×

Found 347 Documents (Results 1–100)

Identity confidentiality in 5G mobile telephony systems. (English) Zbl 1522.94063

Cremers, Cas (ed.) et al., Security standardisation research. 4th international conference, SSR 2018, Darmstadt, Germany, November 26–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11322, 120-142 (2018).
PDFBibTeX XMLCite
Full Text: DOI

Server-aided revocable attribute-based encryption resilient to decryption key exposure. (English) Zbl 1519.68033

Capkun, Srdjan (ed.) et al., Cryptology and network security. 16th international conference, CANS 2017, Hong Kong, China, November 30 – December 2, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11261, 504-514 (2018).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model. (English) Zbl 1521.94059

Capkun, Srdjan (ed.) et al., Cryptology and network security. 16th international conference, CANS 2017, Hong Kong, China, November 30 – December 2, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11261, 459-469 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of frequency-hiding order-preserving encryption. (English) Zbl 1519.68073

Capkun, Srdjan (ed.) et al., Cryptology and network security. 16th international conference, CANS 2017, Hong Kong, China, November 30 – December 2, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11261, 51-70 (2018).
MSC:  68P25 68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Advanced persistent distributed denial of service attack model on scale-free networks. (English) Zbl 1519.68038

Liu, Feng (ed.) et al., Science of cyber security. First international conference, SciSec 2018, Beijing, China, August 12–14, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11287, 96-112 (2018).
MSC:  68M25 68M10 68M11
PDFBibTeX XMLCite
Full Text: DOI

Characterizing the optimal attack strategy decision in cyber epidemic attacks with limited resources. (English) Zbl 1519.68036

Liu, Feng (ed.) et al., Science of cyber security. First international conference, SciSec 2018, Beijing, China, August 12–14, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11287, 65-80 (2018).
MSC:  68M25 68M10 68M11
PDFBibTeX XMLCite
Full Text: DOI

A note on dependence of epidemic threshold on state transition diagram in the SEIC cybersecurity dynamical system model. (English) Zbl 1519.68032

Liu, Feng (ed.) et al., Science of cyber security. First international conference, SciSec 2018, Beijing, China, August 12–14, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11287, 51-64 (2018).
MSC:  68M25 68M10 68M11
PDFBibTeX XMLCite
Full Text: DOI

A robust optimization approach to designing near-optimal strategies for constant-sum monitoring games. (English) Zbl 1521.91051

Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 603-622 (2018).
PDFBibTeX XMLCite
Full Text: DOI

Algorithms for subgame abstraction with applications to cyber defense. (English) Zbl 1521.91052

Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 556-568 (2018).
PDFBibTeX XMLCite
Full Text: DOI

A game theoretical framework for inter-process adversarial intervention detection. (English) Zbl 1519.68034

Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 486-507 (2018).
MSC:  68M25 91A65 91A80
PDFBibTeX XMLCite
Full Text: DOI

Approximating power indices to assess cybersecurity criticality. (English) Zbl 1519.68026

Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 346-365 (2018).
PDFBibTeX XMLCite
Full Text: DOI

Moving target defense for the placement of intrusion detection systems in the cloud. (English) Zbl 1519.68011

Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 326-345 (2018).
PDFBibTeX XMLCite
Full Text: DOI

Disappointment-aversion in security games. (English) Zbl 1521.91010

Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 314-325 (2018).
MSC:  91A10 91A20 68M25
PDFBibTeX XMLCite
Full Text: DOI

Distributed aggregative games on graphs in adversarial environments. (English) Zbl 1521.91049

Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 296-313 (2018).
MSC:  91A43 05C57 68M25
PDFBibTeX XMLCite
Full Text: DOI

Analysis and computation of adaptive defense strategies against advanced persistent threats for cyber-physical systems. (English) Zbl 1519.68028

Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 205-226 (2018).
MSC:  68M25 91A80
PDFBibTeX XMLCite
Full Text: DOI

Data poisoning attacks in contextual bandits. (English) Zbl 1519.68029

Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 186-204 (2018).
MSC:  68M25 68T05 90C90
PDFBibTeX XMLCite
Full Text: DOI arXiv

Multi-stage dynamic information flow tracking game. (English) Zbl 1519.68030

Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 80-101 (2018).
MSC:  68M25 91A80
PDFBibTeX XMLCite
Full Text: DOI

Game theoretic security framework for quantum key distribution. (English) Zbl 07721026

Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 38-58 (2018).
PDFBibTeX XMLCite
Full Text: DOI

Hide the modulus: a secure non-interactive fully verifiable delegation scheme for modular exponentiations via CRT. (English) Zbl 1517.94160

Chen, Liqun (ed.) et al., Information security. 21st international conference, ISC 2018, Guildford, UK, September 9–12, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11060, 250-267 (2018).
MSC:  94A60 68M11
PDFBibTeX XMLCite
Full Text: DOI

An almost non-interactive order preserving encryption scheme. (English) Zbl 1515.68116

Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 87-100 (2018).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

A generic construction of integrated secure-channel free PEKS and PKE. (English) Zbl 1515.68123

Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 69-86 (2018).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

SCInfer: refinement-based verification of software countermeasures against side-channel attacks. (English) Zbl 1511.68173

Chockler, Hana (ed.) et al., Computer aided verification. 30th international conference, CAV 2018, held as part of the federated logic conference, FloC 2018, Oxford, UK, July 14–17, 2018. Proceedings. Part II. Cham: Springer Open. Lect. Notes Comput. Sci. 10982, 157-177 (2018).
MSC:  68Q60 68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Model checking indistinguishability of randomized security protocols. (English) Zbl 1511.68148

Chockler, Hana (ed.) et al., Computer aided verification. 30th international conference, CAV 2018, held as part of the federated logic conference, FloC 2018, Oxford, UK, July 14–17, 2018. Proceedings. Part II. Cham: Springer Open. Lect. Notes Comput. Sci. 10982, 117-135 (2018).
PDFBibTeX XMLCite
Full Text: DOI

Software model checking for mobile security – collusion detection in \(\mathbb{K} \). (English) Zbl 1508.68214

del Mar Gallardo, María (ed.) et al., Model checking software. 25th international symposium, SPIN 2018, Malaga, Spain, June 20–22, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10869, 3-25 (2018).
MSC:  68Q60 68N25 68Q55
PDFBibTeX XMLCite
Full Text: DOI

Relating process languages for security and communication correctness (extended abstract). (English) Zbl 1508.68249

Baier, Christel (ed.) et al., Formal techniques for distributed objects, components, and systems. 38th IFIP WG 6.1 international conference, FORTE 2018, held as part of the 13th international federated conference on distributed computing techniques, DisCoTec 2018, Madrid, Spain, June 18–21, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10854, 79-100 (2018).
MSC:  68Q85 68M25
PDFBibTeX XMLCite
Full Text: DOI

Multi-level access control, directed graphs and partial orders in flow control for data secrecy and privacy. (English) Zbl 1505.68003

Imine, Abdessamad (ed.) et al., Foundations and practice of security. 10th international symposium, FPS 2017, Nancy, France, October 23–25, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10723, 111-123 (2018).
MSC:  68M25 68P27
PDFBibTeX XMLCite
Full Text: DOI

Decentralized policy-hiding ABE with receiver privacy. (English) Zbl 1496.68072

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 548-567 (2018).
PDFBibTeX XMLCite
Full Text: DOI

Making any attribute-based encryption accountable, efficiently. (English) Zbl 1496.68068

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 527-547 (2018).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Rifflescrambler – a memory-hard password storing function. (English) Zbl 1496.68062

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 309-328 (2018).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Logarithmic-size ring signatures with tight security from the DDH assumption. (English) Zbl 1500.94073

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 288-308 (2018).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security. (English) Zbl 1496.68076

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 228-246 (2018).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Efficient and secure outsourcing of differentially private data publication. (English) Zbl 1496.68070

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 187-206 (2018).
MSC:  68M25 68P25 68P27
PDFBibTeX XMLCite
Full Text: DOI

Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases. (English) Zbl 1496.68128

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 167-186 (2018).
MSC:  68P15 68M25 68P27
PDFBibTeX XMLCite
Full Text: DOI

Towards efficient verifiable conjunctive keyword search for large encrypted database. (English) Zbl 1496.68130

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 83-100 (2018).
MSC:  68P15 68M25 68P25
PDFBibTeX XMLCite
Full Text: DOI

Efficiently deciding equivalence for standard primitives and phases. (English) Zbl 1496.68060

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 491-511 (2018).
MSC:  68M25 68P27 94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Anonymous single-sign-on for \(n\) designated services with traceability. (English) Zbl 1496.68064

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 470-490 (2018).
MSC:  68M25 68P27 94A62
PDFBibTeX XMLCite
Full Text: DOI arXiv

Stateful protocol composition. (English) Zbl 1496.68065

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 427-446 (2018).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Automated identification of desynchronisation attacks on shared secrets. (English) Zbl 1496.68071

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 406-426 (2018).
MSC:  68M25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

POR for security protocol equivalences. Beyond action-determinism. (English) Zbl 1496.68055

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 385-405 (2018).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Efficient proof composition for verifiable computation. (English) Zbl 1496.68067

Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11098, 152-171 (2018).
MSC:  68M25 68T05 94A60
PDFBibTeX XMLCite
Full Text: DOI

CacheShuffle: a family of oblivious shuffles. (English) Zbl 1499.68055

Chatzigiannakis, Ioannis (ed.) et al., 45th international colloquium on automata, languages, and programming. ICALP 2018, Prague, Czech Republic, July 9–13, 2018. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 107, Article 161, 13 p. (2018).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical and provably secure onion routing. (English) Zbl 1499.68044

