Found 56 Documents (Results 1–56)
Unified view for notions of bit security. (English) Zbl 07913477
Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part VI. Singapore: Springer. Lect. Notes Comput. Sci. 14443, 361-389 (2023).
A risk measurement study evaluating the impact of COVID-19 on China’s financial market using the QR-SGED-EGARCH model. (English) Zbl 1532.62057
A multicommodity spatial price equilibrium model with exchange rates and non-tariff measures for agri-food international trade. (English) Zbl 1530.91357
Two-party quantum key agreement with six-particle entangled states against collective noise. (English) Zbl 07765013
Physical layer security over Tsallis statistics for wireless communications with hardware impairments in the presence of some eavesdroppers. (English) Zbl 1519.94012
Entanglement islands, fire walls and state paradox from quantum teleportation and entanglement swapping. (English) Zbl 1522.81048
Information-theoretic cryptography. (English) Zbl 1527.94001
Cambridge: Cambridge University Press (ISBN 978-1-108-48433-6/hbk; 978-1-108-67020-3/ebook). xiv, 504 p. (2023).
Identification and other probabilistic models. Rudolf Ahlswede’s lectures on information theory 6. Edited by Alexander Ahlswede, Ingo Althöfer, Christian Deppe and Ulrich Tamm. (English) Zbl 1477.94005
Foundations in Signal Processing, Communications and Networking 16. Cham: Springer (ISBN 978-3-030-65070-4/hbk; 978-3-030-65072-8/ebook). xxii, 724 p. (2021).
Reviewer: Jaak Henno (Tallinn)
A tight parallel repetition theorem for partially simulatable interactive arguments via smooth KL-divergence. (English) Zbl 1524.68039
Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 544-573 (2020).
Security measure allocation for industrial control systems: exploiting systematic search techniques and submodularity. (English) Zbl 1466.93071
A propagation model with defensive measures for PLC-PC worms in industrial networks. (English) Zbl 1460.68023
Risk sharing for capital requirements with multidimensional security markets. (English) Zbl 1430.91032
Reviewer: Tak Kuen Siu (Sydney)
The security analysis of quantum B92 protocol in collective-rotation noise channel. (English) Zbl 1422.81054
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. (English) Zbl 1444.94043
Formal analysis of information flow in HOL. (English) Zbl 1498.68053
Larsen, Kim G. (ed.) et al., Dependable software engineering. Theories, tools, and applications. Third international symposium, SETTA 2017, Changsha, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10606, 283-299 (2017).
Quantitative risk analysis method of information security-combining fuzzy comprehensive analysis with information entropy. (English) Zbl 1508.91127
The many entropies in one-way functions. (English) Zbl 1482.94034
Lindell, Yehuda (ed.), Tutorials on the foundations of cryptography. Dedicated to Oded Goldreich. Cham: Springer. Inf. Secur. Cryptogr., 159-217 (2017).
Reviewer: Eszter Gselmann (Debrecen)
Secure multi-party computation: information flow of outputs and game theory. (English) Zbl 1444.68014
Maffei, Matteo (ed.) et al., Principles of security and trust. 6th international conference, POST 2017, held as part of the European joint conferences on theory and practice of software, ETAPS 2017, Uppsala, Sweden, April 22–29, 2017. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 10204, 71-92 (2017).
Sharper bounds in lattice-based cryptography using the Rényi divergence. (English) Zbl 1420.94092
Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10624, 347-374 (2017).
Watermarking based on discrete wavelet transform and \(q\)-deformed chaotic map. (English) Zbl 1380.94011
A modified technique for reliable image encryption method using Merkle-Hellman cryptosystem and RSA algorithm. (English) Zbl 1495.94006
Gambling, computational information and encryption security. (English) Zbl 1375.94131
Lehmann, Anja (ed.) et al., Information theoretic security. 8th international conference, ICITS 2015, Lugano, Switzerland, May 2–5, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17469-3/pbk; 978-3-319-17470-9/ebook). Lecture Notes in Computer Science 9063, 141-158 (2015).
