Browse Results

Showing 72,176 through 72,200 of 85,207 results

Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers (Lecture Notes in Computer Science #7707)

by Lars R. Knudsen Huapeng Wu

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC 2012, held in Windsor, Ontario, Canada, in August 2012. The 24 papers presented were carefully reviewed and selected from 87 submissions. They are organized in topical sections named: cryptanalysis, digital signatures, stream ciphers, implementations, block cipher cryptanalysis, lattices, hashfunctions, blockcipher constructions, and miscellaneous.

Selected Areas in Cryptography

by Evangelos Kranakis Paul C. Van Oorschot

Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area. Selected Areas in Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers (Lecture Notes in Computer Science #3006)

by Mitsuru Matsui Robert Zuccherato

This book constitutes the thoroughly refereed postproceedings of the 10th Annual International Workshop on Selected Areas in Cryptography, SAC 2003, held in Ottawa, Canada, in August 2003. The 25 revised full papers presented were carefully selected from 85 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic and hyperelliptic curves, side channel attacks, security protocols and applications, cryptanalysis, cryptographic primitives, stream ciphers, and efficient implementations.

Selected Areas in Cryptography: 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papers (Lecture Notes in Computer Science #7118)

by Ali Miri Serge Vaudenay

This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography.

Selected Areas in Cryptography: 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers (Lecture Notes in Computer Science #3897)

by Bart Preneel Stafford Tavares

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Selected Areas in Cryptography, SAC 2005, held in Canada in August 2005. The 25 revised full papers presented were carefully reviewed and selected from 96 submissions for inclusion in the book. The papers are organized in topical sections.

Selected Areas in Cryptography: 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13742)

by Benjamin Smith Huapeng Wu

This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, during August 24–26, 2022. The 21 full papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are categorized into the following topical sections: lattices and ECC; differential cryptanalysis; cryptographic primitives; isogeny-based cryptography I; block ciphers; differential cryptanalysis II; isogeny-based cryptography II; and protocols and PRFs.

Selected Areas in Cryptography: 5th Annual International Workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings (Lecture Notes in Computer Science #1556)

by Stafford Tavares Henk Meijer

AC’98 A C - . AC’94 AC’96 ’ ! K AC’95 AC’97 C ! O . & . I - * . & * AC’98 : • D A ** K C * • E? I* * C * • C I • /M N O 39 * AC’98,26 - * .& ! , A M K A * E B * I O ! J :C J -3

Selected Areas in Cryptography – SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers (Lecture Notes in Computer Science #10532)

by Roberto Avanzi Howard Heys

This book contains revised selected papers from the 23rd International Conference on Selected Areas in Cryptography, SAC 2016, held in St. John's, NL, Canada in August 2016. The 28 full papers and 2 invited papers presented in this volume were carefully reviewed and selected from 100 submissions. They are organized in the following topical sections: side channels and fault attacks; design and implementation of symmetric cryptography; efficient symmetric primitives; cryptanalysis of symmetric primitives; MACs and PRNGs; lattice-based cryptography; and cryptanalysis of asymmetric primitives.

Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers (Lecture Notes in Computer Science #10719)

by Carlisle Adams Jan Camenisch

This book contains revised selected papers from the 24th International Conference on Selected Areas in Cryptography, SAC 2017, held in Ottawa, ON, Canada in August 2017. The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. The focus of the conference was on specific themes in the area of cryptographic system design and analysis such as:Design and analysis of symmetric key cryptosystemsPrimitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithmsEfficient implementations of symmetric and public key algorithms

Selected Areas in Cryptography – SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11349)

by Carlos Cid Michael J. Jacobson Jr.

This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas:design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemesefficient implementations of symmetric and public key algorithmsmathematical and algorithmic aspects of applied cryptologycryptography for the Internet of Things

Selected Areas in Cryptography – SAC 2019: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11959)

by Kenneth G. Paterson Douglas Stebila

This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019. The 26 full papers presented in this volume were carefully reviewed and selected from 74 submissions. They cover the following research areas: Design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, cryptography for the Internet of Things.

Selected Areas in Cryptography – SAC 2023: 30th International Conference, Fredericton, Canada, August 14–18, 2023, Revised Selected Papers (Lecture Notes in Computer Science #14201)

by Claude Carlet Kalikinkar Mandal Vincent Rijmen

This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography, SAC 2023, held in Fredericton, New Brunswick, Canada, in August 2023.The 21full papers presented in these proceedings were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: Cryptanalysis of Lightweight Ciphers; Side-Channel Attacks and Countermeasures; Post-Quantum Constructions; Symmetric cryptography and fault attacks; Post-Quantum Analysis and Implementations; Homomorphic encryption; Public-Key Cryptography; and Differential Cryptanalysis.

Selected Areas in Cryptography -- SAC 2013: 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers (Lecture Notes in Computer Science #8282)

by Tanja Lange Kristin Lauter Petr Lisoněk

This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: lattices; discrete logarithms; stream ciphers and authenticated encryption; post-quantum (hash-based and system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks. The book also contains 3 full-length invited talks.

Selected Areas in Cryptography -- SAC 2014: 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers (Lecture Notes in Computer Science #8781)

by Antoine Joux Amr Youssef

This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.

Selected Areas in Cryptography - SAC 2015: 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9566)

by Orr Dunkelman Liam Keliher

This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes.

Selected Contributions in Data Analysis and Classification (Studies in Classification, Data Analysis, and Knowledge Organization)

by Paula Brito Patrice Bertrand Guy Cucumel Francisco De Carvalho

This volume presents recent methodological developments in data analysis and classification. It covers a wide range of topics, including methods for classification and clustering, dissimilarity analysis, consensus methods, conceptual analysis of data, and data mining and knowledge discovery in databases. The book also presents a wide variety of applications, in fields such as biology, micro-array analysis, cyber traffic, and bank fraud detection.

