Cargando…

Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers /

This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submiss...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Ors, Berna (Editor ), Preneel, Bart (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2015.
Edición:1st ed. 2015.
Colección:Security and Cryptology ; 9024
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-21356-9
003 DE-He213
005 20220115082043.0
007 cr nn 008mamaa
008 150715s2015 sz | s |||| 0|eng d
020 |a 9783319213569  |9 978-3-319-21356-9 
024 7 |a 10.1007/978-3-319-21356-9  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Cryptography and Information Security in the Balkans  |h [electronic resource] :  |b First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers /  |c edited by Berna Ors, Bart Preneel. 
250 |a 1st ed. 2015. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2015. 
300 |a X, 251 p. 43 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 9024 
505 0 |a Authentication in Constrained Settings -- Optimizing the Placement of Tap Positions -- Families of Pseudorandom Binary Sequences with Low Cross-Correlation Measure -- Algebraic Attacks Using Binary Decision Diagrams -- Universally Composable Firewall Architectures Using Trusted Hardware -- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box -- An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform -- Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms -- A Secure and Efficient Protocol for Electronic Treasury Auctions -- Anonymous Data Collection System with Mediators -- A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations -- Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps -- On the Anonymization of Cocks IBE Scheme -- Nearest Planes in Practice -- Timed-Release Secret Sharing Schemes with Information Theoretic Security -- A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties. 
520 |a This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic protocols and public key cryptography. The book also contains one invited talk in full paper length. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data protection. 
650 1 4 |a Cryptology. 
650 2 4 |a Data and Information Security. 
700 1 |a Ors, Berna.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Preneel, Bart.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319213576 
776 0 8 |i Printed edition:  |z 9783319213552 
830 0 |a Security and Cryptology ;  |v 9024 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-21356-9  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)