Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 9280 dokumen yang sesuai dengan query
cover
"The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices, signature schemes, encryption schemes, efficient two-party and multi-party computation, security in the UC framework, cryptanalysis; efficient constructions, and protocols and combiners."
Berlin: Springer-Verlag, 2012
e20409399
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012.
The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices."
Berlin: Springer-Verlag, 2012
e20407817
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012.
The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids."
Berlin : Springer-Verlag, 2012
e20410429
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation, (blind) signatures and threshold encryption, zero-knowledge and security models, leakage-resilience, hash functions, differential privacy, pseudorandomness, dedicated encryption, security amplification, and resettable and parallel zero knowledge."
Berlin : Springer-Verlag, 2012
e20410607
eBooks  Universitas Indonesia Library
cover
Angelos D. Keromytis, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27–March 1, 2012. The 29 revised full papers presented were carefully selected and reviewed from 88 submissions. The papers cover all aspects of securing transactions and systems, including information assurance in the context of finance and commerce."
Berlin: [;Springer-Verlag, Springer-Verlag], 2012
e20410043
eBooks  Universitas Indonesia Library
cover
Josep Domingo-Ferrer, editor
"This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2012, held in Palermo, Italy, in September 2012 under the sponsorship of the UNESCO chair in Data Privacy. The 27 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on tabular data protection, microdata protection, methods and disclosure risk, microdata protection : case studies, spatial data protection, differential privacy, on-line databases and remote access, privacy-preserving protocols.
"
Berlin: Springer-Verlag, 2012
e20407881
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 11th International Conference on Computer Information Systems and Industrial Management, CISIM 2012, held in Venice, Italy, in September 2012. The 35 revised full papers presented together with 2 keynote talks were carefully reviewed and selected from 80 submissions. The papers are organized in topical sections on security, access control and intrusion detection, pattern recognition and image processing, biometric applications, algorithms and data management, networking, and system models and risk assessment."
Heidelberg: Springer-Verlag, 2012
e20409985
eBooks  Universitas Indonesia Library
cover
"This book constitutes the proceedings of the Third International Conference of the CLEF Initiative, CLEF 2012, held in Rome, Italy, in September 2012. The 14 papers and 3 poster abstracts presented were carefully reviewed and selected for inclusion in this volume. Furthermore, the books contains 2 keynote papers. The papers are organized in topical sections named, benchmarking and evaluation initiatives, information access, and evaluation methodologies and infrastructure."
Berlin: Springer-Verlag, 2012
e20409987
eBooks  Universitas Indonesia Library
cover
"The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation."
Berlin: Springer-Verlag, 2012
e20409976
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security."
Berlin: Springer-Verlag , 2012
e20409982
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>