Головна Спрощенний режим Опис Шлюз Z39.50
Авторизація
Прізвище
Пароль
 

Бази даних


Доступ до повнотекстових книг Springer Nature (через IP-адреси БДМУ) - результати пошуку

Вид пошуку

Зона пошуку
у знайденому
Формат представлення знайдених документів:
повнийінформаційнийкороткий
Відсортувати знайдені документи за:
авторомназвоюроком виданнятипом документа
Пошуковий запит: (<.>S=Cryptology.<.>)
Загальна кiлькiсть документiв : 101
Показанi документи с 1 за 20
 1-20    21-40   41-60   61-80   81-101   101-101 
1.


   
    Selected Areas in Cryptography – SAC 2016 [[electronic resource] :] : 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers / / ed.: Avanzi, Roberto., Heys, Howard. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 580 p. 90 illus. - Б. ц.
Рубрики: Data encryption (Computer science).
   Computer security.

   Microprogramming .

   Architecture, Computer.

   Special purpose computers.

   Numerical analysis.

   Cryptology.

   Systems and Data Security.

   Control Structures and Microprogramming.

   Computer System Implementation.

   Special Purpose and Application-Based Systems.

   Numeric Computing.

Анотація: This book contains revised selected papers from the 23rd International Conference on Selected Areas in Cryptography, SAC 2016, held in St. John's, NL, Canada in August 2016.  The 28 full papers and 2 invited papers presented in this volume were carefully reviewed and selected from 100 submissions. They are organized in the following topical sections: side channels and fault attacks; design and implementation of symmetric cryptography; efficient symmetric primitives; cryptanalysis of symmetric primitives; MACs and PRNGs; lattice-based cryptography; and cryptanalysis of asymmetric primitives.

Перейти: https://doi.org/10.1007/978-3-319-69453-5

Дод.точки доступу:
Avanzi, Roberto. \ed.\; Heys, Howard. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

2.


   
    Financial Cryptography and Data Security [[electronic resource] :] : FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers / / ed. Brenner, Michael. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XXII, 636 p. 97 illus. - Б. ц.
    Зміст:
Encrypted Computing and Applied Homomorphic Cryptography --
Bitcoin and Blockchain Research --
Secure Voting Systems --
Trusted Smart Contracts --
Targeted Attacks.
Рубрики: Computer security.
   Data encryption (Computer science).

   Computers.

   Computer organization.

   Artificial intelligence.

   Systems and Data Security.

   Cryptology.

   Information Systems and Communication Service.

   Computing Milieux.

   Computer Systems Organization and Communication Networks.

   Artificial Intelligence.

Анотація: This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017. The 39 full papers presented were carefully reviewed and selected from 96 submissions. They feature the outcome of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC 2017, and the First Workshop on Targeted Attacks, TA 2017. The papers are grouped in topical sections named: encrypted computing and applied homomorphic cryptography; bitcoin and blockchain research; advances in secure electronic voting schemes; trusted smart contracts; targeted attacks.

Перейти: https://doi.org/10.1007/978-3-319-70278-0

Дод.точки доступу:
Brenner, Michael. \ed.\; Rohloff, Kurt. \ed.\; Bonneau, Joseph. \ed.\; Miller, Andrew. \ed.\; Ryan, Peter Y.A. \ed.\; Teague, Vanessa. \ed.\; Bracciali, Andrea. \ed.\; Sala, Massimiliano. \ed.\; Pintore, Federico. \ed.\; Jakobsson, Markus. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

3.


   
    Advances in Cryptology – CRYPTO 2017 [[electronic resource] :] : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part II / / ed.: Katz, Jonathan., Shacham, Hovav. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 735 p. 100 illus. - Б. ц.
Рубрики: Data encryption (Computer science).
   Computer security.

   Computer communication systems.

   Software engineering.

   Management information systems.

   Computer science.

   Coding theory.

   Information theory.

   Cryptology.

   Systems and Data Security.

   Computer Communication Networks.

   Software Engineering.

   Management of Computing and Information Systems.

   Coding and Information Theory.

