![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
The security issues set by the global digitization of our society have had, and will continue to have, a crucial impact at all levels of our social organization, including, just to mention a few, privacy, economics, environmental policies, national sovereignty, medical environments. The importance of the collaborations in the various ?elds of computer s- ence to solve these problems linked with other sciences and techniques is clearly recognized. Moreover, the collaborative work to bridge the formal theory and practical applications becomes increasingly important and useful. In this context, and since France and Japan have strong academic and ind- trial backgrounds in the theory and practice of the scienti?c challenges set by this digitized world, in 2005 we started a formal French-Japanese collaboration and workshop series on computer security. The three ?rst editions of these French-Japanese Computer Security wo- shops in Tokyo, September 5-7, 2005 and December 4-5, 2006 and in Nancy, March 13-14, 2008 were very fruitful and were accompanied by several imp- tant research exchanges between France and Japan. Because of this success, we launched a call for papers dedicated to computer security from it's foundation to practice, with the goal of gathering together ?nal versions of the rich set of papers and ideas presented at the workshops, yet opening the call to everyone interested in contributing in this context. This v- ume presents the selection of papers arising from this call and this international collaboration.
The biennial International Workshop on Coding and Cryptology (IWCC) aims to bring together many of the world's greatest minds in coding and crypt- ogy to share ideas and exchange knowledge related to advancements in c- ing and cryptology, amidst an informal setting conducive for interaction and collaboration. It is well known that fascinating connections exist between coding and cr- tology. Therefore this workshop series was organized to facilitate a fruitful - teraction and stimulating discourse among experts from these two areas. The inaugural IWCC was held at Wuyi Mountain, Fujian Province, China, during June 11-15, 2007 and attracted over 80 participants. Following this s- cess, the second IWCC was held June 1-5, 2009 at Zhangjiajie, Hunan Province, China. Zhangjiajie is one of the most scenic areas in China. The proceedings of this workshop consist of 21 technical papers, covering a wide range of topics in coding and cryptology, as well as related ?elds such as combinatorics. All papers, except one, are contributed by the invited speakers of the workshop and each paper has been carefully reviewed. We are grateful to the external reviewers for their help, which has greatly strengthened the quality of the proceedings. IWCC 2009 was co-organizedby the National University of Defense Techn- ogy (NUDT), China and Nanyang Technological University (NTU), Singapore. We acknowledge with gratitude the ?nancial support from NUDT. We wouldliketo expressourthanks to Springer formaking it possible forthe proceedings to be published in the Lecture Notes in Computer Science series.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.
This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28-31, 2007 in Barcelona, Spain. The conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications. ICETE is a joint international conf- ence integrating four major areas of knowledge that are divided into four cor- sponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and Cryptography), WINSYS (International Conference on Wireless Information Systems) and SIGMAP (International Conf- ence on Signal Processing and Multimedia). The program of this joint conference included several outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches contributed to the ov- all quality of the program and heightened the significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of- business and telecommunications. This wide view has made it appealing to a global audience of engineers, scientists, business practitioners and policy experts. The papers accepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks and systems, showing that the technical problems in these fields are challenging, related and significant.
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, FC 2007, and the co-located 1st International Workshop on Usable Security, USEC 2007, both held in Scarborough, Trinidad/Tobago, in February 2007. The book includes 17 revised full papers, 1 system presentation paper and the transcriptions of 5 panel sessions from FC 2007. The papers, which were carefully reviewed and selected from 85 submissions, are organized in topical sections on Payment Systems, Anonymity, Authentication, Anonymity and Privacy, Cryptography and Commercial Transactions, Financial Transactions and Web Services, and Cryptography. The book concludes with 5 revised full and 5 revised short papers from the USEC 2007 workshop. This workshop brought together an interdisciplinary group of researchers and practitioners to discuss usability problems and deepen the understanding of users' capabilities and motivations in performing security tasks.
