This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of 2 invited lectures were ca
[Lecture Notes in Computer Science] Applied Cryptography and Network Security Volume 5536 || An Efficient Identity-Based Online/Offline Encryption Scheme
โ Scribed by Abdalla, Michel; Pointcheval, David; Fouque, Pierre-Alain; Vergnaud, Damien
- Book ID
- 118238715
- Publisher
- Springer Berlin Heidelberg
- Year
- 2009
- Tongue
- German
- Weight
- 226 KB
- Category
- Article
- ISBN
- 3642019579
No coin nor oath required. For personal study only.
โฆ Synopsis
This Book Constitutes The Refereed Proceedings Of The 7th International Conference On Applied Cryptography And Network Security, Acns 2009, Held In Paris-rocquencourt, France, In June 2009. The 32 Revised Full Papers Presented Were Carefully Reviewed And Selected From 150 Submissions. The Papers Are Organized In Topical Sections On Key Exchange, Secure Computation, Public-key Encryption, Network Security, Traitor Tracing, Authentication And Anonymity, Hash Fundtions, Lattices, And Side-channel Attacks.
๐ SIMILAR VOLUMES
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invi
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on crypt
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on crypt