Анотація: The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Перейти: https://doi.org/10.1007/978-3-319-63715-0

Дод.точки доступу:
Katz, Jonathan. \ed.\; Shacham, Hovav. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

4.


   
    Digital Forensics and Watermarking [[electronic resource] :] : 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers / / ed. Shi, Yun Qing. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 618 p. 269 illus. - Б. ц.
Рубрики: Data encryption (Computer science).
   Computer security.

   Algorithms.

   Optical data processing.

   Computers and civilization.

   Coding theory.

   Information theory.

   Cryptology.

   Systems and Data Security.

   Algorithm Analysis and Problem Complexity.

   Image Processing and Computer Vision.

   Computers and Society.

   Coding and Information Theory.

Анотація: This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are organized in topical sections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis.

Перейти: https://doi.org/10.1007/978-3-319-53465-7

Дод.точки доступу:
Shi, Yun Qing. \ed.\; Kim, Hyoung Joong. \ed.\; Perez-Gonzalez, Fernando. \ed.\; Liu, Feng. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

5.


   
    Cloud Computing and Security [[electronic resource] :] : third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I / / ed. Sun, Xingming. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XXI, 565 p. 236 illus. - Б. ц.
    Зміст:
Information hiding --
Cloud computing.- IOT applications --
Information security --
Multimedia applications.-Optimization  and classification.    .
Рубрики: Application software.
   Computer communication systems.

   Algorithms.

   Management information systems.

   Computer science.

   Data encryption (Computer science).

   Computers and civilization.

   Information Systems Applications (incl. Internet).

   Computer Communication Networks.

   Algorithm Analysis and Problem Complexity.

   Management of Computing and Information Systems.

   Cryptology.

   Computers and Society.

Анотація: This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017.   The 116 full papers and 11 short papers of these volumes were carefully  reviewed and selected from 391 submissions. The papers are organized in  topical sections such as: information hiding; cloud computing;  IOT applications; information security; multimedia applications; optimization  and classification.    .

Перейти: https://doi.org/10.1007/978-3-319-68505-2

Дод.точки доступу:
Sun, Xingming. \ed.\; Chao, Han-Chieh. \ed.\; You, Xingang. \ed.\; Bertino, Elisa. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

6.


   
    Cyber Security Cryptography and Machine Learning [[electronic resource] :] : first International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / / ed.: Dolev, Shlomi., Lodha, Sachin. - 1st ed. 2017. - [S. l. : s. n.]. - XII, 307 p. 59 illus. - Б. ц.
Рубрики: Computer security.
   Data encryption (Computer science).

   Artificial intelligence.

   Optical data processing.

   Computer science—Mathematics.

   Data protection.

   Systems and Data Security.

   Cryptology.

   Artificial Intelligence.

   Computer Imaging, Vision, Pattern Recognition and Graphics.

   Discrete Mathematics in Computer Science.

   Security.

Анотація: This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.

Перейти: https://doi.org/10.1007/978-3-319-60080-2

Дод.точки доступу:
Dolev, Shlomi. \ed.\; Lodha, Sachin. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

7.


   
    Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI [[electronic resource] :] : special Issue on Data and Security Engineering / / ed. Hameurlain, Abdelkader. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - IX, 147 p. 49 illus. - Б. ц.
    Зміст:
User-Centered Design of Geographic Interactive Applications: From High-Level Specification to Code Generation, from Prototypes to better Specifications --
Applying Data Analytic Techniques for Fault Detection --
Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol --
Parallel Learning of Local SVM Algorithms for Classifying Large Datasets --
Contractual Specifications of Business Services: Modeling, Formalization, and Proximity --
Energy-Saving Virtual Machine Scheduling in Cloud Computing with Fixed Interval Constraints.
Рубрики: Data mining.
   Algorithms.

   Management information systems.

   Computer science.

   Data encryption (Computer science).

   Application software.

   Computer security.

   Data Mining and Knowledge Discovery.

   Algorithm Analysis and Problem Complexity.

   Management of Computing and Information Systems.

   Cryptology.

   Information Systems Applications (incl. Internet).

   Systems and Data Security.

