Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Security of Ubiquitous Computing Systems
  • Language: en
  • Pages: 268

Security of Ubiquitous Computing Systems

The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.

Applied Cryptography and Network Security
  • Language: en
  • Pages: 586

Applied Cryptography and Network Security

  • Type: Book
  • -
  • Published: 2014-06-05
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.

Progress in Cryptology – LATINCRYPT 2012
  • Language: en
  • Pages: 323

Progress in Cryptology – LATINCRYPT 2012

  • Type: Book
  • -
  • Published: 2012-08-22
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography.

Information Security
  • Language: en
  • Pages: 522

Information Security

  • Type: Book
  • -
  • Published: 2018-09-03
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.

Provable Security
  • Language: en
  • Pages: 347

Provable Security

  • Type: Book
  • -
  • Published: 2013-10-15
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.

Provable Security
  • Language: en
  • Pages: 337

Provable Security

  • Type: Book
  • -
  • Published: 2012-08-22
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.

Advances in Cryptology – EUROCRYPT 2013
  • Language: en
  • Pages: 736

Advances in Cryptology – EUROCRYPT 2013

  • Type: Book
  • -
  • Published: 2013-05-09
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.

Multi-Agent Systems and Agreement Technologies
  • Language: en
  • Pages: 612

Multi-Agent Systems and Agreement Technologies

This book constitutes the revised post-conference proceedings of the 17th European Conference on Multi-Agent Systems, EUMAS 2020, and the 7th International Conference on Agreement Technologies, AT 2020, which were originally planned to be held as a joint event in Thessaloniki, Greece, in April 2020. Due to COVID-19 pandemic the conference was postponed to September 2020 and finally became a fully virtual conference. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 53 submissions. The papers report on both early and mature research and cover a wide range of topics in the field of autonomous agents and multi-agent systems.

Information Security and Cryptology
  • Language: en
  • Pages: 547

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2015-03-27
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.

Applied Cryptography and Network Security
  • Language: en
  • Pages: 572

Applied Cryptography and Network Security

  • Type: Book
  • -
  • Published: 2013-06-21
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.