OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 33 from your keywords: subject="Cryptology"
1 2 3 4 Next Last Page
cover
Electronic Voting: 7th International Joint Conference, E-Vote-ID 2022, Bregen…
Comment Share
KRIMMER, RobertVOLKAME, MelanieCID, David Duenas-

This open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on Electronic Voting, E-Vote-ID 2022, held in Bregenz, Austria, in October 2022. The 10 full papers presented were carefully reviewed and selected from 39 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and u…

Edition
1
ISBN/ISSN
9783031159114
Collation
XII, 185
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Watermarking Security
Comment Share
BAS, PatrickFURON, TeddyCAYRE, FrançoisDOERR, Gwenaël

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their waterm…

Edition
-
ISBN/ISSN
978-981-10-0506-0
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, …
Comment Share
YUNG, MotiZHU, LiehuangYANG, Yanjiang

Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…

Edition
-
ISBN/ISSN
978-3-319-27998-5
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trust and Trustworthy Computing 8th International Conference, TRUST 2015, He…
Comment Share
CONTI, MauroSCHUNTER, MatthiasASKOXYLAKIS, Ioannis

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust an…

Edition
-
ISBN/ISSN
978-3-319-22846-4
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Cryptology and network security
Comment Share
International Conference on Cryptology and Network Security

This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authent…

Edition
-
ISBN/ISSN
9783319268231
Collation
x, 257 pages
Series Title
-
Call Number
003.54
Availability0
Add to basket
MARC DownloadCite
cover
Transactions on Data Hiding and Multimedia Security X
Comment Share
SHI, Yun Q.

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …

Edition
-
ISBN/ISSN
978-3-662-46739-8
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Foundations and Practice of Security
Comment Share
Frédéric CuppensJoaquin Garcia-AlfaroNur Zincir HeywoodPhilip W. L. Fong

This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on privacy; software se…

Edition
-
ISBN/ISSN
978-3-319-17040-4
Collation
XIII, 375 pages
Series Title
Lecture Notes in Computer Science
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA C…
Comment Share
NYBERG, Kaisa

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based enc…

Edition
-
ISBN/ISSN
978-3-319-16715-2
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Applied Cryptography and Network Security: 13th International Conference, ACN…
Comment Share
MALKIN, Tal

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secur…

Edition
Ed. 1
ISBN/ISSN
978-3-319-28166-7
Collation
XVIII, 698
Series Title
Lecture Notes in Computer Science
Call Number
005.7 APP a
Availability0
Add to basket
MARC DownloadCite
cover
Theory of Cryptography 12th International Conference, TCC 2015, Warsaw, Pola…
Comment Share
DODIS, YevgeniyNIELSEN, Jesper Buus

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concu…

Edition
-
ISBN/ISSN
978-3-662-46497-7
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
1 2 3 4 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?