Анотація: The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments. This, the 31st issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains six revised selected papers from the 2nd International Conference on Future Data and Security Engineering, FDSE 2015, and the 9th International Conference on Advanced Computing and Applications, ACOMP 2015, which were held in Ho Chi Minh City, Vietnam, in November 2015. Topics covered include big data analytics, data models and languages, security and privacy, complex business services, and cloud data management.

Перейти: https://doi.org/10.1007/978-3-662-54173-9

Дод.точки доступу:
Hameurlain, Abdelkader. \ed.\; Kung, Josef. \ed.\; Wagner, Roland. \ed.\; Dang, Tran Khanh. \ed.\; Thoai, Nam. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

8.


   
    Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology [[electronic resource] :] : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers / / ed.: Phan, Raphael C.-W., Yung, Moti. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 573 p. 84 illus. - Б. ц.
    Зміст:
Revisiting tradition --
Different paradigms --
Cryptofication --
Malicious cryptography --
Advances in cryptanalysis --
Primitives and features; cryptanalysis correspondence.
Рубрики: Data encryption (Computer science).
   Computer science—Mathematics.

   Management information systems.

   Computer science.

   Computer communication systems.

   Algorithms.

   Cryptology.

   Discrete Mathematics in Computer Science.

   Management of Computing and Information Systems.

   Computer Communication Networks.

   Algorithm Analysis and Problem Complexity.

Анотація: This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. .

Перейти: https://doi.org/10.1007/978-3-319-61273-7

Дод.точки доступу:
Phan, Raphael C.-W. \ed.\; Yung, Moti. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

9.


   
    Financial Cryptography and Data Security [[electronic resource] :] : 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers / / ed. Kiayias, Aggelos. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 650 p. 132 illus. - Б. ц.
    Зміст:
Privacy and Identity Management --
Privacy and Data Processing --
Cryptographic Primitives and API's.-Vulnerabilities and Exploits --
Blockchain Technology --
Security of Internet Protocols --
Blind signatures.-Searching and Processing Private Data --
Secure Channel Protocols --
Privacy in Data Storage and Retrieval.
Рубрики: Data encryption (Computer science).
   Computers.

   Law and legislation.

   Computers and civilization.

   Software engineering.

   Cryptology.

   Legal Aspects of Computing.

   Computers and Society.

   Software Engineering/Programming and Operating Systems.

   Information Systems and Communication Service.

Анотація: This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017. The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.

Перейти: https://doi.org/10.1007/978-3-319-70972-7

Дод.точки доступу:
Kiayias, Aggelos. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

10.


   
    Theory of Cryptography [[electronic resource] :] : 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I / / ed.: Kalai, Yael., Reyzin, Leonid. - 1st ed. 2017. - [S. l. : s. n.]. - XVII, 812 p. 80 illus. - Б. ц.
Рубрики: Data encryption (Computer science).
   Computer security.

   Computers.

   Law and legislation.

   Computers and civilization.

   Computer communication systems.

   Application software.

   Cryptology.

   Systems and Data Security.

   Legal Aspects of Computing.

   Computers and Society.

   Computer Communication Networks.

   Information Systems Applications (incl. Internet).

Анотація: The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Перейти: https://doi.org/10.1007/978-3-319-70500-2

Дод.точки доступу:
Kalai, Yael. \ed.\; Reyzin, Leonid. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

11.


   
    Theory of Cryptography [[electronic resource] :] : 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II / / ed.: Kalai, Yael., Reyzin, Leonid. - 1st ed. 2017. - [S. l. : s. n.]. - XVII, 778 p. 39 illus. - Б. ц.
Рубрики: Data encryption (Computer science).
   Software engineering.

   Artificial intelligence.

   Cryptology.

   Software Engineering/Programming and Operating Systems.

   Artificial Intelligence.

Анотація: The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Перейти: https://doi.org/10.1007/978-3-319-70503-3

Дод.точки доступу:
Kalai, Yael. \ed.\; Reyzin, Leonid. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

12.


