Applied Cryptography and Network Security

Results: 16



#Item
11Number theory / Factorial / Mathematics / Combinatorics / Integer sequences

This is the Full Version of the Extended Abstract that appears in the Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS ’15) (2–5 June 2015, New York, USA) Tal Malkin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 10:46:41
12Public safety / Cryptography / Computer network security / Computer security / Information security / Security engineering / Smart card / Cryptographic primitive / Institute for Applied Information Processing and Communications / Security / Crime prevention / National security

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science

Add to Reading List

Source URL: www.zisc.ethz.ch

Language: English - Date: 2015-02-14 08:12:18
13Internet standards / Secure communication / Transport Layer Security / Symmetric-key algorithm / Public-key cryptography / Block cipher / Advanced Encryption Standard / Cryptographic hash function / Cipher / Cryptography / Cryptographic protocols / Internet protocols

Report on DIMACS∗ Tutorial on Applied Cryptography and Network Security Date of tutorial: August 4 – 7, 2003 Tutorial Organizer: Rebecca Wright, Stevens Institute of Technology Primary Lecturer:

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-02-19 13:05:52
14Internet protocols / Block cipher modes of operation / Botnet / Malware / RC4 / Transmission Control Protocol / Internet security / Password authentication protocol / Transport Layer Security / Cryptography / Computing / Computer network security

P ROV E X: Detecting Botnets with Encrypted Command and Control Channels Christian Rossow †‡? and Christian J. Dietrich †¶ †University of Applied Sciences Gelsenkirchen, Institute for Internet Security, Germany

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2013-04-16 08:32:23
15Internet protocols / Computing / Cryptography / Internet standards / Computer network security / Transport Layer Security / Cipher suite / Phishing / Internet security / Cryptographic protocols / Secure communication / Security

eID Online Authentication Network Threat Model, Attacks and Implications Christian J. Dietrich1,2 , Christian Rossow1,3 , and Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirc

Add to Reading List

Source URL: www.cj2s.de

Language: English - Date: 2012-03-21 04:32:04
16Applied Cryptography and Network Security / Fusionopolis / Computer security / Cyber-physical system / Network security / Technology / Cloud computing / Cyberwarfare / Security / Computer network security / Computing

INTELLIGENCE Infocomm Security As the internet and the devices that access it become truly ubiquitous, infocomm security is becoming increasingly critical. Organisations and individuals need to keep up with cyber attack

Add to Reading List

Source URL: icsd.i2r.a-star.edu.sg

Language: English - Date: 2014-03-16 22:50:47
UPDATE