By Topic

2010 International Conference on Security and Cryptography (SECRYPT)

26-28 July 2010

Filter Results

Displaying Results 1 - 25 of 115
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    IEEE is not the copyright holder of this material | PDF file iconPDF (1011 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2010, Page(s): i
    IEEE is not the copyright holder of this material | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): ii
    IEEE is not the copyright holder of this material | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • Brief contents

    Publication Year: 2010, Page(s): iii
    IEEE is not the copyright holder of this material | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • Invited speakers

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (20 KB) | HTML iconHTML

    Provides an abstract for each of the invited presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Organizing and Steering Committees

    Publication Year: 2010, Page(s): v
    IEEE is not the copyright holder of this material | PDF file iconPDF (22 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program committee

    Publication Year: 2010, Page(s): vi
    IEEE is not the copyright holder of this material | PDF file iconPDF (29 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program committee (cont.)

    Publication Year: 2010, Page(s): vii
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (26 KB) | HTML iconHTML

    Provides a listing of current committee members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Auxiliary reviewers

    Publication Year: 2010, Page(s): viii
    IEEE is not the copyright holder of this material | PDF file iconPDF (26 KB) | HTML iconHTML
    Freely Available from IEEE
  • Foreword

    Publication Year: 2010, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (27 KB) | HTML iconHTML
    Freely Available from IEEE
  • Foreword

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s): xi
    IEEE is not the copyright holder of this material | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s): xii
    IEEE is not the copyright holder of this material | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s): xiii
    IEEE is not the copyright holder of this material | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s): xiv
    IEEE is not the copyright holder of this material | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s): xv
    IEEE is not the copyright holder of this material | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s): xvi
    IEEE is not the copyright holder of this material | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Invited speakers

    Publication Year: 2010, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (12 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nanonetworks: A new frontier in communications

    Publication Year: 2010, Page(s): IS-5
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (37 KB)

    Nanotechnology is enabling the development of devices in a scale ranging from one to a few one hundred nanometers. Nanonetworks, i.e., the interconnection of nano-scale devices, are expected to expand the capabilities of single nano-machines by allowing them to cooperate and share information. Traditional communication technologies are not directly suitable for nanonetworks mainly due to the size ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From nature to methods and back to nature

    Publication Year: 2010, Page(s): IS-7
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (32 KB)

    A fundamental challenge in today's arena of complex systems is the design and development of accurate and robust signal processing methods. These methods should be capable to adapt quickly to unexpected changes in the data and operate under minimal model assumptions. Systems in Nature also do signal processing and often do it optimally. Therefore, it makes much sense to understand what Nature does... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaotic quantum cryptography: The ultimate for network security

    Publication Year: 2010, Page(s): IS-9
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (36 KB)

    As the sophistication of intruders' increases, so does the incidents of information integrity breaches and network attacks. In response, very complex cryptographic processes have started being employed, such as chaos theory and quantum theory, in an effort to create the “holy grail” of cryptographic systems and network security. Quantum theory defines the non-classical qubit, which i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information security: The SCAN — Secure processor with crypto-biometrics capabilities

    Publication Year: 2010, Page(s): IS-11
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (37 KB)

    Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access control and intrusion detection

    Publication Year: 2010, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (12 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full papers

    Publication Year: 2010, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (12 KB)
    Freely Available from IEEE