Efficient asynchronous verifiable secret sharing and multiparty computation. (English) Zbl 1308.94099
The impact of sectoral economy indicators on the stock market in the Baltic countries. (English) Zbl 1354.91114
DAG-based attack and defense modeling: don’t miss the forest for the attack trees. (English) Zbl 1300.68026
A hybrid-form model for the prepayment-risk-neutral valuation of mortgage-backed securities. (English) Zbl 1210.91132
Preface to the review. (Russian) Zbl 1199.94049
Reviewer: Andrei Zemskov (Moskva)
MSC:
94A40
The study of methods for appraising the security of an airfield oil depot by fuzzy syntheses. (Chinese. English summary) Zbl 1164.91397
Constructing locally computable extractors and cryptosystems in the bounded-storage model. (English) Zbl 1071.94016
Optimal randomizer efficiency in the bounded-storage model. (English) Zbl 1077.94015
Reviewer: Nicolae Constantinescu (Craiova)
New bounds in secret-key agreement: The gap between formation and secrecy extraction. (English) Zbl 1038.94545
Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 562-577 (2003).
An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. (English) Zbl 1019.94016
Modeling and analyzing the performance of aviation security systems using baggage value performance measures. (English) Zbl 0987.90096
Guesswork and variation distance as measures of cipher security. (English) Zbl 0992.94511
Heys, Howard (ed.) et al., Selected areas in cryptography. 6th annual international workshop, SAC ’99. Kingston, Ontario, Canada, August 9-10, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1758, 62-77 (2000).
MSC:
94A60
Optional decomposition of supermartingales and hedging contingent claims in incomplete security markets. (English) Zbl 0853.60041
No-arbitrage and equivalent martingale measures: An elementary proof of the Harrison-Pliska theorem. (English. Russian original) Zbl 0834.60045
Theory Probab. Appl. 39, No. 3, 523-527 (1994); translation from Teor. Veroyatn. Primen. 39, No. 3, 635-640 (1994).
Reviewer: K.Kubilius (Vilnius)
Valuation of trust in open networks. (English) Zbl 1477.68049
Gollmann, Dieter (ed.), Computer security – ESORICS 94. 3rd European symposium on research in computer security, Brighton, GB, November 7–9, 1994. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 875, 1-18 (1994).
Probability theory in finance. (English) Zbl 0728.90011
Reviewer: Ton Vorst
The practice of authentication. (English) Zbl 0595.94006
Advances in cryptology - EUROCRYPT ’85, Proc. Workshop, Linz/Austria 1985, Lect. Notes Comput. Sci. 219, 261-272 (1986).
Reviewer: Gustavus J. Simmons
On the microeconomic theory of investment under uncertainty. (English) Zbl 0522.90006
Handbook of mathematical economics, Vol. II, Handb. Econ. 1, 601-670 (1982).
Filter Results by …
Document Type
- Journal Articles (42)
- Collection Articles (12)
- Books (2)
all
top 5
Author
- De Santis, Alfredo (2)
- Haitner, Iftach (2)
- Kramkov, Dmitriĭ Olegovich (2)
- Vadhan, Salil P. (2)
- Abed, Furat Noori (1)
- Ah-Fat, Patrick (1)
- Ahlswede, Alexander (1)
- Ahlswede, Rudolf (1)
- Althöfer, Ingo (1)
- Amendinger, Jürgen (1)
- Bai, Shi (1)
