blockchain and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China d...
详细信息
ISBN:
(数字)9789819981045
ISBN:
(纸本)9789819981038
the two-volume set CCIS 1896 and 1897 constitutes the refereed post-conferenceproceedings of the 5th International conference on Blockchain and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China during August 8–10, 2023. the 45 revised full papers presented in these proceedings were carefully reviewed and selected from 93 submissions. the papers are organized in the following topical sections:;Part I: Anomaly detection on blockchain; edge intelligence and metaverse services; blockchain system security; empirical study and surveys; federated learning for blockchain.;Part II: AI for blockchain; blockchain applications; blockchain architecture and optimization; protocols and consensus.
this book constitutes the refereed proceedings of two workshops held at the 13th International conference on security and privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in Octo...
详细信息
ISBN:
(数字)9783319788166
ISBN:
(纸本)9783319788159
this book constitutes the refereed proceedings of two workshops held at the 13th International conference on security and privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on applications and Techniques in Cyber security, ATCS 2017, and the First Workshop on security and privacy in the Internet Of things, SePrIoT 2017.;the 22 revised regular papers were carefully reviewed and selected from 105 submissions. the topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more.;the SePrIoT workshop targets to address novel approaches in security and privacy. the papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.
this book constitutes the proceedings of the 5th International conference on Financial Technology, ICFT 2024, held in Singapore during September 23–25, 2024.the 17 full papers presented in this volume were ...
详细信息
ISBN:
(数字)9789819638116
ISBN:
(纸本)9789819638109
this book constitutes the proceedings of the 5th International conference on Financial Technology, ICFT 2024, held in Singapore during September 23–25, 2024.
the 17 full papers presented in this volume were carefully reviewed and selected from 35 submissions. these papers focus on the current research in Blockchain technology, Financial technology and the application of Artificial Intelligence in these areas.
暂无评论