close
1.

電子ブック

EB
edited by Gunther Pernul, Peter Y A Ryan, Edgar Weippl
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9326
オンライン: http://dx.doi.org/10.1007/978-3-319-24174-6
2.

電子ブック

EB
edited by Gunther Pernul, Peter Y A Ryan, Edgar Weippl
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9327
オンライン: http://dx.doi.org/10.1007/978-3-319-24177-7
3.

電子ブック

EB
edited by Rosario Gennaro, Matthew Robshaw
出版情報: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9215
オンライン: http://dx.doi.org/10.1007/978-3-662-47989-6
目次情報: 続きを見る
Lattice-based cryptography
Cryptanalytic insights
Modes and constructions
Multilinear maps and IO
Pseudorandomness
Block cipher cryptanalysis
Integrity
Assumptions
Hash functions and stream cipher cryptanalysis
Implementations
Multiparty computation
Zero-knowledge
Theory
Signatures
Non-signaling and information-theoretic crypto
Attribute-based encryption
New primitives
Fully homomorphic/functional encryption
Lattice-based cryptography
Cryptanalytic insights
Modes and constructions
4.

電子ブック

EB
edited by Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9354
オンライン: http://dx.doi.org/10.1007/978-3-319-24126-5
5.

電子ブック

EB
edited by Ion Bica, David Naccache, Emil Simion
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9522
オンライン: http://dx.doi.org/10.1007/978-3-319-27179-8
目次情報: 続きを見る
Authenticated-Encryption: Security Notions, Designs and Applications
New Results on Identity-based Encryption from Quadratic Residuosity
Efficient techniques for extracting secrets from electronic devices
Secure and Trusted Application Execution on Embedded Devices
A Number-Theoretic Error-Correcting Code
Full duplex OTP cryptosystem based on DNA key for text transmissions
Evaluation of Lightweight Block Ciphers for Embedded Systems
SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption
A Novel Key Management for Virtually Limitless Key Size
Efficient Montgomery Multiplication on GPUs
Applying Cryptographic Acceleration Techniques to Error Correction
A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs
Up-high to Down-low: Applying Machine Learning to an Exploit Database
Detecting Computers in the Cyber Space Maliciously Exploited as SSH Proxies
On a Lightweight Authentication Protocol for RFID
Spam Filtering using Automated Classifying Services Over a Cloud Computing Infrastructure
Contributions to Steganographic Techniques on Mobile Devices
Secure implementation of Stream cipher: Trivium
Fast Searching in Image Databases Using Multi-Hash Robust Fingerprinting
Authenticated-Encryption: Security Notions, Designs and Applications
New Results on Identity-based Encryption from Quadratic Residuosity
Efficient techniques for extracting secrets from electronic devices
6.

電子ブック

EB
edited by Riccardo Focardi, Andrew Myers
出版情報: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9036
オンライン: http://dx.doi.org/10.1007/978-3-662-46666-7
目次情報: 続きを見る
Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control
Very Static Enforcement of Dynamic Policies
The Foundational Cryptography Framework
On the Flow of Data, Information, and Time
Pareto Efficient Solutions of Attack-Defence Trees
Analysis of XACML Policies with SMT
Automatically Checking Commitment Protocols in ProVerif without False Attacks
Generalizing Multi-party Contract Signing
Leakiness is Decidable for Well-Founded Protocols
Abstractions for Security Protocol Verification
Automated Backward Analysis of PKCS#11 v2.20
A Safe Update Mechanism for Smart Cards
Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols
Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques
Type-Based Verification of Electronic Voting Protocols
Composing Security Protocols: From Confidentiality to Privacy
PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law
Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control
Very Static Enforcement of Dynamic Policies
7.

電子ブック

EB
edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten
出版情報: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015
シリーズ名: Communications in Computer and Information Science ; 557
オンライン: http://dx.doi.org/10.1007/978-3-662-48683-2
8.