   
    Information Security and Privacy [[electronic resource] :] : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I / / ed.: Pieprzyk, Josef., Suriadi, Suriadi. - 1st ed. 2017. - [S. l. : s. n.]. - XXIX, 471 p. 75 illus. - Б. ц.
    Зміст:
Public key encryption --
Attribute-based encryption --
Identity-based encryption --
Searchable encryption --
Cryptanalysis --
Digital signatures --
Symmetric cryptography --
Software security --
Network security --
Malware detection --
Privacy --
Authentication --
Elliptic curve cryptography.
Рубрики: Computer security.
   Data encryption (Computer science).

   Management information systems.

   Computer science.

   Algorithms.

   Computers and civilization.

   Systems and Data Security.

   Cryptology.

   Management of Computing and Information Systems.

   Algorithm Analysis and Problem Complexity.

   Computers and Society.

Анотація: The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers, 2 keynotes, 8 invited papers and 10 short papers presented in this double volume, were carefully revised and selected from 150 submissions. The papers of Part I (LNCS 10342) are organized in topical sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography. .

Перейти: https://doi.org/10.1007/978-3-319-60055-0

Дод.точки доступу:
Pieprzyk, Josef. \ed.\; Suriadi, Suriadi. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

13.


   
    Computer Security – ESORICS 2017 [[electronic resource] :] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II / / ed.: Foley, Simon N., Gollmann, Dieter., Snekkenes, Einar. - 1st ed. 2017. - [S. l. : s. n.]. - XXI, 573 p. 187 illus. - Б. ц.
    Зміст:
Data protection --
Security protocols --
Systems --
Web and network security --
Privacy --
Threat modeling and detection --
Information flow --
Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
Рубрики: Computer security.
   Data encryption (Computer science).

   Management information systems.

   Computer science.

   Algorithms.

   Computers and civilization.

   Software engineering.

   Systems and Data Security.

   Cryptology.

   Management of Computing and Information Systems.

   Algorithm Analysis and Problem Complexity.

   Computers and Society.

   Software Engineering.

Анотація: The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.

Перейти: https://doi.org/10.1007/978-3-319-66399-9

Дод.точки доступу:
Foley, Simon N. \ed.\; Gollmann, Dieter. \ed.\; Snekkenes, Einar. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

14.


   
    Research in Attacks, Intrusions, and Defenses [[electronic resource] :] : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings / / ed. Dacier, Marc. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 496 p. 115 illus. - Б. ц.
    Зміст:
VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices --
Static Program Analysis as a Fuzzing Aid --
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit --
Lens on the endpoint: Hunting for malicious software through endpoint data analysis --
Redemption: Real-time Protection Against Ransomware at End-Hosts --
ILAB: An Interactive Labelling Strategy for Intrusion Detection --
Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps --
Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level --
Android Malware Clustering through Malicious Payload Mining --
Stealth Loader: Trace-free Program Loading for API Obfuscation --
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization --
CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers            --
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises --
BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems --
Trapped by the UI: The Android case --
Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults --
Secure In-Cache Execution --
Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage --
Linking Amplification DDoS Attacks to Booter Services --
Practical and Accurate Runtime Application Protection against DoS Attacks --
Exploring the ecosystem of malicious domain registrations in the .eu TLD.
Рубрики: Computer security.
   Data protection.

   Data encryption (Computer science).

   Management information systems.

   Computer science.

   Computer communication systems.

   Operating systems (Computers).

   Systems and Data Security.

   Security.

   Cryptology.

   Management of Computing and Information Systems.

   Computer Communication Networks.

   Operating Systems.

Анотація: This book constitutes the refereed conference proceedings of the 20th  International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2017, held in Atlanta, GA, USA, in September 2017. The 21 revised full papers were selected from 105 submissions. They are organized in the following topics: software security, intrusion detection, systems security, android security, cybercrime, cloud security, network security.

Перейти: https://doi.org/10.1007/978-3-319-66332-6

Дод.точки доступу:
Dacier, Marc. \ed.\; Bailey, Michael. \ed.\; Polychronakis, Michalis. \ed.\; Antonakakis, Manos. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

15.