- Baras, John S. (1)
- Behnia, Sohrab (1)
- Berman, Itay (1)
- Besedina, Elena (1)
- Beth, Thomas (1)
- Blundo, Carlo (1)
- Borcherding, Malte (1)
- Bowman, Jon M. (1)
- Chen, Xiu-Bo (1)
- Chen, Yasong (1)
- Cheng, Yuan-Dong (1)
- Choudhary, Ashish (1)
- Deppe, Christian (1)
- Dunchev, Tsvetan (1)
- Dziembowski, Stefan (1)
- Fang, Lei (1)
- Fang, Xianjin (1)
- Fatehi, Mohammad (1)
- Ferrara, Anna Lisa (1)
- Fu, Qiang (1)
- Gaggia, Antonio Giorgio (1)
- Habibpourbisafar, R. (1)
- Hajiabadi, Mohammad (1)
- Hasan, Osman (1)
- He, Ji-Dong (1)
- He, Jianqing (1)
- Helali, Ghassen (1)
- Herranz, Javier (1)
- Hu, Fa-Gang (1)
- Huang, Xiaoling (1)
- Huth, Michael R. A. (1)
- Imkeller, Peter (1)
- Jacobson, Sheldon H. (1)
- Jiang, SheXiang (1)
- Johansson, Karl Henrik (1)
- Kabanov, Yuriĭ Mikhaĭlovich (1)
- Kapron, Bruce M. (1)
- Klein, Birgit (1)
- Knyazev, Andrej V. (1)
- Kobza, John E. (1)
- Kolbe, Andreas (1)
- Kordy, Barbara (1)
- Kumar, S. Udaya (1)
- Leigh, William (1)
- Lepoint, Tancrède (1)
- Li, ChaoYang (1)
- Li, Hengji (1)
- Li, Hengjian (1)
- Li, Jian (1)
- Li, Leilei (1)
- Li, Lvzhou (1)
- Liebrich, Felix-Benedikt (1)
- Lin, Bin (1)
- Liu, Hanxin (1)
- Liu, Kun (1)
- Liu, Miao (1)
- Lokeshwari, G. (1)
- Maier, Steven F. (1)
- Manaa, Mehdi Ebady (1)
- Masucci, Barbara (1)
- Maurer, Ueli M. (1)
- Meng, Fanqin (1)
- Merton, Robert Cox (1)
- Milošević, Jezdimir (1)
- Mu, Guowang (1)
- Nagurney, Anna (1)
- Pan, Chen (1)
- Patra, Arpita (1)
- Paz, Noemi (1)
- Pei, Changxing (1)
- Peng, Jiayin (1)
- Peterson, David W. (1)
- Piètre-Cambacédès, Ludovic (1)
- Pliam, John O. (1)
- Poovendran, Radha (1)
- Prest, Thomas (1)
- Purvis, Russell (1)
- Rangan, Chandrasekharan Pandu (1)
- Renner, Renato (1)
- Ronzhin, A. F. (1)
- Roux-Langlois, Adeline (1)
- Rudzkis, Rimantas (1)
- Ruiz, Alexandre (1)
- Sáez, Germán (1)
- Sakzad, Amin (1)
- Sandberg, Henrik (1)
- Schweitzer, Patrick (1)
- Schweizer, Martin (1)
- Sheng, Chuan (1)
- and 47 more Authors
all
top 5
Serial
- Int. J. Theor. Phys. (4)
- J. Cryptology (4)
- J. Discrete Math. Sci. Cryptography (3)
- Discrete Appl. Math. (2)
- IEEE Trans. Inf. Theory (2)
- Int. J. Robust Nonlinear Control (2)
- Adv. Appl. Probab. (1)
- Classical Quantum Gravity (1)
- Teor. Veroyatn. Primen. (1)
- Chaos Solitons Fractals (1)
- Manage. Sci. (1)
- Math. Pract. Theory (1)
- Probab. Theory Relat. Fields (1)
- J. Econ. Dyn. Control (1)
- Ann. Oper. Res. (1)
- Econ. Lett. (1)
- Des. Codes Cryptography (1)
- Appl. Math. Modelling (1)
- Stochastic Processes Appl. (1)
- Nieuw Arch. Wiskd., IV. Ser. (1)
- Int. J. Bifurcation Chaos Appl. Sci. Eng. (1)
- Obozr. Prikl. Prom. Mat. (1)
- Finance Stoch. (1)
- Int. J. Theor. Appl. Finance (1)
- Commun. Nonlinear Sci. Numer. Simul. (1)
- J. Hebei Univ. Technol. (1)
- IMA J. Manag. Math. (1)
- Int. J. Quantum Inf. (1)
- Found. Signal Process. Commun. Netw. (1)
- Comput. Sci. Rev. (1)
- Liet. Mat. Rink., Proc. Lith. Math. Soc., Ser. A (1)
- SN Oper. Res. Forum (1)
all
top 3
Software
- ADEPTS (1)
- ADTool (1)
- AttackTree (1)
- BLISS (1)
- CAViaR (1)
- MulVAL (1)
- RRE (1)
- SeaMonster (1)
- SecurITree (1)
- VIFF (1)
- bnlearn (1)