WorldCat Identities

Desmedt, Yvo

Overview
Works: 38 works in 80 publications in 2 languages and 1,547 library holdings
Genres: Conference papers and proceedings 
Roles: Editor, Author
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by Yvo Desmedt
Cryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedings by Feng Bao( Book )

14 editions published in 2005 in English and held by 155 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques
Information theoretic security : second international conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, revised selected papers by Yvo Desmedt( Book )

13 editions published in 2009 in English and Undetermined and held by 54 WorldCat member libraries worldwide

Annotation
Secure public key infrastructure : standards, PGP and beyond by Mike Burmester( Book )

5 editions published between 2006 and 2010 in English and held by 9 WorldCat member libraries worldwide

Cryptology and network security : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005 ; proceedings( Visual )

1 edition published in 2005 in English and held by 5 WorldCat member libraries worldwide

Information security 16th international conference, ISC 2013, Dallas, Texas, November 13-15, 2013 : proceedings by ISC( Book )

6 editions published in 2015 in English and held by 3 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security, ISC 2013, held in Dallas, Texas, in November 2013. The 16 revised full papers presented together with 14 short papers were carefully reviewed and selected from 70 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: security of operating systems; secret sharing; encryption; malware and Critical infrastructures; cryptanalysis; block ciphers and stream ciphers; entity authentication; usability & risk perception; access control; computer security; privacy attacks; cryptography
Computerfraude en informatiebeveiliging: een risico en een uitdaging by René Govaerts( )

1 edition published in 1985 in Dutch and held by 3 WorldCat member libraries worldwide

Computerbeveiliging - rol van de microcomputer - controle op de computertoegang - computerfraude.--SCAD summary
Constructive approaches to overcome limitations in modelling, specifiying and architectures for IT security : comments and suggestions for ITSEM by Hermann Leberecht Strack( Book )

1 edition published in 1992 in English and held by 2 WorldCat member libraries worldwide

Efficient zero-knowledge identification schemes for smart cards : based on Abelian groups by Mike V Burmester( Book )

1 edition published in 1991 in English and held by 2 WorldCat member libraries worldwide

Computer life: the next generation of computer viruses by Yvo Desmedt( Book )

1 edition published in 1991 in English and held by 2 WorldCat member libraries worldwide

Unconditionally secure authentication schemes and practical and theoretical consequences by Yvo Desmedt( Book )

2 editions published in 1985 in English and held by 2 WorldCat member libraries worldwide

Primitives and schemes for non-atomic information authentication by Goce Jakimoski( )

1 edition published in 2006 in English and held by 2 WorldCat member libraries worldwide

A lotto as an exhaustive code breaking machine by J.-J Quisquater( Book )

1 edition published in 1991 in English and held by 2 WorldCat member libraries worldwide

Critical Analysis of the Use of Redundancy to Achieve Survivability in the Presence of Malicious Attacks( Book )

2 editions published in 2002 in English and held by 1 WorldCat member library worldwide

From the research on communication security one learns that, although redundancy has been utilized to achieve reliability, if the errors are caused maliciously, then the use of redundancy does not necessarily work. The goal is to adapt the lesson from the research on communication security to study when redundancy can and cannot be used to achieve survivability. Although this study was curtailed by the removal of funding, partial results were obtained for generalizing the attack to redundant computations of multiple inputs and creating an algorithm to identify the most critical tasks
All languages in NP have divertable zero-knowledge proofs and arguments under cryptographic assumptions : (extended abstract) by Mike V Burmester( Book )

1 edition published in 1989 in English and held by 1 WorldCat member library worldwide

Identification tokens - or: Solving the Chess Grandmaster problem by Thomas Beth( Book )

1 edition published in 1989 in English and held by 1 WorldCat member library worldwide

A modernized version of visual cryptography by Mahesh K Patel( )

1 edition published in 2003 in English and held by 1 WorldCat member library worldwide

Advances in cryptology, CRYPTO '94 : 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994 : proceedings by Yvo G Desmedt( )

1 edition published in 1994 in English and held by 0 WorldCat member libraries worldwide

"This volume constitutes the proceedings of CRYPTO '94, the 14th International Cryptology Conference, held at Santa Barbara, CA, USA in August 1994 under the sponsorship of the International Association for Cryptologic Research (IACR). The proceedings contains revised versions of the 38 papers selected for presentation at the conference from a total of 114 submissions. All aspects of cryptologic research and advanced applications are addressed; in particular there are sections on block ciphers, signatures, implementation and hardware aspects, authentication and secret sharing, zero-knowledge, combinatorics, number theory, cryptanalysis and protocol failures, and secure computations and protocols."--PUBLISHER'S WEBSITE
Cryptology and Network Security (vol. # 3810) by Yvo Desmedt( )

4 editions published in 2005 in English and held by 0 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.56 (from 0.51 for Cryptology ... to 0.95 for Critical A ...)

Cryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedingsCryptology and network security : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005 ; proceedings
Alternative Names
Desmedt, Yvo G.

Desmedt, Yvo G. 1956-

Yvo G. Desmedt cryptographer

Languages
English (57)

Dutch (1)

Covers
Information theoretic security : second international conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, revised selected papersCryptology and network security : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005 ; proceedingsPublic key cryptography : 6th International workshop on practice and theory in public key cryptosystems, PKC 2003, Miami, FL, USA, January 6-8, 2003 : proceedings