   
    Financial Cryptography and Data Security [[electronic resource] :] : 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers / / ed.: Grossklags, Jens., Preneel, Bart. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 620 p. 135 illus. - Б. ц.
    Зміст:
Fraud and deception --
Payments, auctions, and e-voting --
Multiparty computation --
Mobile malware --
Social interaction and policy --
Cryptanalysis --
Surveillance and anonymity --
Web security and data privacy --
Bitcoin mining --
Cryptographic protocols --
Payment use and abuse.
Рубрики: Data encryption (Computer science).
   Computer security.

   E-commerce.

   Application software.

   Computer communication systems.

   Cryptology.

   Systems and Data Security.

   e-Commerce/e-business.

   Computer Appl. in Administrative Data Processing.

   Computer Communication Networks.

Анотація: This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016. The 27 revised full papers and 9 short papers were carefully selected and reviewed from 137 full papers submissions. The papers are grouped in the following topical sections: fraud and deception; payments, auctions, and e-voting; multiparty computation; mobile malware; social interaction and policy; cryptanalysis; surveillance and anonymity; Web security and data privacy; Bitcoin mining; cryptographic protocols; payment use and abuse.

Перейти: https://doi.org/10.1007/978-3-662-54970-4

Дод.точки доступу:
Grossklags, Jens. \ed.\; Preneel, Bart. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

16.


   
    Advances in Cryptology – EUROCRYPT 2017 [[electronic resource] :] : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III / / ed.: Coron, Jean-Sebastien., Nielsen, Jesper Buus. - 1st ed. 2017. - [S. l. : s. n.]. - XXI, 641 p. 54 illus. - Б. ц.
    Зміст:
Lattice attacks and constructions --
Obfuscation and functional encryption --
Discrete logarithm --
Multiparty computation --
Universal composability --
Zero knowledge --
Side-channel attacks and countermeasures --
Functional encryption --
Elliptic curves --
Symmetric cryptanalysis --
Provable security for symmetric cryptography --
security models:- Blockchain --
Memory hard functions --
Symmetric-key constructions --
Obfuscation --
Quantum cryptography --
Public-key encryption and key-exchange.
Рубрики: Data encryption (Computer science).
   Computer security.

   Management information systems.

   Computer science.

   Software engineering.

   Computer science—Mathematics.

   Cryptology.

   Systems and Data Security.

   Management of Computing and Information Systems.

   Software Engineering.

   Discrete Mathematics in Computer Science.

Анотація: The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.

Перейти: https://doi.org/10.1007/978-3-319-56617-7

Дод.точки доступу:
Coron, Jean-Sebastien. \ed.\; Nielsen, Jesper Buus. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

17.


   
    Public-Key Cryptography – PKC 2017 [[electronic resource] :] : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II / / ed. Fehr, Serge. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 556 p. 81 illus. - Б. ц.
    Зміст:
Cryptanalysis, Protocols --
Encryption Schemes --
Leakage-Resilient and Non-Malleable Codes --
Number Theory and Die-Hellman --
Encryption with Access Control --
Special Signatures --
Fully Homomorphic Encryption --
Real-World Schemes --
Multiparty Computation --
Primitives.
Рубрики: Data encryption (Computer science).
   Computer security.

   Coding theory.

   Information theory.

   Computer communication systems.

   Algorithms.

   Management information systems.

   Computer science.

   Cryptology.

   Systems and Data Security.

   Coding and Information Theory.

   Computer Communication Networks.

   Algorithm Analysis and Problem Complexity.

   Management of Computing and Information Systems.

Анотація: The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

Перейти: https://doi.org/10.1007/978-3-662-54388-7

Дод.точки доступу:
Fehr, Serge. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

18.


   
    Lightweight Cryptography for Security and Privacy [[electronic resource] :] : 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers / / ed. Bogdanov, Andrey. - 1st ed. 2017. - [S. l. : s. n.]. - VII, 149 p. 34 illus. - Б. ц.
    Зміст:
Cryptanalysis --
Lightweight designs --
Implementation challenges.
Рубрики: Data encryption (Computer science).
   Computer security.

   Coding theory.

   Information theory.

   Computer memory systems.

   Artificial intelligence.

   Cryptology.

   Systems and Data Security.

   Coding and Information Theory.

   Memory Structures.

   Artificial Intelligence.