Selected Contributions on Statistics and Data Science in Latin America: 33 FNE and 13 CLATSE, 2018, Guadalajara, Mexico, October 1−5 (Springer Proceedings in Mathematics & Statistics #301)

by Isadora Antoniano-Villalobos Ramsés H. Mena Manuel Mendoza Lizbeth Naranjo Luis E. Nieto-Barajas

The volume includes a collection of peer-reviewed contributions from among those presented at the main conference organized yearly by the Mexican Statistical Association (AME) and every two years by a Latin-American Confederation of Statistical Societies. For the 2018 edition, particular attention was placed on the analysis of highly complex or large data sets, which have come to be known as “big data”. Statistical research in Latin America is prolific and research networks span within and outside the region. The goal of this volume is to provide access to selected works from Latin-American collaborators and their research networks to a wider audience. New methodological advances, motivated in part by the challenges of a data-driven world and the Latin American context, will be of interest to academics and practitioners around the world.

Selected Papers

by Calvin C. Elgot

Cal Elgot was a very serious and thoughtful researcher, who with great determi­ nation attempted to find basic explanations for certain mathematical phenomena­ as the selection of papers in this volume well illustrate. His approach was, for the most part, rather finitist and constructivist, and he was inevitably drawn to studies of the process of computation. It seems to me that his early work on decision problems relating automata and logic, starting with his thesis under Roger Lyndon and continuing with joint work with Biichi, Wright, Copi, Rutledge, Mezei, and then later with Rabin, set the stage for his attack on the theory of computation through the abstract treatment of the notion of a machine. This is also apparent in his joint work with A. Robinson reproduced here and in his joint papers with John Shepherdson. Of course in the light of subsequent work on decision problems by Biichi, Rabin, Shelah, and many, many others, the subject has been placed on a completely different plane from what it was when Elgot left the area. But I feel that his papers, results-and style-were very definitely influential at the time and may well have altered the course of the investigation of these problems. As Sammy Eilenberg explains, the next big influence on Elgot's thinking was category theory, which gave him a way of expressing his ideas in a sharply algebraic manner. The joint book with Eilenberg is one illustration of this influence.

Selected Papers

by Igor E. Tamm

I.E. Tamm is one of the great figures of 20th century physics and the mentor of the late A.D. Sakharov. Together with I.M. Frank, he received the Nobel Prize in 1958 for the explanation of the Cherenkov effect. This book contains a commented selection of his most important contributions to the physical literature and essays on his contemporaries - Mandelstam, Einstein, Landau, and Bohr - as well as his contributions to Pugwash conferences. About a third of the selections originally appeared in Russian and are, to our knowledge, for the first time now available to Western readers. This volume includes a preface by Sir Rudolf Peierls, a biography compiled by Tamm's former students, V.Ya. Frenkel and B.M. Bolotovskii, and a complete bibliography.

Selected Papers from the 10th International Conference on E-Business and Applications 2024

by Pui Mun Lee Gyu Myoung Lee

This book brings together original, peer-reviewed research papers from the 2024 10th International Conference on E-Business and Applications, held in Singapore from February 26 to 28, 2024. The papers delve into AI-enabled business innovation, data-driven value creation, and the emerging IoT landscape, providing in-depth insights into these rapidly evolving fields. The book bridges the gap between business intelligence, artificial intelligence, and e-commerce trading technologies, offering a holistic perspective on the intersection of these disciplines. Readers can gain valuable knowledge through real-world examples, data visualization techniques, and business analytics applications, enhancing their understanding of how these concepts translate into tangible business outcomes.

Selected Perspectives on Platforms in E-Commerce Ecosystems: Recommendations for the Design and Management of Boundary Resources and Guidance on the Orchestration of Ecosystem Participants

by Tobias Wulfert

Digital platforms hold significant economic value, enriching various industry sectors. While they are pivotal in driving value creation and capture, it is not solely their technological prowess that underpins their economic significance. Rather, their effectiveness lies in their integration within business ecosystems. In this study, Tobias Wulfert examines digital platforms in the context of e-commerce through five lenses: · Enterprise architecture · Boundary resources · Application lifecycle · Dynamic capabilities · Value creation This analysis focuses on different e-commerce platform types, developing an architectural framework and a taxonomy for classification. The author also delineates e-commerce ecosystem architectures, emphasizing the role of platforms as central components and the involvement of peripheral ecosystem participants. He explores boundary resources as crucial interfaces between platforms and ecosystem participants. He further suggests a reference procedure model for the management of these boundary resources. Furthermore, he delves into the dynamic capabilities necessary for effective ecosystem orchestration, identifying configurations of dynamic capabilities that can confer sustainable competitive advantages.

Selected Reflections in Language, Logic, and Information: ESSLLI 2019, ESSLLI 2020 and ESSLLI 2021 Student Sessions, Selected Papers (Lecture Notes in Computer Science #14354)

by Alexandra Pavlova Mina Young Pedersen Raffaella Bernardi

The European Summer School in Logic, Language and Information (ESSLLI) is organized every year by the Association for Logic, Language and Information (FoLLI) in different sites around Europe. The papers cover vastly dierent topics, but each fall in the intersection of the three primary topics of ESSLLI: Logic, Language and Computation. The 13 papers presented in this volume have been selected among 81 submitted papers over the years 2019, 2020 and 2021. The ESSLLI Student Session is an excellent venue for students to present their work and receive valuable feedback from renowned experts in their respective fields. The Student Session accepts submissions for three different tracks: Language and Computation (LaCo), Logic and Computation (LoCo), and Logic and Language (LoLa).

Refine Search

Showing 72,176 through 72,200 of 85,207 results