close
1.

電子ブック

EB
edited by Dongdai Lin, Moti Yung, Jianying Zhou
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 8957
オンライン: http://dx.doi.org/10.1007/978-3-319-16745-9
目次情報: 続きを見る
An Efficient Privacy-Preserving E-coupon System
Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications
Security of Direct Anonymous Authentication Using TPM 2.0 Signature
Revocation in Publicly Verifiable Outsourced Computation
Private Aggregation with Custom Collusion Tolerance
Ring Signatures of Constant Size Without Random Oracles
Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control
Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge
A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC
Optimal Proximity Proofs
Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions
Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization
Fully Homomorphic Encryption with Auxiliary Inputs
Trapdoors for Ideal Lattices with Applications
Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails
The Boomerang Attacks on BLAKE and BLAKE2
Second Preimage Analysis of Whirlwind
Boomerang Attack on Step-Reduced SHA-512
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
Rig: A Simple, Secure and Flexible Design for Password Hashing
Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks
Parallelized Software Implementation of Elliptic Curve Scalar Multiplication
A Note on Diem’s Proof
Stand-by Attacks on E-ID Password Authentication
Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
A Lightweight Security Isolation Approach for Virtual Machines Deployment
A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors
An Efficient Privacy-Preserving E-coupon System
Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications
Security of Direct Anonymous Authentication Using TPM 2.0 Signature
2.

電子ブック

EB
edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9408
オンライン: http://dx.doi.org/10.1007/978-3-319-25645-0
目次情報: 続きを見る
Wireless security and privacy
Smartphone security
Systems security.-Applications security
Security management
Applied cryptography.-Cryptosystems
Cryptographic mechanisms
Security mechanisms
Mobile and cloud security
Applications and network security
Wireless security and privacy
Smartphone security
Systems security.-Applications security
3.

電子ブック

EB
edited by Moti Yung, Liehuang Zhu, Yanjiang Yang
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9473
オンライン: http://dx.doi.org/10.1007/978-3-319-27998-5
目次情報: 続きを見る
Signature and authentication
Secure protocols and access control
Cloud security
cryptographic aspects
Software security
Security analysis
Secure communication and privacy
Signature and authentication
Secure protocols and access control
Cloud security