Анотація: This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016. The 9 full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: cryptanalysis, lightweight designs, implementation challenges.

Перейти: https://doi.org/10.1007/978-3-319-55714-4

Дод.точки доступу:
Bogdanov, Andrey. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

19.


   
    Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] :] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / ed.: Polychronakis, Michalis., Meier, Michael. - 1st ed. 2017. - [S. l. : s. n.]. - X, 412 p. 114 illus. - Б. ц.
    Зміст:
Enclaves and isolation --
Malware analysis --
Cyber-physical systems --
Detection and protection.-Code analysis --
Web security.
Рубрики: Computer security.
   Operating systems (Computers).

   Computers.

   Law and legislation.

   Computers and civilization.

   Application software.

   Data encryption (Computer science).

   Systems and Data Security.

   Operating Systems.

   Legal Aspects of Computing.

   Computers and Society.

   Information Systems Applications (incl. Internet).

   Cryptology.

Анотація: This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.

Перейти: https://doi.org/10.1007/978-3-319-60876-1

Дод.точки доступу:
Polychronakis, Michalis. \ed.\; Meier, Michael. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

20.


   
    Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications [[electronic resource] :] : 5th International Symposium, CompIMAGE 2016, Niagara Falls, NY, USA, September 21-23, 2016, Revised Selected Papers / / ed.: Barneva, Reneta P., Brimkov, Valentin E., Tavares, Joao Manuel R.S. - 1st ed. 2017. - [S. l. : s. n.]. - XII, 259 p. 95 illus. - Б. ц.
    Зміст:
Model Development and Incremental Learning Based on Case-Based Reasoning for Signal and Image Analysis --
CVT-Based 3D Image Segmentation for Quality Tetrahedral Meshing --
Structuring Digital Spaces by Path-partition Induced Closure Operators on Graphs --
Atypical (Rare) Elements Detection - A Conditional Nonparametric Approach --
Finding Shortest Isothetic Path inside a 3D Digital Object --
Unified Characterization of P-Simple Points in Triangular, Square, and Hexagonal Grids --
Concepts of Binary Morphological Operations Dilation and Erosion on the Triangular Grid --
Boundary and Shape Complexity of a Digital Object --
Interior and Exterior Shape Representations Using the Screened Poisson Equation --
Picture Scanning Automata --
Two-Dimensional Input-Revolving Automata --
Direct Phasing of Crystalline Materials from X-ray Powder Diffraction --
Detection of Counterfeit Coins Based on Modeling and Restoration of 3D Images --
Automated Brain Tumor Diagnosis and Severity Analysis from Brain MRI --
Medical Image Segmentation Using Improved Affinity Propagation --
Simple Signed-Distance Function Depth Calculation Applied to Measurement of the fMRI BOLD Hemodynamic Response Function in Human Visual Cortex --
A Study of Children Facial Recognition for Privacy in Smart TV --
Scrambling Cryptography Using Programmable SLM-based Filter for Video Streaming over a WDM Network --
An Accelerated H.264/AVC Encoder on Graphic Processing Unit for UAV Videos.
Рубрики: Optical data processing.
   Computer graphics.

   Computer communication systems.

   Computer security.

   Data mining.

   Data encryption (Computer science).

   Image Processing and Computer Vision.

   Computer Graphics.

   Computer Communication Networks.

   Systems and Data Security.

   Data Mining and Knowledge Discovery.

   Cryptology.

Анотація: This book constitutes the refereed post-conference proceedings of the 5th International Conference on Computational Modeling of Objects Presented in Images, CompIMAGE 2016, held in Niagara Falls, NY, USA, in September 2016. The 18 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 30 submissions. The papers cover the following topics: theoretical contributions and application-driven contributions.

Перейти: https://doi.org/10.1007/978-3-319-54609-4

Дод.точки доступу:
Barneva, Reneta P. \ed.\; Brimkov, Valentin E. \ed.\; Tavares, Joao Manuel R.S. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

 1-20    21-40   41-60   61-80   81-101   101-101 
 
© Міжнародна Асоціація користувачів і розробників електронних бібліотек і нових інформаційних технологій
(Асоціація ЕБНІТ)