電子ブック

EB
edited by Tran Khanh Dang, Roland Wagner, Josef Kung, Nam Thoai, Makoto Takizawa, Erich Neuhold
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9446
オンライン: http://dx.doi.org/10.1007/978-3-319-26135-5
9.

電子ブック

EB
edited by Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9483
オンライン: http://dx.doi.org/10.1007/978-3-319-27051-7
目次情報: 続きを見る
Data Security
System Security
Cloud Platform
and Data Analysis in Cloud
Data Security
System Security
Cloud Platform
10.

電子ブック

EB
edited by Giuseppe F. Italiano, Tiziana Margaria-Steffen, Jaroslav Pokorny, Jean-Jacques Quisquater, Roger Wattenhofer
出版情報: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 8939
オンライン: http://dx.doi.org/10.1007/978-3-662-46078-8
目次情報: 続きを見る
Keynote Talk
What is Computation: An Epistemic Approach
Foundations of Computer Science
Progress (and Lack Thereof) for Graph Coloring Approximation Problems
Recent Results in Scalable Multi-Party Computation
Online Bipartite Matching in Offline Time (Abstract)
Software & Web Engineering
Quo Vadis Explicit-State Model Checking
The Dos and Dont’s of Crowdsourcing Software Development
Data, Information and Knowledge Engineering
Adaptively Approximate Techniques in Distributed Architectures
Back to the Future ? Should SQL Surrender to SPARQL?
Balancing Energy Consumption for the Establishment of Multi-interface Networks
The Maximum k-Differential Coloring Problem
Exact Algorithms for 2-clustering with Size Constraints in the Euclidean Plane
Local Routing in Convex Subdivisions
Nondeterministic Modal Interfaces
Group Search on the Line
Online Makespan Scheduling with Sublinear Advice
Deterministic Rendezvous in Restricted Graphs
Fastest, Average and Quantile Schedule
Machine Characterizations for Parameterized Complexity Classes Beyond Para-NP
Maximally Permissive Controlled System Synthesis for Modal Logic
Approximation Hardness of the Cross-Species Conserved Active Modules Detection Problem
Finding Highly Connected Subgraphs
Fixing Improper Colorings of Graphs
Efficient Online Strategies for Renting Servers in the Cloud
Palk is Linear Recognizable Online
Two Grammatical Equivalents of Flip-Pushdown Automata
On the Hierarchy Classes of Finite Ultrametric Automata
Nash-Williams-type and Chvat´al-type Conditions in One-Conflict Graphs. -Optimal State Reductions of Automata with Partially Specified Behaviors. -Quantum Pushdown Automata with a Garbage Tape
Towards a Characterization of Leaf Powers by Clique Arrangements
Filling Logarithmic Gaps in Distributed Complexity for Global Problems
On Visibly Pushdown Trace Languages
Dominating an s-t-Cut in a Network
Lower Bounds for Linear Decision Trees with Bounded Weights
A Model-Driven Approach to Generate External DSLs from Object-Oriented APIs
Function Based Requirements Engineering and Design ? Towards Efficient and Transparent Plant Engineering
Software Developer Activity as a Source for Identifying Hidden Source Code Dependencies
Discovering Motifs in Real-World Social Networks
Data, Information, and Knowledge Engineering
Exploiting Semantic Activity Labels to Facilitate Consistent Specialization of Abstract Process Activities
Efficient Similarity Search by Combining Indexing and Caching Strategies
Retrieving Documents Related to Database Queries
Advantages of Dependency Parsing for Free Word Order Natural Languages
Detecting Identical Entities in the Semantic Web Data
Conducting a Web Browsing Behaviour Study ? An Educational Scenario
A Uniform Programmning Language for Implementing XML Standards
OntoSDM: An Approach to Improve Quality on Spatial Data Mining Algorithms
Cryptography, Security, and Verification
Attribute-Based Encryption Optimized for Cloud Computing
Trustworthy Virtualization of the ARMv7 Memory Subsystem
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds
Java Loops Are Mainly Polynomial
Keynote Talk
What is Computation: An Epistemic Approach
Foundations of Computer Science