Chatzigiannakis, Ioannis (ed.) et al., 45th international colloquium on automata, languages, and programming. ICALP 2018, Prague, Czech Republic, July 9–13, 2018. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 107, Article 144, 14 p. (2018).
MSC:  68M25 68M12 68P27
PDFBibTeX XMLCite
Full Text: DOI arXiv

Analysing privacy-type properties in cryptographic protocols (invited talk). (English) Zbl 1462.68017

Kirchner, Hélène (ed.), 3rd international conference on formal structures for computation and deduction, FSCD 2018, July 9–12, 2018, Oxford, United Kingdom. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 108, Article 1, 21 p. (2018).
PDFBibTeX XMLCite
Full Text: DOI

Combining symbolic and numerical domains for information leakage analysis. (English) Zbl 1461.68054

Gavrilova, Marina L. (ed.) et al., Transactions on Computational Science XXXI. Special issue on signal processing and security in distributed systems. Berlin: Springer. Lect. Notes Comput. Sci. 10730, 98-135 (2018).
MSC:  68N30 68M25 68P15
PDFBibTeX XMLCite
Full Text: DOI Link

Intercepting blackhole attacks in MANETs: an ASM-based model. (English) Zbl 1461.68047

Cerone, Antonio (ed.) et al., Software engineering and formal methods. SEFM 2017 collocated workshops: DataMod, FAACS, MSE, CoSim-CPS, and FOCLASA, Trento, Italy, September 4–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10729, 137-152 (2018).
MSC:  68M25 68M12
PDFBibTeX XMLCite
Full Text: DOI

An algebraic approach for reasoning about information flow. (English) Zbl 1460.68035

Havelund, Klaus (ed.) et al., Formal methods. 22nd international symposium, FM 2018, held as part of the federated logic conference, FloC 2018, Oxford, UK, July 15–17, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10951, 55-72 (2018).
MSC:  68P30 68M25 68Q60
PDFBibTeX XMLCite
Full Text: DOI arXiv

On the computational complexity of minimal cumulative cost graph pebbling. (English) Zbl 1460.68044

Meiklejohn, Sarah (ed.) et al., Financial cryptography and data security. 22nd international conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 10957, 329-346 (2018).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key. (English) Zbl 1460.94071

Meiklejohn, Sarah (ed.) et al., Financial cryptography and data security. 22nd international conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 10957, 160-179 (2018).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Revisiting anonymous two-factor authentication schemes for multi-server environment. (English) Zbl 1458.94316

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 805-816 (2018).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

USB packets filtering policies and an associated low-cost simulation framework. (English) Zbl 1461.93504

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 732-742 (2018).
MSC:  93E11 94C99
PDFBibTeX XMLCite
Full Text: DOI

Publicly verifiable static proofs of storage: a novel scheme and efficiency comparisons. (English) Zbl 1458.94252

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 459-477 (2018).
MSC:  94A60 68M11
PDFBibTeX XMLCite
Full Text: DOI

Key dependent message security for revocable identity-based encryption and identity-based encryption. (English) Zbl 1458.94289

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 426-441 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Community discovery of attribution trace based on deep learning approach. (English) Zbl 1497.68081

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 342-357 (2018).
PDFBibTeX XMLCite
Full Text: DOI

On security in encrypted computing. (English) Zbl 1497.68074

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 192-211 (2018).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Low-rate DoS attack detection based on two-step cluster analysis. (English) Zbl 1497.68080

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 92-104 (2018).
MSC:  68M25
PDFBibTeX XMLCite
Full Text: DOI

An ambiguous coding scheme for selective encryption of high entropy volumes. (English) Zbl 1493.68135

D’Angelo, Gianlorenzo (ed.), 17th symposium on experimental algorithms, SEA 2018, June 27–29, 2018, L’Aquila, Italy. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 103, Article 7, 13 p. (2018).
MSC:  68P25 68P30
PDFBibTeX XMLCite
Full Text: DOI

Probabilistic disclosure: maximisation vs. minimisation. (English) Zbl 1491.68106

Lokam, Satya (ed.) et al., 37th IARCS annual conference on foundations of software technology and theoretical computer science, FSTTCS 2017, IIT Kanpur, India, December 12–14, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 93, Article 13, 14 p. (2018).
PDFBibTeX XMLCite
Full Text: DOI

Some open problems in information-theoretic cryptography. (English) Zbl 1493.94044

Lokam, Satya (ed.) et al., 37th IARCS annual conference on foundations of software technology and theoretical computer science, FSTTCS 2017, IIT Kanpur, India, December 12–14, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 93, Article 5, 7 p. (2018).
PDFBibTeX XMLCite
Full Text: DOI

Authenticated group key agreement protocol without pairing. (English) Zbl 1450.94044

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 606-618 (2018).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Verifiable and forward secure dynamic searchable symmetric encryption with storage efficiency. (English) Zbl 1437.68055

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 489-501 (2018).
MSC:  68P25 68P15 68P20
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 3

Main Field

Biographic Reference

all top 3

Software