Enhanced Security Models for Operating Systems: A Cryptographic Approach
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Programming by sketching for bit-streaming programs
Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation
Addressing the trust asymmetry problem in grid computing with encrypted computation
LCR '04 Proceedings of the 7th workshop on Workshop on languages, compilers, and run-time support for scalable systems
Rights Protection for Categorical Data
IEEE Transactions on Knowledge and Data Engineering
An Identity Based Encryption system
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
Secure Software Development by Example
IEEE Security and Privacy
A model and architecture for pseudo-random generation with applications to /dev/random
Proceedings of the 12th ACM conference on Computer and communications security
IEEE Security and Privacy
Secrecy, flagging, and paranoia: adoption criteria in encrypted email
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Trust and tamper-proof software delivery
Proceedings of the 2006 international workshop on Software engineering for secure systems
A free, readily upgradeable, interactive tool for teaching encryption algorithms
Proceedings of the 43rd annual Southeast regional conference - Volume 1
Tracking cyberstalkers: a cryptographic approach
ACM SIGCAS Computers and Society
Evaluating and implementing a collaborative office document system
Interacting with Computers
Private stateful circuits secure against probing attacks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
IMSA'07 IASTED European Conference on Proceedings of the IASTED European Conference: internet and multimedia systems and applications
Cryptographic strength of ssl/tls servers: current and recent practices
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Designing a secure reliable file system for sensor networks
Proceedings of the 2007 ACM workshop on Storage security and survivability
A service-oriented WSRF-based architecture for metascheduling on computational Grids
Future Generation Computer Systems
Teaching cryptography with open-source software
Proceedings of the 39th SIGCSE technical symposium on Computer science education
Privacy in video surveilled spaces
Journal of Computer Security - Privacy, Security and Trust (PST) Technologies: Evolution and Challenges
Attacks on the RC4 stream cipher
Designs, Codes and Cryptography
EPIC: ending piracy of integrated circuits
Proceedings of the conference on Design, automation and test in Europe
Document logs: a distributed approach to metadata for better security and flexibility
Proceedings of the eighth ACM symposium on Document engineering
Optimized Certificates --- A New Proposal for Efficient Electronic Document Signature Validation
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Intellectual Property Protection for Embedded Sensor Nodes
SAMOS '08 Proceedings of the 8th international workshop on Embedded Computer Systems: Architectures, Modeling, and Simulation
An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
Tahoe: the least-authority filesystem
Proceedings of the 4th ACM international workshop on Storage security and survivability
Engineering of Software-Intensive Systems: State of the Art and Research Challenges
Software-Intensive Systems and New Computing Paradigms
Securing uniqueness of rights e-documents: a deontic process perspective
Journal of Theoretical and Applied Electronic Commerce Research
Privacy in video surveilled areas
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Adaptation-aware encryption of scalable H.264/AVC video for content security
Image Communication
Cryptanalysis of the random number generator of the Windows operating system
ACM Transactions on Information and System Security (TISSEC)
Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Security extensions for integrity and confidentiality in embedded processors
Microprocessors & Microsystems
Noise-enhanced encryption for physical layer security in an OFDM radio
RWS'09 Proceedings of the 4th international conference on Radio and wireless symposium
EurolMSA '07 Proceedings of the Third IASTED European Conference on Internet and Multimedia Systems and Applications
Practical physical-layer encryption: the marriage of optical noise with traditional cryptography
IEEE Communications Magazine
Wireless broadcast encryption based on smart cards
Wireless Networks
Timing-based localization of in-band wormhole tunnels in MANETs
Proceedings of the third ACM conference on Wireless network security
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Authentication of FPGA bitstreams: why and how
ARC'07 Proceedings of the 3rd international conference on Reconfigurable computing: architectures, tools and applications
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Robust iris verification for key management
Pattern Recognition Letters
Using WPKI for security of web transaction
EC-Web'07 Proceedings of the 8th international conference on E-commerce and web technologies
Efficient 15,360-bit RSA using woop-optimised montgomery arithmetic
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Enhanced mutual authentication and key exchange protocol for wireless communications
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Journal of Theoretical and Applied Electronic Commerce Research
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
Proceedings of the 17th ACM conference on Computer and communications security
Sponge-based pseudo-random number generators
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
Principles, Systems and Applications of IP Telecommunications
AEE'05 Proceedings of the 4th WSEAS international conference on Applications of electrical engineering
The security of cryptographic hashes
Proceedings of the 49th Annual Southeast Regional Conference
Private notes: encrypted XML notes synchronization and sharing with untrusted web services
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
On secure framework for web services in untrusted environment
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems
Ciphire mail email encryption and authentication
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Badger – a fast and provably secure MAC
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
H.323 client-independent security approach
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
On security of PAN wireless systems
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
A practical implementation of veiled certificate for user-centric privacy protection
Proceedings of the 50th Annual Southeast Regional Conference
A novel image encryption/decryption scheme based on chaotic neural networks
Engineering Applications of Artificial Intelligence
A closer look at authentication and authorization mechanisms for web-based applications
BICA'12 Proceedings of the 5th WSEAS congress on Applied Computing conference, and Proceedings of the 1st international conference on Biologically Inspired Computation
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
A study of entropy sources in cloud computers: random number generation on cloud hosts
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Entropy harvesting from physical sensors
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Object protection in distributed systems
Journal of Parallel and Distributed Computing
Prêt à voter providing everlasting privacy
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
Hi-index | 0.00 |
From the Publisher:In today's world, security is a top concern for businesses worldwide. Without a secure computer system, you don't make money, you don't expand, and -- bottom line -- you don't survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real-world systems. With Practical Cryptography, an author team of international renown provides you with the first hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications.