|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
 |
Public Key Infrastructure
- First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings
(Paperback, 2004 ed.)
Sokratis K. Katsikas, Stefanos Gritzalis
|
R1,863
R1,731
Discovery Miles 17 310
Save R132 (7%)
|
Ships in 10 - 15 working days
|
|
This book constitutes the refereed proceedings of the First
European Public Key Infrastructure Workshop: Research and
Applications, EuroPKI 2004, held on Samos Island, Greece in June
2004.
The 25 revised full papers and 5 revised short papers presented
were carefully reviewed and selected from 73 submissions. The
papers address all current issues in PKI, ranging from theoretical
and foundational topics to applications and regulatory issues in
various contexts.
Crypto 2003, the 23rd Annual Crypto Conference, was sponsored by
the Int- national Association for Cryptologic Research (IACR) in
cooperation with the IEEE Computer Society Technical Committee on
Security and Privacy and the Computer Science Department of the
University of California at Santa Barbara. The conference received
169 submissions, of which the program committee selected 34 for
presentation. These proceedings contain the revised versions of the
34 submissions that were presented at the conference. These
revisions have not been checked for correctness, and the authors
bear full responsibility for the contents of their papers.
Submissions to the conference represent cutti- edge research in the
cryptographic community worldwide and cover all areas of
cryptography. Many high-quality works could not be accepted. These
works will surely be published elsewhere. The conference program
included two invited lectures. Moni Naor spoke on cryptographic
assumptions and challenges. Hugo Krawczyk spoke on the 'SI-
and-MAc'approachtoauthenticatedDi?e-HellmananditsuseintheIKEpro-
cols. The conference program also included the traditional rump
session, chaired by Stuart Haber, featuring short, informal talks
on late-breaking research news. Assembling the conference program
requires the help of many many people. To all those who pitched in,
I am forever in your debt. I would like to ?rst thank the many
researchers from all over the world who submitted their work to
this conference. Without them, Crypto could not exist. I thank Greg
Rose, the general chair, for shielding me from innumerable
logistical headaches, and showing great generosity in supporting my
e?orts.
 |
Security in Pervasive Computing
- Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings
(Paperback, 2006 ed.)
John A Clark, Richard F. Paige, Fiona A.C. Polack, Phillip J. Brooke
|
R1,613
R1,508
Discovery Miles 15 080
Save R105 (7%)
|
Ships in 10 - 15 working days
|
|
This book constitutes the refereed proceedings of the Third
International Conference on Security in Pervasive Computing, SPC
2006, held in York, UK, in April 2006. The 16 revised papers
presented together with the extended abstract of 1 invited talk
were carefully reviewed and selected from 56 submissions. The
papers are organized in topical sections on protocols, mechanisms,
integrity, privacy and security, information flow and access
control, and authentication.
 |
Open Problems in Network Security
- IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers
(Paperback, 2012)
Jan Camenisch, Dogan Kesdogan
|
R1,751
R1,464
Discovery Miles 14 640
Save R287 (16%)
|
Ships in 10 - 15 working days
|
|
This book constitutes the thoroughly refereed post-conference
proceedings of the IFIP WG 11.4 International Workshop on Open
Problems in Network Security, iNetSec 2011, held in Lucerne,
Switzerland, in June 2011, co-located and under the auspices of
IFIP SEC 2011, the 26th IFIP TC-11 International Information
Security Conference. The 12 revised full papers were carefully
reviewed and selected from 28 initial submissions; they are fully
revised to incorporate reviewers' comments and discussions at the
workshop. The volume is organized in topical sections on assisting
users, malware detection, saving energy, policies, and problems in
the cloud.
This book constitutes the refereed proceedings of the 5th International Conference on Information Security ISC 2002, held in Sao Paulo, Brazil, in September/October 2002.The 38 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on intrusion detection and tamper resistance, cryptographic algorithms and attack implementation, access control and trust management, authentication and privacy, e-commerce protocols, signature schemes, cryptography, key management, and security analysis.
This book constitutes the thoroughly refereed post-conference
proceedings of the 13th International Conference on Information
Security and Cryptology, held in Seoul, Korea, in December 2010.
The 28 revised full papers presented were carefully selected from
99 submissions during two rounds of reviewing. The conference
provides a forum for the presentation of new results in research,
development, and applications in the field of information security
and cryptology. The papers are organized in topical sections on
cryptanalysis, cryptographic algorithms, implementation, network
and mobile security, symmetric key cryptography, cryptographic
protocols, and side channel attack.
This book constitutes the proceedings of the 13th International
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011,
held in Nara, Japan, from September 28 until October 1, 2011. The
32 papers presented together with 1 invited talk were carefully
reviewed and selected from 119 submissions. The papers are
organized in topical sections named: FPGA implementation; AES;
elliptic curve cryptosystems; lattices; side channel attacks; fault
attacks; lightweight symmetric algorithms, PUFs; public-key
cryptosystems; and hash functions.
This book constitutes the refereed proceedings of the 31st Annual
International Cryptology Conference, CRYPTO 2011, held in Santa
Barbara, CA, USA in August 2011. The 42 revised full papers
presented were carefully reviewed and selected from 230
submissions. The volume also contains the abstract of one invited
talk. The papers are organized in topical sections on randomness
and its use; computer-assisted cryptographic proofs; outsourcing
and delegatin computation; symmetric cryptanalysis and
constructions; secure computation: leakage and side channels;
quantum cryptography; lattices and knapsacks; public-key
encryption; symmetric schemes; signatures; obilvious transfer and
secret sharing; and multivariate and coding-based schemes.