It is commonly assumed that computers process information. But what is inf- mation? In a technical, important, but nevertheless rather narrow sense, Sh- non'sinformationtheorygivesa?rstanswertothisquestion.Thistheoryfocuses on measuring the information content of a message. Essentially this measure is the reduction of the uncertainty obtained by receiving a message. The unc- tainty of a situation of ignorance in turn is measured by entropy. This theory hashad an immense impact on the technologyof information storage,data c- pression, information transmission and coding and still is a very active domain of research. Shannon's theory has also attractedmuch interest in a more philosophic look at information, although it was readily remarked that it is only a "syntactic" theory of information and neglects "semantic" issues. Several attempts have been made in philosophy to give information theory a semantic ?avor, but still mostly based on or at least linked to Shannon's theory. Approaches to semantic informationtheoryalsoveryoftenmakeuseofformallogic.Thereby,information is linked to reasoning, deduction and inference, as well as to decision making. Further, entropy and related measure were soon found to have important connotations with regard to statistical inference. Surely, statistical data and observation represent information, information about unknown, hidden para- ters. Thus a whole branch of statistics developed around concepts of Shannon's information theory or derived from them. Also some proper measurements - propriate for statistics, like Fisher's information, were proposed.
This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with 2 invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation.
Thesecondinternationalconferenceonprovablesecurity, ProvSec2008, washeld in Shanghai, China, during October 30th - November 1st, 2008. The conference wassponsoredbyShanghaiJiaoTongUniversity(SJTU)incooperationwiththe Chinese Association for Cryptologic Research (CACR) and the Natural Science Foundation of China (NSFC). The aim of ProvSec is to provide a platform for researchers, scholars, and practitionerstoexchangeideasandextendknowledgeonprovablesecurity, which is an important research area in cryptography. The ?rst ProvSec was held in Wollongong, Australia, in 2007. This year, the conference received 79 papers and the program committee selected 25 papers during eight weeks' thorough reviewing process. The authors ofthe selected papersarefrom12 di?erentcountries: Australia, Belgium, China, Estonia, France, Germany, India, Japan, Norway, Singapore, the UK, and the USA. We are grateful to the members of the program committee for their many hours of valuable time and hard work. In addition to the regular conference program, the conference hosted two invited talks: - Kenny Paterson (University of London, Royal Holloway): Non-interactive Key Distribution and Identity-Based Encryption: A Historical Perspective - PhillipRogaway(University ofCalifornia, Davis): BlockcipherModes of- eration: Culture and Counter-Culture in Modern Cryptography. The conference was also one of the special events for the 50th anniversary of the Department of Computer Science at SJTU. We extend our gratitude to all the people involved in organizing ProvSec from the Department of Computer Science and Engineering and the Lab for InformationSecurityofShanghaiJiaoTongUniversity, inparticulartoYuLong, Yanfei Zheng, Meiju Chen, Zhihua Su, and Bo Zhu for their great e?orts in making the conference run smoot
This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009. The 31 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on identity-based encryption, protocol analysis, two-party protocols, more than signatures, collisions for hash functions, cryptanalysis, alternative encryption, privacy and anonymity, efficiency improvements, multi-party protocols, security of encryption schemes as well as countermeasures and faults.
It is a pleasure to welcome you to the proceedings of the second International Castle Meeting on Coding Theory and its Applications, held at La Mota Castle in Medina del Campo. The event provided a forum for the exchange of results and ideas, which we hope will foster future collaboration. The ?rst meeting was held in 1999, and, encouraged by that experience, we now intend to hold the meeting every three years. Springer kindly accepted to publish the proceedings volume you have in your hands in their LNCS series. The topics were selected to cover some of the areas of research in Coding Theory that are currently receiving the most attention. The program consisted of a mixture of invited and submitted talks, with the focus on quality rather than quantity. A total of 34 papers were submitted to themeeting.Afteracarefulreviewprocessconductedbythescienti?ccommittee aided by external reviewers, we selected 14 of these for inclusion in the current volume, along with 5 invited papers. The program was further augmented by the remaining invited papers in addition to papers on recent results, printed in a separate volume. We would like to thank everyone who made this meeting possible by helping with the practical and scienti?c preparations: the organization committee, the scienti?c committee, the invited speakers, and the many external reviewers who shall remain anonymous. I would especially like to mention the General Advisor ofthe meeting, OyvindYtrehus.Finally Iextend mygratitudeto allthe authors and participants who contributed to this meeting."
