close
1.

電子ブック

EB
edited by Gunther Pernul, Peter Y A Ryan, Edgar Weippl
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9326
オンライン: http://dx.doi.org/10.1007/978-3-319-24174-6
2.

電子ブック

EB
edited by Gunther Pernul, Peter Y A Ryan, Edgar Weippl
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9327
オンライン: http://dx.doi.org/10.1007/978-3-319-24177-7
3.

電子ブック

EB
edited by Rosario Gennaro, Matthew Robshaw
出版情報: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9215
オンライン: http://dx.doi.org/10.1007/978-3-662-47989-6
目次情報: 続きを見る
Lattice-based cryptography
Cryptanalytic insights
Modes and constructions
Multilinear maps and IO
Pseudorandomness
Block cipher cryptanalysis
Integrity
Assumptions
Hash functions and stream cipher cryptanalysis
Implementations
Multiparty computation
Zero-knowledge
Theory
Signatures
Non-signaling and information-theoretic crypto
Attribute-based encryption
New primitives
Fully homomorphic/functional encryption
Lattice-based cryptography
Cryptanalytic insights
Modes and constructions
4.

電子ブック

EB
edited by Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9354
オンライン: http://dx.doi.org/10.1007/978-3-319-24126-5
5.

電子ブック

EB
edited by Ion Bica, David Naccache, Emil Simion
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9522
オンライン: http://dx.doi.org/10.1007/978-3-319-27179-8
目次情報: 続きを見る
Authenticated-Encryption: Security Notions, Designs and Applications
New Results on Identity-based Encryption from Quadratic Residuosity
Efficient techniques for extracting secrets from electronic devices
Secure and Trusted Application Execution on Embedded Devices
A Number-Theoretic Error-Correcting Code
Full duplex OTP cryptosystem based on DNA key for text transmissions
Evaluation of Lightweight Block Ciphers for Embedded Systems
SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption
A Novel Key Management for Virtually Limitless Key Size
Efficient Montgomery Multiplication on GPUs
Applying Cryptographic Acceleration Techniques to Error Correction
A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs
Up-high to Down-low: Applying Machine Learning to an Exploit Database
Detecting Computers in the Cyber Space Maliciously Exploited as SSH Proxies
On a Lightweight Authentication Protocol for RFID
Spam Filtering using Automated Classifying Services Over a Cloud Computing Infrastructure
Contributions to Steganographic Techniques on Mobile Devices
Secure implementation of Stream cipher: Trivium
Fast Searching in Image Databases Using Multi-Hash Robust Fingerprinting
Authenticated-Encryption: Security Notions, Designs and Applications
New Results on Identity-based Encryption from Quadratic Residuosity
Efficient techniques for extracting secrets from electronic devices
6.

電子ブック

EB
edited by Riccardo Focardi, Andrew Myers
出版情報: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9036
オンライン: http://dx.doi.org/10.1007/978-3-662-46666-7
目次情報: 続きを見る
Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control
Very Static Enforcement of Dynamic Policies
The Foundational Cryptography Framework
On the Flow of Data, Information, and Time
Pareto Efficient Solutions of Attack-Defence Trees
Analysis of XACML Policies with SMT
Automatically Checking Commitment Protocols in ProVerif without False Attacks
Generalizing Multi-party Contract Signing
Leakiness is Decidable for Well-Founded Protocols
Abstractions for Security Protocol Verification
Automated Backward Analysis of PKCS#11 v2.20
A Safe Update Mechanism for Smart Cards
Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols
Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques
Type-Based Verification of Electronic Voting Protocols
Composing Security Protocols: From Confidentiality to Privacy
PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law
Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control
Very Static Enforcement of Dynamic Policies
7.

電子ブック

EB
edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten
出版情報: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015
シリーズ名: Communications in Computer and Information Science ; 557
オンライン: http://dx.doi.org/10.1007/978-3-662-48683-2
8.

電子ブック

EB
edited by MHR Khouzani, Emmanouil Panaousis, George Theodorakopoulos
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9406
オンライン: http://dx.doi.org/10.1007/978-3-319-25594-1
9.

電子ブック

EB
edited by Tran Khanh Dang, Roland Wagner, Josef Kung, Nam Thoai, Makoto Takizawa, Erich Neuhold
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9446
オンライン: http://dx.doi.org/10.1007/978-3-319-26135-5
10.

電子ブック

EB
edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9084
オンライン: http://dx.doi.org/10.1007/978-3-319-18681-8