OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 33 from your keywords: subject="Cryptology"
First Page Previous 1 2 3 4 Next Last Page
cover
Theory of Cryptography 12th International Conference, TCC 2015, Warsaw, Pola…
Comment Share
DODIS, YevgeniyNIELSEN, Jesper Buus

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concu…

Edition
-
ISBN/ISSN
978-3-662-46494-6
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Applications and Techniques in Information Security: 6th International Confer…
Comment Share
NIU, Wenjia

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, …

Edition
Ed. 1
ISBN/ISSN
978-3-662-48683-2
Collation
XVII, 398
Series Title
Communications in Computer and Information Science
Call Number
511.8
Availability0
Add to basket
MARC DownloadCite
cover
Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Tu…
Comment Share
LEANDER, Gregor

This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementatio…

Edition
-
ISBN/ISSN
978-3-662-48116-5
Collation
XI, 600
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, …
Comment Share
CID, CarlosRECHBERGER, Christian

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theor…

Edition
-
ISBN/ISSN
978-3-662-46706-0
Collation
XI, 636
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Watermarking Security
Comment Share
BAS, PatrickFURON, TeddyCAYRE, FrançoisDOERR, GwenaëlMATHON, Benjamin

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their waterm…

Edition
-
ISBN/ISSN
978-981-10-0506-0
Collation
IX, 125
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switze…
Comment Share
Vote-ID

This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on E-Voting and Identity, VoteID 2015, held in Bern, Switzerland, in September 2015. The 10 revised full papers presented, including one keynote and three invited talks, were carefully selected from 26 submissions. The papers deal with real-world electronic systems; advanced voting protocols…

Edition
-
ISBN/ISSN
9783319222707
Collation
ix, 173 pages
Series Title
-
Call Number
005.82
Availability0
Add to basket
MARC DownloadCite
cover
Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, …
Comment Share
YUNG, MotiZHU, LiehuangYANG, Yanjiang

Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…

Edition
-
ISBN/ISSN
978-3-319-27998-5
Collation
83 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trust and Trustworthy Computing 8th International Conference, TRUST 2015, He…
Comment Share
CONTI, MauroSCHUNTER, MatthiasASKOXYLAKIS, Ioannis

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust an…

Edition
-
ISBN/ISSN
978-3-319-22846-4
Collation
79 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on t…
Comment Share
IWATA, TetsuCHEON, Jung Hee

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sect…

Edition
Ed. 1
ISBN/ISSN
978-3-662-48800-3
Collation
XXV, 802
Series Title
Lecture Notes in Computer Science
Call Number
518.1
Availability0
Add to basket
MARC DownloadCite
cover
Advances in Cryptology – EUROCRYPT 2015: 34th Annual International Conferen…
Comment Share
Oswald, ElisabethFischlin, Marc

The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honora…

Edition
Ed. 1
ISBN/ISSN
978-3-662-46800-5
Collation
XVII, 818
Series Title
Lecture Notes in Computer Science
Call Number
518.1 ADV a
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?