Browse Results

Showing 91,126 through 91,150 of 100,000 results

Applied Cryptography and Network Security Workshops: ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14587)

by Martin Andreoni

This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, held in Abhu Dabhi, United Arab Emirates, during March 5-8, 2024. The 33 full papers and 11 poster papers presented in this volume were carefully reviewed and selected from 62 submissions. They stem from the following workshops: 6th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2024). 5th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2024). 6th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2024). 5th ACNS Workshop on Secure Cryptographic Implementation (SCI 2024). 1st Workshop on Advances in Asymmetric Cryptanalysis (AAC 2024). 6th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2024). 1st Workshop on Low-Latency Encryption (LLE 2024). 4th ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2024).

Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9092)

by Tal Malkin Vladimir Kolesnikov Allison Bishop Lewko Michalis Polychronakis

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (Lecture Notes in Computer Science #9696)

by Ahmad-Reza Sadeghi Mark Manulis Steve Schneider

This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy.

Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings (Lecture Notes in Computer Science #10355)

by Atsuko Miyaji Dieter Gollmann Hiroaki Kikuchi

This book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017. The 34 papers presented in this volume were carefully reviewed and selected from 149 submissions. The topics focus on innovative research and current developments that advance the areas of applied cryptography, security analysis, cyber security and privacy, data and server security.

Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings (Lecture Notes in Computer Science #10892)

by Bart Preneel Frederik Vercauteren

This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.

Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings (Lecture Notes in Computer Science #11464)

by Moti Yung Robert H. Deng Valérie Gauthier-Umaña Martín Ochoa

This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques.

Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12146)

by Mauro Conti Jianying Zhou Emiliano Casalicchio Angelo Spognardi

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.

Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12147)

by Mauro Conti Jianying Zhou Emiliano Casalicchio Angelo Spognardi

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.

Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part I (Lecture Notes in Computer Science #12726)

by Kazue Sako Nils Ole Tippenhauer

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.

Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II (Lecture Notes in Computer Science #12727)

by Kazue Sako Nils Ole Tippenhauer

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.

Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part II (Lecture Notes in Computer Science #13906)

by XiaoFeng Wang Mehdi Tibouchi

The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain.

Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14583)

by Lejla Batina Christina Pöpper

The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.

Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14584)

by Lejla Batina Christina Pöpper

The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.

Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III (Lecture Notes in Computer Science #14585)

by Lejla Batina Christina Pöpper

The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.

Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part I (Lecture Notes in Computer Science #15825)

by Marc Fischlin Veelasha Moonsamy

This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.

Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part II (Lecture Notes in Computer Science #15826)

by Marc Fischlin Veelasha Moonsamy

This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.

Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part III (Lecture Notes in Computer Science #15827)

by Marc Fischlin Veelasha Moonsamy

This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.

Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core

by Stephen Haunts

Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution. Applied Cryptography in .NET and Azure Key Vault begins with an introduction to the dangers of data breaches and the basics of cryptography. It then takes you through important cryptographic techniques and practices, from hashing and symmetric/asymmetric encryption, to key storage mechanisms. By the end of the book, you’ll know how to combine these cryptographic primitives into a hybrid encryption scheme that you can use in your applications. Author Stephen Haunts brings 25 years of software development and security experience to the table to give you the concrete skills, knowledge, and code you need to implement the latest encryption standards in your own projects.What You'll LearnGet an introduction to the principles of encryptionUnderstand the main cryptographic protocols in use today, including AES, DES, 3DES, RSA, SHAx hashing, HMACs, and digital signaturesCombine cryptographic techniques to create a hybrid cryptographic scheme, with the benefits of confidentiality, integrity, authentication, and non-repudiationUse Microsoft's Azure Key Vault to securely store encryption keys and secretsBuild real-world code to use in your own projectsWho This Book Is ForSoftware developers with experience in .NET and C#. No prior knowledge of encryption and cryptographic principles is assumed.

Applied Cryptography in Computer and Communications: First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #386)

by Bo Chen Xinyi Huang

This book constitutes the refereed post-conference proceedings of the First International Conference on Applied Cryptography in Computer and Communications, AC3 2021, and the First International Workshop on Security for Internet of Things (IoT). The conference was held in May 2021 and due to COVID-19 pandemic virtually.The 15 revised full papers were carefully reviewed and selected from 42 submissions. The papers present are grouped in 4 tracks on blockchain; authentication; secure computation; practical crypto application. They detail technical aspects of applied cryptography, including symmetric cryptography, public-key cryptography, cryptographic protocols, cryptographic implementations, cryptographic standards and practices.

Applied Cryptography in Computer and Communications: Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #448)

by Jingqiang Lin Qiang Tang

This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually.The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application.

Applied Cryptography: Protocols, Algorithms and Source Code in C

by Bruce Schneier

.

Applied Cryptography: Protocols, Algorithms and Source Code in C

by Bruce Schneier

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

Applied Cyber-Physical Systems

by Abdullah Eroglu Sang C. Suh John N. Carbone U. John Tanik

Applied Cyber-Physical Systems presents the latest methods and technologies in the area of cyber-physical systems including medical and biological applications. Cyber-physical systems (CPS) integrate computing and communication capabilities by monitoring, and controlling the physical systems via embedded hardware and computers. This book brings together unique contributions from renowned experts on cyber-physical systems research and education with applications. It also addresses the major challenges in CPS, and then provides a resolution with various diverse applications as examples. Advanced-level students and researchers focused on computer science, engineering and biomedicine will find this to be a useful secondary text book or reference, as will professionals working in this field.

Applied Dairy Microbiology (Food Science and Technology)

by Elmer H. Marth James L. Steele

This thoroughly revised and updated reference provides comprehensive coverage of the latest developments and scientific advances in dairy microbiology-emphasizing probiotics, fermented dairy products, disease prevention, and public health and regulatory control standards for dairy foods. Containing more than 2350 bibliographic citations, tables, dr

Applied Data Analysis and Modeling for Energy Engineers and Scientists

by T. Agami Reddy Gregor P. Henze

Now in a thoroughly revised and expanded second edition, this classroom-tested text demonstrates and illustrates how to apply concepts and methods learned in disparate courses such as mathematical modeling, probability, statistics, experimental design, regression, optimization, parameter estimation, inverse modeling, risk analysis, decision-making, and sustainability assessment methods to energy processes and systems. It provides a formal structure that offers a broad and integrative perspective to enhance knowledge, skills, and confidence to work in applied data analysis and modeling problems. This new edition also reflects recent trends and advances in statistical modeling as applied to energy and building processes and systems. It includes numerous examples from recently published technical papers to nurture and stimulate a more research-focused mindset. How the traditional stochastic data modeling methods complement data analytic algorithmic approaches such as machine learning and data mining is also discussed. The important societal issue related to the sustainability of energy systems is presented, and a formal structure is proposed meant to classify the various assessment methods found in the literature. Applied Data Analysis and Modeling for Energy Engineers and Scientists is designed for senior-level undergraduate and graduate instruction in energy engineering and mathematical modeling, for continuing education professional courses, and as a self-study reference book for working professionals. In order for readers to have exposure and proficiency with performing hands-on analysis, the open-source Python and R programming languages have been adopted in the form of Jupyter notebooks and R markdown files, and numerous data sets and sample computer code reflective of real-world problems are available online.

Refine Search

Showing 91,126 through 91,150 of 100,000 results