ICITS 2008, the Third InternationalConference on Information Theoretic Se- rity, was held in Calgary, Alberta, Canada, during August 10-13, 2008, at the Universityof Calgary.This seriesof conferences wasstarted with the 2005IEEE InformationTheoryWorkshoponTheoryandPracticein Information-Theoretic Security (ITW 2005, Japan), held on Awaji Island, Japan, October 16-19,2005. The conference series aims at bringing focus to security research when there is no unproven computational assumption on the adversary. This is the fra- work proposed by Claude Shannon in his seminal paper formalizing modern unclassi?ed research on cryptography. Over the last few decades, Shannon's approach to formalizing security has been used in various other areas including authentication, secure communication, key exchange, multiparty computation and information hiding to name a few. Coding theory has also proven to be a powerful tool in the construction of security systems with information theoretic security. Therewere43submitted papers ofwhich14wereaccepted.Eachcontributed paper was reviewed by three members of the Program Committee. In the case of co-authorship by a Program Committee member the paper was reviewed by ?ve members of the committee (no committee member reviewed their own s- mission). In addition to the accepted papers, the conference also included nine invited speakers, whose contributions were not refereed. These proceedings c- tain the acceptedpapers with anyrevisionsrequiredbythe ProgramCommittee as well as the contributions by invited speakers.
These are the proceedings of IPTComm 2008 - the Second Conference on Pr- ciples, Systems andApplications ofIP Telecommunications-heldinHeidelberg, Germany, July 1-2, 2008. The scope of the conference included recent advances in the domains of convergent networks, VoIP security and multimedia service environments for next generation networks. The conference attracted 56 s- missions, of which the Program Committee selected 16 papers for publication. The review process followed strict standards: each paper received at least three reviews. We would like to thank all Program Committee members and external reviewers for their contribution to the review process. The conference attracted attendees from academia and industry. Its excellence is re?ected in the quality of the contributed papers and invited talks. Additional industry talks and - plied demonstrations assured a synergy between academic and applied research. We would also like to acknowledge and thank our sponsors, many of whom s- portedtheconferencegenerously: NEC, AT&T, Codenomicon, IPTEGO, EADS, Cellcrypt, MuDynamics, SIP Forum and EURESCOM, Finally, we would like to thank all the researchers and authors from all over the world who submitted their work to the IPTComm 2008 conferenc
The Western European Workshop on Research in Cryptology (WEWoRC 2007) was the second of its kind. It was organizedas a joint venture between the Horst G] ortzInstituteforSecurityinInformationSystems(HGI), andtheSpecialInt- est Groupon Cryptology(FG Krypto) of the German Computer Science Society (Gesellschaft fu ]r Informatik e.V.). The aim was to bring together researchers in the?eldofcryptology.TheworkshopfocusedonresearchfromMastersandPhD students, and brought them together with more experienced senior researchers. The ?rst workshop (WEWoRC 2005) was held in Leuven. WEWoRC 2007 was held in the German Ruhr region, more particularly in Bochum, during July 4-6, 2007. Formerly a mining town, Bochum is currently growing into a knowledge-based economy. Aided by the city council, IT se- rity is a special focus for economic development. Hence, it provided the perfect scenery for hosting this event. In total, we had 81 participants from 13 di?- ent countries (Belgium, Finland, France, Germany, Iran, Japan, Luxembourg, Malawi, Slovenia, Taiwan, Tunisia, UK, USA)."
The conference Mathematical Methods in Computer Science (MMICS) was held in the memory of Thomas Beth during December 17-19 in Karlsruhe. The c- ference was meant to re?ect the many interests of Thomas Beth. Even though these interests might seem diverse the mathematical methods employed and - pecially algebra as a language were the common denominator of all his scienti?c achievements. The 12 contributed talks reaching from t-designs to integrated circuits were selected from 30 submissions from 14 countries. The contributed talks were complemented by three invited talks. Teo Mora gave a talk on "Decoding Cyclic Codes: The Cooper Philosophy" embracing the areas of coding theory and symbolic computation. These areas were especially appreciated by Thomas Beth, because they combine algebra and algorithmics. Richard Jozsa lectured about "Embedding Classical into Quantum Compu- tion" in the area of quantum information. Quantum information was a focus of research of Tomas Beth since 1993 when he co-organized one of the e- liest workshops on quantum cryptography in Dagstuhl. Quantum information became his passion in 1994 when the connection between the Fourier transf- mation and breaking the RSA crypto system became apparent via Shor's al- rithm, which can factor integers in polynomial time on a quantum computer. The Fourier transform and cryptography were topics that played an important role in Thomas Beth's research and this connection, once again, justi?ed his broad view on computer science.
