[PDF][PDF] Insecurity by design: Today's IoT device security problem

M O'Neill - Engineering, 2016 - journal.hep.com.cn
In today's technological age someone could gain access to your online bank account
through a light bulb. This is due to the Internet of Things (IoT). The IoT has become a reality …

[图书][B] Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part III

G Rothblum, H Wee - 2023 - books.google.com
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the
21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan …

[图书][B] Practical privacy

JNE Bos - 1992 - Citeseer
Practical Privacy Page 1 Practical Privacy door Jurjen Norbert Eelco Bos Jurjen’s Dissertation
Version: Maa 7 okt 1996 @03:23 PM. Page -3 Page 2 ISBN 90 6196 405 9 Jurjen’s …

[图书][B] Information Security and Cryptology-ICISC 2023: 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea …

H Seo, S Kim - 2024 - books.google.com
The 26th International Conference on Information Security and Cryptology (ICISC 2023) was
held from November 29–December 1, 2023. This year's conference was hosted by the KIISC …

[引用][C] More secrecy on cryptography research

D Dickson - 1981 - nature.com
More secrecy on cryptography research Page 1 Nature Vol. 289 19 February 1981 621 More
secrecy on cryptography research US academics lean towards self-restraint Washington …

Information security and cryptology

C Gu, Y Zhu, H Pan - 4th Int. Conf. Inscrypt, 2008 - Springer
The 16th International Conference on Information Security and Cryptology (Inscrypt 2020)
was held in Guangzhou, Guangdong, from December 11 to 14, 2020. It was co-organized by …

Secure computing

H Tyagi, P Narayan, P Gupta - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
We study a problem of secure computation by multiple parties of a given function of their
cumulative observations, using public communication but without revealing the value of the …

[图书][B] Cryptography and Security Systems: Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings

Z Kotulski, B Ksiezopolski, K Mazur - 2014 - books.google.com
Cryptography and security systems are two fields of security research that strongly interact
and complement each other. The series of International Conferences on Cryptography and …

[图书][B] Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings

J Kilian - 2005 - books.google.com
TCC 2005, the 2nd Annual Theory of Cryptography Conference, was held in Cambridge,
Massachusetts, onFebruary10–12, 2005. Theconferencereceived84 submissions, ofwhichtheprogramcommitteeselected32for …

[图书][B] Lightweight cryptography for security and privacy

T Guneysu - 2016 - Springer
The International Workshop on Lightweight Cryptography for Security and Privacy (LightSec)
was established to promote novel research on the security and privacy issues for …