Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Cryptography and Information Security in the Balkans -

Cryptography and Information Security in the Balkans

First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers

Berna Ors, Bart Preneel (Herausgeber)

Buch | Softcover
X, 251 Seiten
2015 | 1st ed. 2015
Springer International Publishing (Verlag)
978-3-319-21355-2 (ISBN)
CHF 71,90 inkl. MwSt

This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014.

The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic protocols and public key cryptography. The book also contains one invited talk in full paper length.

Authentication in Constrained Settings.- Optimizing the Placement of Tap Positions.- Families of Pseudorandom Binary Sequences with Low Cross-Correlation Measure.- Algebraic Attacks Using Binary Decision Diagrams.- Universally Composable Firewall Architectures Using Trusted Hardware.- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box.- An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform.- Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms.- A Secure and Efficient Protocol for Electronic Treasury Auctions.- Anonymous Data Collection System with Mediators.- A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations.- Key-Policy Attribute-Based Encryption for Boolean Circuits from BilinearMaps.- On the Anonymization of Cocks IBE Scheme.- Nearest Planes in Practice.- Timed-Release Secret Sharing Schemes with Information Theoretic Security.- A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties.

Erscheint lt. Verlag 24.7.2015
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo X, 251 p. 43 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Schlagworte Applications • Computer Science • conference proceedings • cryptanalysis and other attacks • cryptographic protocols • cryptography • database and storage security • formal methods and theory of security • Human and societal aspects of security and privacy • Informatics • intrusion/anomaly detection and malware mitigation • Network Security • Research • Security and Privacy • security in hardware • security services • software and application security • Systems Security
ISBN-10 3-319-21355-5 / 3319213555
ISBN-13 978-3-319-21355-2 / 9783319213552
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20