搜索结果: 1-15 共查到“数据安全与计算机安全 security”相关记录22条 . 查询时间(0.139 秒)
![](http://www.firstlight.cn/upload/imgfile/20236/12/20236121545819.png)
![](http://www.firstlight.cn/upload/imgfile/20236/20/202362017816335.jpg)
15th International Conference on Cryptology and Network Security
computer security Cryptology
2016/7/19
The International Conference on Cryptology and Network Security (CANS) is a recognized annual conference, focusing on all aspects of cryptology, and of data, network, and computer security, attracting...
ICITS 2016:9th International Conference on Information Theoretic Security
Key message rates
2016/7/19
This is the ninth in a series of conferences that aims to bring together the leading researchers in the areas of information theory, quantum information theory, and cryptography. ICITS covers all aspe...
Tight security bounds for Multiple Encryption
Tight security bounds for Multiple Encryption
2016/1/22
Multiple encryption—the practice of composing a blockcipher several times with itself under independent keys—has received considerable attention of late from the standpoint of provable security.Despit...
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
block ciphers key-length extension provable security ideal-cipher model
2016/1/22
We revisit the security (as a pseudorandom permutation) of cascading-based constructions for block-cipher key-length extension. Pre-vious works typically considered the extreme case where the adversar...
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Secure Signatures Chosen Ciphertext Security
2015/8/5
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext
security. In the case of signatures, we enhance the standard chosen message query model
by allowing the adver...
Computer security tools for journalists lacking in a post-Snowden world
Computer security tools journalists lacking post-Snowden world
2015/8/4
Edward Snowden’s leak of classified documents to journalists around the world about massive government surveillance programs and threats to personal privacy ultimately resulted in aPulitzer ...
This work analyzes and discusses the current security environment of today's (and future) smartphones, and proposes a security model which will reduce smartphone vulnerabilities, preserving privacy, i...
Privacy and Security Risks and Requirements with Healthcare IT: Hitting a Home Run Instead of a Foul Ball
electronic discovery privacy security health information social media cloud computing wireless mobile devices
2014/12/20
Using baseball as a metaphor, this practical, engaging session will explore the security and privacy risks with a number of technologies for storing, handling and communicating health information and ...
![](http://www.firstlight.cn/upload/imgfile/201412/2/201412217142294.jpg)
Leading researchers to discuss privacy and security in a connected age(图)
discuss privacy and security connected age
2014/12/2
As we increasingly rely on the Internet to connect to everything from banks and electrical grids to medical devices and autonomous vehicles, we are exposed to new vulnerabilities that threaten our sec...
The Collision Security of Tandem-DM in the Ideal Cipher Model
Collision Security Tandem-DM Cipher Model
2012/12/3
We prove that Tandem-DM, which is one of the two “classical” schemes for turning a blockcipher of 2n-bit key into a double block length hash function, has birthday-type collision resistance in the ide...
2010国际信息安全及其应用研讨会(International Workshop on Information Security and Applications 2010)
国际计算机与信息科学协会 康科迪亚大学 河北省自然科学基金会 燕山大学 2010 国际信息安全及其应用 研讨会
2010/4/14
第二届国际信息安全及其应用研讨会(IWISA 2010)将于2010年10月22日至25日,在燕山大学(中国秦皇岛)举办。 此次会议由秦皇岛大学(中国)、青岛理工大学(中国)、康科迪亚大学(加拿大)、国际计算机与信息科学协会(ACIS)(美国)、特伦特大学(加拿大)、河北省自然科学基金会(中国)、河北省数学会(中国),河北省工业与应用数学协会(中国)联合举办。此次学术会议旨在加强相关主题的国际学术...
2010 International Conference on Multimedia Information Networking and Security(MINES 2010)
2010 Conference Multimedia Information Networking Security MINES
2010/2/24
We cordially invite you to attend the 2010 International Conference on Multimedia Information Networking and Security (MINES 2010) to be held on November 4–6, 2010 in Nanjing, China. MINES2010 will be...
A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption
Network Security Military Ad-hoc network Cryptography Signcryption Multi-tiered Structures
2010/10/12
Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing infrastructureless communication. However, maintaining secure and instant information ...