On behalf of the IEEE Communications Society, Technical Committee on N- work Operations and Management (CNOM), Manweek 2008 Organizing C- mittee, and members of the IPOM Technical Program Committee, it is our pleasureto present the proceedings of the 8th IEEE Workshop on IP Operations and Management(IPOM 2008),heldaspartofManweek2008duringSeptember 22-26, 2008, on Samos, Greece. ThecurrentInternetisalarge-scaledistributedsystemwhosesub-components suchasaddressing,protocols,algorithms,services,need to scalein time withthe rapid growth of Internet tra?c volumes. Moreover, there is a high level of int- action between di?erent subcomponents of the Internet sometimes in undesired ways - for example, denial of service attacks can jeopardize the operation of a commercial network. With these challenges in place, operations and mana- ment of IP networks have become increasingly important. This necessitates a good understanding of the emerging technical and scienti?c problems in the current Internet, and lessons from such understanding will be particularly - portant for future Internet design and management. Building on the success of the previous events, we wanted IPOM 2008 to focus on network management challenges for the current Internet as well as on future Internet design.
This book represents the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in July 2007. The 18 revised full papers presented together with 2 abstracts and 3 full papers of invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topcial sections on applications, certificateless public key encryption, hyperelliptic curves, implementation, cryptographic protocols, cryptanalysis, and cryptographic algorithms.
Since1994, CARDIShasbeentheforemostinternationalconferencededicatedto smart card research and applications. Every two years, the scienti?c community congregates to present new ideas and discuss recent developments with both an academicandindustrialfocus.Followingtheincreasedcapabilitiesofsmartcards anddevices, CARDIS has becomea majoreventfor the discussionofthe various issuesrelatedtotheuseofsmallelectronictokensintheprocessofhuman-machine interactions.Thescopeoftheconferenceincludesnumeroussub?eldssuchasn- working, e?cientimplementations, physicalsecurity, biometrics, andso on. This year's CARDIS was held in London, UK, on September 8-11, 2008. It was organized by the Smart Card Centre, Information Security Group of the Royal Holloway, University of London. Thepresentvolumecontainsthe21papersthatwereselectedfromthe51s- missions to the conference. The 22 members of the program committee worked hard in order to evaluate each submission with at least three reviews and agree on a high quality ?nal program. Additionally, 61 external reviewers helped the committee with their expertise. Two invited talks completed the technical p- gram. The ?rst one, given by Ram Banerjee and Anki Nelaturu, was entitled "Getting Started with Java Card 3.0 Platform." The second one, given by Aline Gouget, was about "Recent Advances in Electronic Cash Design" and was c- pleted by an abstract provided in these proceedings.
The Pairing 2008 Conference was held at Royal Holloway, University of London during September 1-3, 2008. This conference followed on from the Pairing in Cryptography workshop (held in Dublin, Ireland on June 12-15, 2005) and the Pairing 2007 conference (held in Tokyo, Japan on July 2-4, 2007, with proce- ings published in Springer's LNCS 4575). The aim of this series of conferences is to bring together leading researchers and practitioners from academia and industry, all concerned with problems related to pairing-based cryptography. The programme consisted of 3 invited talks and 20 contributed papers. The invitedspeakerswereXavierBoyen(VoltageSecurity, USA), FlorianHess(Te- nical University Berlin, Germany) and Nigel Smart (University of Bristol, UK). Special thanks are due to these speakers, all three of whom provided papers which are included in these proceedings. The contributed talks were selected from ?fty submissions. The accepted papers cover a range of topics in mathematics and computer science, including hardwareand softwareimplementation of pairings, cryptographicprotocols, and mathematical aspects and applications of pairings. We would like to thank all the people who helped with the conference p- gramme and organisation. First, we thank the Steering Committee for their guidance and suggestions. We also heartily thank the Programme Committee and the sub-reviewers listed on the following pages for their thoroughness d- ing the review process. Each paper was reviewed by at least three people and there was signi?cant online discussion about a number of papers.
The AFRICACRYPT 2008 conference was held during June 11-14, 2008 in Casablanca, Morocco. Upon the initiative of the organizers from the Ecole n- male sup erieure in Casablanca, this event was the ?rst international research conference in Africa dedicated to cryptography. The conference was honored by the presence of the invited speakers Bruce Schneier, Jacques Stern, and Alexander W. Dent who gave talks entitled "The Psychology of Security" "Modern Cryptography: A Historical Perspective" and "ABriefHistoryofProvably-SecurePublic-KeyEncryption,"respectively.These proceedings include papers by Bruce Schneier and by Alexander Dent. The conference received 82 submissions on November 24, 2007. They went through a careful doubly anonymous review process. This was run by the iChair software written by Thomas Baign eres and Matthieu Finiasz. Every paper - ceived at least three review reports. After this period, 25 papers were accepted on February 12, 2008. Authors then had the opportunity to update their papers until March 13, 2008. The present proceedings include all the revised papers. At the end of the review process, the paper entitled "An Authentication Protocol with Encrypted Biometric Data" written by Julien Bringer and Herv e Chabanne was elected to receive the Africacrypt 2008 Best Paper Award. I had the privilege to chair the Program Committee. I would like to thank all committee members for their tough work on the submissions, as well as all externalreviewersfortheirsupport.IalsothankmyassistantThomasBaign eres formaintainingtheserverandhelpingmetorunthesoftware.Ithanktheinvited speakers, the authors of the best paper, the authors of all submissions. They all contributed to the success of the conference."
FastSoftwareEncryption(FSE)isthe15thinaseriesofworkshopsonsymmetric cryptography. It is sponsored by the International Association for Cryptologic Research(IACR), andpreviousFSEworkshopshavebeenheldaroundtheworld: 1993 Cambridge, UK 1994 Leuven, Belgium 1996 Cambridge, UK 1997 Haifa, Israel 1998 Paris, France 1999 Rome, Italy 2000 New York, USA 2001 Yokohama, Japan 2002 Leuven, Belgium 2003 Lund, Sweden 2004 New Delhi, India 2005 Paris, France 2006 Graz, Austria 2007 Luxembourg, Luxembourg The FSE workshop is devoted to the foreground research on fast and secure primitivesforsymmetriccryptography, includingthedesignandanalysisofblock ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash functions, and message authentication codes. This year 72 papers were submitted to FSE including a large number of hi- quality and focused submissions, from which 26 papers for regular presentation and 4 papers for short presentation were selected. I wish to thank the authors of all submissions for their scienti?c contribution to the workshop. The workshop also featured an invited talk by Lars R. Knudsen with the title "Hash functions and SHA-3." The traditional rump session with short informal presentations on current topics was organized and chaired by Daniel J. Bernstein. EachsubmissionwasreviewedbyatleastthreeProgramCommitteemembers. Each submission originating from the Program Committee received at least ?ve reviews.The?nalselectionwasmadeafterathoroughdiscussion.Iwishtothank all ProgramCommittee members and referees for their generouswork.I am also gratefulto ThomasBaign eresformaintainingandcustomizingthe iChair review management software, which o?ered an excellent support for the demanding reviewing task. I would also like to thank him for setting up a beautiful and informative website and for compiling the pre-proceedings.
This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006. The 19 revised full papers and six revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections.
This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis.
This book constitutes the refereed proceedings of the Third International Information Security Practice and Experience Conference, ISPEC 2007, held in Hong Kong, China in May 2007. The 24 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on cryptanalysis, signatures, network security and security management, privacy and applications, cryptographic algorithms and implementations, authentication and key management, as well as cryptosystems.
This book constitutes the thoroughly refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust, FAST 2006, held in Hamilton, Ontario, Canada, August 26-27, 2006. The 18 revised papers presented were carefully reviewed and selected from 47 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies. |
You may like...
Advances in Robot Kinematics - Theory…
Jadran Lenarcic, Federico Thomas
Hardcover
R5,432
Discovery Miles 54 320
Audio Mastering: The Artists…
Russ Hepworth- Sawyer, Jay Hodgson
Hardcover
R4,506
Discovery Miles 45 060
|