Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 81 dokumen yang sesuai dengan query
cover
" This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control ... "
Berlin: Springer, 2012
e20407128
eBooks  Universitas Indonesia Library
cover
Venturi, Daniele
" Tuttavia, l’analisi di sicurezza di questi schemi crittografici (fino ai primi anni ‘80) era soprattutto guidata dall’intuito e dall’esperienza. Nuovi schemi venivano ideati e, dopo qualche tempo, inevitabilmente, un nuovo attacco alla sicurezza veniva scoperto. Il paradigma della “sicurezza dimostrabile” ha trasformato la crittografia da arte a scienza, introducendo un paradigma for male per l’analisi di sicurezza dei crittosistemi: in questo modo è possibile fornire una dimostrazione matematica che un dato sistema è sicuro rispetto ... "
Milan: [Springer-Verlag, ], 2012
e20410660
eBooks  Universitas Indonesia Library
cover
Stallings, William
Boston: Pearson , 2017
005.8 STA c
Buku Teks  Universitas Indonesia Library
cover
" This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications ... "
Heidelberg : Springer, 2012
e20406883
eBooks  Universitas Indonesia Library
cover
" This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues ... "
Heidelberg: Springer, 2012
e20408388
eBooks  Universitas Indonesia Library
cover
Inu Laksito Wibowo
" Sistem kripto (data encryption) dengan kunci publik, mempunyai keunggulan dalam pengaturan kunci dibanding dengan sistem kripto yang konvensional. Pada sistem kripto konvensional, suatu jaringan komputer dengan n riser dibutuhkan n(n-1)2 kunci, sedangkan pada sistem kripto dengan kunci publik ini hanya dibutuhkan n kunci. Di samping mempunyai keunggulan pada pengaturan kunci, sistem kripto dengan kunci publik ini menjamin keaslian pesan yang dikirimkan oleh seorang user. Sistem kripto dengan kunci publik ini dapat pula diaplikasikan untuk pembuatan ... "
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 1992
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
David Pointcheval, editor
" This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key ... "
Berlin: Springer-Verlag, 2012
e20406359
eBooks  Universitas Indonesia Library
cover
Goichiro Hanaoka, editor
" This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols ... "
Berlin: Springer-Verlag, 2012
e204063781
eBooks  Universitas Indonesia Library
cover
Sabu M. Thampi, editor
" This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems ... "
Berlin: Springer, 2012
e20407173
eBooks  Universitas Indonesia Library
cover
Anne Canteaut, editor
" This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012. The 24 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 89 initial submissions. The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes of operation, new tools for cryptanalysis, new designs and Keccak ... "
Heidelberg : Springer, 2012
e20407294
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9   >>