000 | 03745nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-319-21356-9 | ||
003 | DE-He213 | ||
005 | 20240730180109.0 | ||
007 | cr nn 008mamaa | ||
008 | 150715s2015 sz | s |||| 0|eng d | ||
020 |
_a9783319213569 _9978-3-319-21356-9 |
||
024 | 7 |
_a10.1007/978-3-319-21356-9 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aCryptography and Information Security in the Balkans _h[electronic resource] : _bFirst International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers / _cedited by Berna Ors, Bart Preneel. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aX, 251 p. 43 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9024 |
|
505 | 0 | _aAuthentication in Constrained Settings -- Optimizing the Placement of Tap Positions -- Families of Pseudorandom Binary Sequences with Low Cross-Correlation Measure -- Algebraic Attacks Using Binary Decision Diagrams -- Universally Composable Firewall Architectures Using Trusted Hardware -- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box -- An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform -- Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms -- A Secure and Efficient Protocol for Electronic Treasury Auctions -- Anonymous Data Collection System with Mediators -- A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations -- Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps -- On the Anonymization of Cocks IBE Scheme -- Nearest Planes in Practice -- Timed-Release Secret Sharing Schemes with Information Theoretic Security -- A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties. | |
520 | _aThis book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic protocols and public key cryptography. The book also contains one invited talk in full paper length. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aOrs, Berna. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9118898 |
|
700 | 1 |
_aPreneel, Bart. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9118899 |
|
710 | 2 |
_aSpringerLink (Online service) _9118900 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319213552 |
776 | 0 | 8 |
_iPrinted edition: _z9783319213576 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9024 _9118901 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-21356-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90176 _d90176 |