OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 33 from your keywords: subject="Cryptology"
First Page Previous 1 2 3 4 Next Last Page
cover
Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, San…
Comment Share
GENNARO, RosarioRobshaw, Matthew

The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic …

Edition
Ed. 1
ISBN/ISSN
978-3-662-48000-7
Collation
XVIII, 783
Series Title
Lecture Notes in Computer Science
Call Number
518.1 ADV a
Availability0
Add to basket
MARC DownloadCite
cover
Advances in Cryptology -- CRYPTO 2015 35th Annual Cryptology Conference, San…
Comment Share
GENNARO, RosarioRobshaw, Matthew

The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic …

Edition
Ed. 1
ISBN/ISSN
978-3-662-47989-6
Collation
XVIII, 787
Series Title
Lecture Notes in Computer Science
Call Number
518.1 ADV a
Availability0
Add to basket
MARC DownloadCite
cover
Advances in Cryptology -- ASIACRYPT 2015: 21st International Conference on th…
Comment Share
IWATA, TetsuCHEON, Jung Hee

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sect…

Edition
Ed. 1
ISBN/ISSN
978-3-662-48797-6
Collation
XXV, 810
Series Title
Lecture Notes in Computer Science
Call Number
518.1
Availability0
Add to basket
MARC DownloadCite
cover
Advances in Cryptology – EUROCRYPT 2015: 34th Annual International Conferen…
Comment Share
Oswald, ElisabethFischlin, Marc

The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable…

Edition
Ed. 1
ISBN/ISSN
978-3-662-46803-6
Collation
XVIII, 838
Series Title
Lecture Notes in Computer Science
Call Number
518.1 ADV a
Availability0
Add to basket
MARC DownloadCite
cover
Leakage Resilient Password Systems
Comment Share
Yingjiu LiQiang YanRobert H. Deng

This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP system…

Edition
-
ISBN/ISSN
978-3-319-17503-4
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Advanced Concepts for Intelligent Vision Systems: 16th International Conferen…
Comment Share
BATTIATO, Sebastiano

This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2015, held Catania, Italy, in October 2015. The 76 revised full papers were carefully selected from 129 submissions. Acivs 2015 is a conference focusing on techniques for building adaptive, intelligent, safe and secure imaging systems. The f…

Edition
Ed. 1
ISBN/ISSN
978-3-319-25902-4
Collation
XXI, 897
Series Title
Lecture Notes in Computer Science
Call Number
003.54 ADV a
Availability0
Add to basket
MARC DownloadCite
cover
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Ag…
Comment Share
ARTHUR, WillCHALLENER, DavidGOLDMAN, Kenneth

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…

Edition
Ed. 1
ISBN/ISSN
978-1-4302-6584-9
Collation
-
Series Title
-
Call Number
001.54 ART p
Availability0
Add to basket
MARC DownloadCite
cover
Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Agai…
Comment Share
DONALDSON, Scott E.SIEGEL, Stanley G.WILLIAMS, Chris K.ASLAM, Abdul

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity pro…

Edition
-
ISBN/ISSN
978-1-4302-6083-7
Collation
223 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Engineering Secure Software and Systems 7th International Symposium, ESSoS 2…
Comment Share
PIESSENS, FrankCABALLERO, JuanBIELOVA, Nataliia

This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measuremen…

Edition
-
ISBN/ISSN
978-3-319-15618-7
Collation
63 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Theory of Cryptography
Comment Share
DODIS, YevgeniyNIELSEN, Jesper Buus

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concu…

Edition
-
ISBN/ISSN
978-3-662-46494-6
Collation
89 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?