This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers inc...
详细信息
ISBN:
(数字)9783642383489
ISBN:
(纸本)9783642383472
This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013.
The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on data and Applications security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full ...
详细信息
ISBN:
(数字)9783642223488
ISBN:
(纸本)9783642223471
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on data and Applications security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011.
The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.
This book discusses recent advances in computer and computational sciences from upcoming researchers and leading academics around the globe. It presents high-quality, peer-reviewed papers presented at the Internationa...
详细信息
ISBN:
(数字)9789811544095
ISBN:
(纸本)9789811544088
This book discusses recent advances in computer and computational sciences from upcoming researchers and leading academics around the globe. It presents high-quality, peer-reviewed papers presented at the International Conference on Computer, Communication and Computational Sciences (IC4S 2019), which was held on 11—12 October 2019 in Bangkok. Covering a broad range of topics, including intelligent hardware and software design, advanced communications, intelligent computing techniques, intelligent image processing, the Web and informatics, it offers readers from the computer industry and academia key insights into how the advances in next-generation computer and communication technologies can be shaped into real-life applications.
This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and in...
详细信息
ISBN:
(数字)9781447164524
ISBN:
(纸本)9781447164517;9781447172529
This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of expert researchers and practitioners. Features: presents a focus on security and access control mechanisms for cloud environments, analyses standards and brokerage services, and investigates the role of certification for cloud adoption; evaluates cloud ERP, suggests a framework for implementing “big data” science, and proposes an approach for cloud interoperability; reviews existing elasticity management solutions, discusses the relationship between cloud management and governance, and describes the development of a cloud service capability assessment model; examines cloud applications in higher education, including the use of knowledge-as-a-service in the provision of education, and cloud-based e-learning for students with disabilities.
Angesichts der immer weiter zunehmenden Vernetzung mit Computern erhält die Informationssicherheit und damit die Kryptographie eine immer größere Bedeutung. Kryptographische Verfahren dienen dazu, kompl...
详细信息
ISBN:
(数字)9783322928481
Angesichts der immer weiter zunehmenden Vernetzung mit Computern erhält die Informationssicherheit und damit die Kryptographie eine immer größere Bedeutung. Kryptographische Verfahren dienen dazu, komplexe Probleme im Bereich der Informationssicherheit mit Hilfe kryptographischer Algorithmen in überschaubarer Weise zu lösen. Die Entwicklung und Analyse von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Große Berühmtheit erlangt haben die sogenannten "Zero-Knowledge-Protokolle", mit denen es gelingt, einen anderen von der Existenz eines Geheimnisses zu überzeugen, ohne ihm das Geringste zu verraten. In diesem Buch werden die wichtigsten Verfahren der letzten Jahrzehnte amüsant, anschaulich, gründlich und mit vielen Illustrationen dargestellt.
暂无评论