×

Found 186 Documents (Results 1–100)

100
MathJax

Model checking speculation-dependent security properties: abstracting and reducing processor models for sound and complete verification. (English) Zbl 07116588

Carlet, Claude (ed.) et al., Codes, cryptology and information security. Third international conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019. Proceedings – in honor of Said el Hajji. Cham: Springer. Lect. Notes Comput. Sci. 11445, 462-479 (2019).
MSC:  68P25
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of MORUS. (English) Zbl 1446.94095

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 35-64 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Inferences from attribute-disjoint and duplicate-preserving relational fragmentations. (English) Zbl 06894594

Ferrarotti, Flavio (ed.) et al., Foundations of information and knowledge systems. 10th international symposium, FoIKS 2018, Budapest, Hungary, May 14–18, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10833, 77-96 (2018).
PDF BibTeX XML Cite
Full Text: DOI

On the security of a searchable anonymous attribute based encryption. (English) Zbl 1457.94108

Giri, Debasis (ed.) et al., Mathematics and computing. Third international conference, ICMC 2017, Haldia, India, January 17–21, 2017. Proceedings. Singapore: Springer. Commun. Comput. Inf. Sci. 655, 16-25 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Cloud data security based on data partitions and multiple encryptions. (English) Zbl 06814588

Arumugam, S. (ed.) et al., Theoretical computer science and discrete mathematics. First international conference, ICTCSDM 2016, Krishnankoil, India, December 19–21, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10398, 191-196 (2017).
MSC:  68Qxx 68Rxx
PDF BibTeX XML Cite
Full Text: DOI

Somewhat/fully homomorphic encryption: implementation progresses and challenges. (English) Zbl 1365.94407

El Hajji, Said (ed.) et al., Codes, cryptology and information security. Second international conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017. Proceedings – in honor of Claude Carlet. Cham: Springer (ISBN 978-3-319-55588-1/pbk; 978-3-319-55589-8/ebook). Lecture Notes in Computer Science 10194, 68-82 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

A privacy preserving source verifiable encryption scheme. (English) Zbl 1403.94089

Bao, Feng (ed.) et al., Information security practice and experience. 12th international conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-49150-9/pbk; 978-3-319-49151-6/ebook). Lecture Notes in Computer Science 10060, 182-193 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

A secure architecture for operating system-level virtualization on mobile devices. (English) Zbl 1409.94879

Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9589, 430-450 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Selected results and related issues of confidentiality-preserving controlled interaction execution. (English) Zbl 1475.68427

Gyssens, Marc (ed.) et al., Foundations of information and knowledge systems. 9th international symposium, FoIKS 2016, Linz, Austria, March 7–11, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9616, 211-234 (2016).
MSC:  68U35 68M25
PDF BibTeX XML Cite
Full Text: DOI

Data is a stream: security of stream-based channels. (English) Zbl 1369.94535

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 545-564 (2015).
MSC:  94A60 68P30
PDF BibTeX XML Cite
Full Text: DOI

A secure and efficient protocol for electronic treasury auctions. (English) Zbl 1401.94138

Ors, Berna (ed.) et al., Cryptography and information security in the Balkans. First international conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16–17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). Lecture Notes in Computer Science 9024, 123-140 (2015).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of JAMBU. (English) Zbl 1382.94154

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 264-281 (2015).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

A formulation of the potential for communication condition using \(\mathrm{C}^2 \mathrm{KA}\). (English) Zbl 1464.68250

Peron, Adriano (ed.) et al., Proceedings of the fifth international symposium on games, automata, logics and formal verification, GandALF 2014, Verona, Italy, September 10–12, 2014. Waterloo: Open Publishing Association (OPA). Electron. Proc. Theor. Comput. Sci. (EPTCS) 161, 161-174 (2014).
MSC:  68Q85 68M25
PDF BibTeX XML Cite
Full Text: arXiv Link

Breaking the IOC authenticated encryption mode. (English) Zbl 1288.94054

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 126-135 (2014).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

The security impact of a new cryptographic library. (English) Zbl 1303.94067

Hevia, Alejandro (ed.) et al., Progress in cryptology – LATINCRYPT 2012. 2nd international conference on cryptology and information security in Latin America, Santiago, Chile, October 7–10, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33480-1/pbk). Lecture Notes in Computer Science 7533, 159-176 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Confidentiality and integrity: a constructive perspective. (English) Zbl 1303.94092

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 209-229 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

\(\mathcal{E}\)-MACs: towards more secure and more efficient constructions of secure channels. (English) Zbl 1339.94034

Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology – ICISC 2010. 13th international conference, Seoul, Korea, December 1–3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 292-310 (2011).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Unifying theories of confidentiality. (English) Zbl 1309.68037

Qin, Shengchao (ed.), Unifying theories of programming. Third international symposium, UTP 2010, Shanghai, China, November 15–16, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-16689-1/pbk). Lecture Notes in Computer Science 6445, 120-136 (2010).
MSC:  68N30
PDF BibTeX XML Cite
Full Text: DOI

Hardware based data inspection for USB data leakage prevention. (English) Zbl 1200.68099

Ślęzak, D. (ed.) et al., Security technology. International conference, SecTech 2009, held as part of the future generation information technology conference, FGIT 2009, Jeju Island, Korea, December 10–12, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10846-4/pbk; 978-3-642-10847-1/ebook). Communications in Computer and Information Science 58, 57-63 (2010).
MSC:  68P25 68M11 68M99
PDF BibTeX XML Cite
Full Text: DOI

On the security of identity based ring signcryption schemes. (English) Zbl 1307.94121

Samarati, Pierangela (ed.) et al., Information security. 12th international conference, ISC 2009, Pisa, Italy, September 7–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04473-1/pbk). Lecture Notes in Computer Science 5735, 310-325 (2009).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Classification

all top 3

Software