close
1.

電子ブック

EB
edited by Gunther Pernul, Peter Y A Ryan, Edgar Weippl
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9326
オンライン: http://dx.doi.org/10.1007/978-3-319-24174-6
2.

電子ブック

EB
edited by Gunther Pernul, Peter Y A Ryan, Edgar Weippl
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9327
オンライン: http://dx.doi.org/10.1007/978-3-319-24177-7
3.

電子ブック

EB
edited by Michael Reiter, David Naccache
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9476
オンライン: http://dx.doi.org/10.1007/978-3-319-26823-1
4.

電子ブック

EB
edited by Liqun Chen, Shin'ichiro Matsuo
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9497
オンライン: http://dx.doi.org/10.1007/978-3-319-27152-1
5.

電子ブック

EB
edited by Rosario Gennaro, Matthew Robshaw
出版情報: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9215
オンライン: http://dx.doi.org/10.1007/978-3-662-47989-6
目次情報: 続きを見る
Lattice-based cryptography
Cryptanalytic insights
Modes and constructions
Multilinear maps and IO
Pseudorandomness
Block cipher cryptanalysis
Integrity
Assumptions
Hash functions and stream cipher cryptanalysis
Implementations
Multiparty computation
Zero-knowledge
Theory
Signatures
Non-signaling and information-theoretic crypto
Attribute-based encryption
New primitives
Fully homomorphic/functional encryption
Lattice-based cryptography
Cryptanalytic insights
Modes and constructions
6.

電子ブック

EB
edited by Gilbert Peterson, Sujeet Shenoi
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: IFIP Advances in Information and Communication Technology ; 462
オンライン: http://dx.doi.org/10.1007/978-3-319-24123-4
7.

電子ブック

EB
edited by Diego F. Aranha, Alfred Menezes
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 8895
オンライン: http://dx.doi.org/10.1007/978-3-319-16295-9
目次情報:
Cryptographic Engineering
Privacy
Cryptanalysis
Cryptographic Engineering
Privacy
Cryptanalysis
8.

電子ブック

EB
edited by Raja Naeem Akram, Sushil Jajodia
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9311
オンライン: http://dx.doi.org/10.1007/978-3-319-24018-3
目次情報: 続きを見る
Security and Privacy Services
On Secrecy Amplification Protocols
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols
Private Minutia-based Fingerprint Matching
Secure Resource Sharing and Access Control
Secure Resource Sharing for Embedded Protected Module Architectures
Secure Obfuscation of Authoring Style
DET-ABE: a Java API for data confidentiality and ?fine-grained access control from Attribute Based Encryption
WSACd - A Usable Access Control Framework for Smart Home Devices.-Secure Devices and Execution Environment
Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques
Practical and Privacy-Preserving TEE Migration
Randomizing the Montgomery Powering Ladder
Challenges of Security and Reliability
How Current Android Malware Seeks to Evade Automated Code Analysis
On linkability and malleability in self-blindable credentials
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality
Short Papers
Normalizing Security Events with a Hierarchical Knowledge Base
Attack Tree Generation by Policy Invalidation
Lightweight Password Hashing Scheme for Embedded Systems
Secure and Authenticated Access to LLN Resources Through Policy Constraints
Security and Privacy Services
On Secrecy Amplification Protocols
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
9.

電子ブック

EB
edited by Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9354
オンライン: http://dx.doi.org/10.1007/978-3-319-24126-5
10.

電子ブック

EB
edited by Ion Bica, David Naccache, Emil Simion
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9522
オンライン: http://dx.doi.org/10.1007/978-3-319-27179-8
目次情報: 続きを見る
Authenticated-Encryption: Security Notions, Designs and Applications
New Results on Identity-based Encryption from Quadratic Residuosity
Efficient techniques for extracting secrets from electronic devices
Secure and Trusted Application Execution on Embedded Devices
A Number-Theoretic Error-Correcting Code
Full duplex OTP cryptosystem based on DNA key for text transmissions
Evaluation of Lightweight Block Ciphers for Embedded Systems
SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption
A Novel Key Management for Virtually Limitless Key Size
Efficient Montgomery Multiplication on GPUs
Applying Cryptographic Acceleration Techniques to Error Correction
A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs
Up-high to Down-low: Applying Machine Learning to an Exploit Database
Detecting Computers in the Cyber Space Maliciously Exploited as SSH Proxies
On a Lightweight Authentication Protocol for RFID
Spam Filtering using Automated Classifying Services Over a Cloud Computing Infrastructure
Contributions to Steganographic Techniques on Mobile Devices
Secure implementation of Stream cipher: Trivium
Fast Searching in Image Databases Using Multi-Hash Robust Fingerprinting
Authenticated-Encryption: Security Notions, Designs and Applications
New Results on Identity-based Encryption from Quadratic Residuosity
Efficient techniques for extracting secrets from electronic devices