搜索结果: 1-15 共查到“计算机科学技术基础学科 Security”相关记录25条 . 查询时间(0.122 秒)
15th International Conference on Cryptology and Network Security
computer security Cryptology
2016/7/19
The International Conference on Cryptology and Network Security (CANS) is a recognized annual conference, focusing on all aspects of cryptology, and of data, network, and computer security, attracting...
ICITS 2016:9th International Conference on Information Theoretic Security
Key message rates
2016/7/19
This is the ninth in a series of conferences that aims to bring together the leading researchers in the areas of information theory, quantum information theory, and cryptography. ICITS covers all aspe...
Tight security bounds for Multiple Encryption
Tight security bounds for Multiple Encryption
2016/1/22
Multiple encryption—the practice of composing a blockcipher several times with itself under independent keys—has received considerable attention of late from the standpoint of provable security.Despit...
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
block ciphers key-length extension provable security ideal-cipher model
2016/1/22
We revisit the security (as a pseudorandom permutation) of cascading-based constructions for block-cipher key-length extension. Pre-vious works typically considered the extreme case where the adversar...
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Secure Signatures Chosen Ciphertext Security
2015/8/5
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext
security. In the case of signatures, we enhance the standard chosen message query model
by allowing the adver...
Computer security tools for journalists lacking in a post-Snowden world
Computer security tools journalists lacking post-Snowden world
2015/8/4
Edward Snowden’s leak of classified documents to journalists around the world about massive government surveillance programs and threats to personal privacy ultimately resulted in aPulitzer ...
Security Analysis of Geoencryption:A Case Study Using Loran
Security Analysis Geoencryption
2015/6/25
The term “geoencryption” or “location-based encryption” refer to a security algorithm that limits the access or decryption of information content to specified locations and/or times. The algorithm doe...
This work analyzes and discusses the current security environment of today's (and future) smartphones, and proposes a security model which will reduce smartphone vulnerabilities, preserving privacy, i...
Privacy and Security Risks and Requirements with Healthcare IT: Hitting a Home Run Instead of a Foul Ball
electronic discovery privacy security health information social media cloud computing wireless mobile devices
2014/12/20
Using baseball as a metaphor, this practical, engaging session will explore the security and privacy risks with a number of technologies for storing, handling and communicating health information and ...
The Security and Privacy Implications of Energy-Proportional Computing
energy proportionality power analysis privacy security
2014/12/18
The parallel trends of greater energy-efficiency and more aggressive power management are yielding computers that inch closer to energy-proportional computing with every generation. Energy-proportiona...
Leading researchers to discuss privacy and security in a connected age(图)
discuss privacy and security connected age
2014/12/2
As we increasingly rely on the Internet to connect to everything from banks and electrical grids to medical devices and autonomous vehicles, we are exposed to new vulnerabilities that threaten our sec...
Security Issues in Networked Embedded Devices
Embedded devices intelligent household networks industrial automation the traditional embedded computing
2014/11/7
Embedded devices are ubiquitous; they are present in various sectors of everyday life: smart homes, automobiles, health care, telephony, industrial automation, networking etc. Embedded systems are wel...
The Collision Security of Tandem-DM in the Ideal Cipher Model
Collision Security Tandem-DM Cipher Model
2012/12/3
We prove that Tandem-DM, which is one of the two “classical” schemes for turning a blockcipher of 2n-bit key into a double block length hash function, has birthday-type collision resistance in the ide...