This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001, held in Gold Coast, Australia in December 2001.The 33 revised full papers presented together with an invited paper were carefully reviewed and selected from 153 submissions. The papers are organized in topical sections on lattice based cryptography, human identification, practical public key cryptography, cryptography based on coding theory, block ciphers, provable security, threshold cryptography, two-party protocols, zero knowledge, cryptographic building blocks, elliptic curve cryptography, and anonymity.
The protection of sensitive information against unauthorized access
or fraudulent changes has been of prime concern throughout the
centuries. Modern communication techniques, using computers
connected through networks, make all data even more vulnerable to
these threats. In addition, new issues have surfaced that did not
exist previously, e.g. adding a signature to an electronic
document.Cryptology addresses the above issues - it is at the
foundation of all information security. The techniques employed to
this end have become increasingly mathematical in nature.
Fundamentals of Cryptology serves as an introduction to modern
cryptographic methods. After a brief survey of classical
cryptosystems, it concentrates on three main areas. First, stream
ciphers and block ciphers are discussed. These systems have
extremely fast implementations, but sender and receiver must share
a secret key. Second, the book presents public key cryptosystems,
which make it possible to protect data without a prearranged key.
Their security is based on intractable mathematical problems, such
as the factorization of large numbers. The remaining chapters cover
a variety of topics, including zero-knowledge proofs, secret
sharing schemes and authentication codes. Two appendices explain
all mathematical prerequisites in detail: one presents elementary
number theory (Euclid's Algorithm, the Chinese Remainder Theorem,
quadratic residues, inversion formulas, and continued fractions)
and the other introduces finite fields and their algebraic
structure.Fundamentals of Cryptology is an updated and improved
version of An Introduction to Cryptology, originally published in
1988. Apart from a revision of the existing material, there are
many new sections, and two new chapters on elliptic curves and
authentication codes, respectively. In addition, the book is
accompanied by a full text electronic version on CD-ROM as an
interactive Mathematica manuscript.Fundamentals of Cryptology will
be of interest to computer scientists, mathematicians, and
researchers, students, and practitioners in the area of
cryptography.
The third Financial Cryptography conference was held in February
1999, once again at Anguilla in the British West Indies. The number
of attendees continues to increase from year to year, as do the
number and quality of the technical submissions. The Program
Committee did a great job selecting the technical program. I thank
them for all of their eo rt's. We were helped by a number of
outside reviewers, including Mart n Abadi, Gerrit Bleumer, Drew
Dean, Anand Desai, Mariusz Jakubowski, Andrew Odlyzko, David
Pointcheval, Guillaume Poupard, Zul kar Ramzan, Aleta Ricciardi,
Dan Simon, Jessica Staddon, Venkie Venka- san, Avishai Wool, and
Francis Zane. I apologize for any omissions. Adi Shamir gave an
excellent invited talk that forecast the future of crypt- raphy and
electronic commerce. On-line certic ate revocation was the subject
of a panel led by Michael Myers, following up on the success of his
panel on the same topic at last year's conference. Joan Feigenbaum
moderated a lively panel on fair use, intellectual property, and
the information economy, and I thank her for pulling together from
that discussion a paper for these proceedings. A s- cessful Rump
Session allowed participants to present new results in an informal
setting, superbly chaired by Avi Rubin.
In July 1998, a summer school in cryptology and data security was
organized atthecomputersciencedepartmentofAarhusUniversity,
Denmark.Thistook place as a part of a series of summer schools
organized by the European Edu- tional Forum, an
organizationconsisting of the researchcenters TUCS (Finland),
IPA(Holland)andBRICS(Denmark, Aarhus).Thelocalorganizingcommittee
consisted of Jan Camenisch, Janne Christensen, Ivan Damga? ard
(chair), Karen Moller,
andLouisSalvail.ThesummerschoolwassupportedbytheEuropean Union.
Modern cryptology is an extremely fast growing ?eld and is of
fundamental importance in very diverse areas, from theoretical
complexity theory to practical
electroniccommerceontheInternet.Wethereforesetouttoorganizeaschool
that would enable young researchers and students to obtain an
overview of some mainareas,
coveringboththeoreticalandpracticaltopics.Itisfairtosaythat the
school was a success, both in terms of attendance (136 participants
from
over20countries)andintermsofcontents.Itisapleasuretothankallofthe
speakers for their cooperation and the high quality of their
presentations. A total of 13 speakers gave talks: Mihir Bellare,
University of California, San Diego; Gilles Brassard, University of
Montreal; David Chaum, DigiCash; Ronald Cramer, ETH Zur ] ich; Ivan
Damg? ard, BRICS; Burt Kaliski, RSA Inc.; Lars Knudsen, Bergen
University; Peter Landrock, Cryptomathic; Kevin Mc- Curley, IBM
Research, Almaden; Torben Pedersen, Cryptomathic; Bart Preneel,
Leuven University; Louis Salvail, BRICS; Stefan Wolf, ETH Zur ]
ich.
The book introduces new techniques which imply rigorous lower
bounds on the complexity of some number theoretic and cryptographic
problems. These methods and techniques are based on bounds of
character sums and numbers of solutions of some polynomial
equations over finite fields and residue rings. It also contains a
number of open problems and proposals for further research. We
obtain several lower bounds, exponential in terms of logp, on the
de grees and orders of * polynomials; * algebraic functions; *
Boolean functions; * linear recurring sequences; coinciding with
values of the discrete logarithm modulo a prime p at suf ficiently
many points (the number of points can be as small as pI/He). These
functions are considered over the residue ring modulo p and over
the residue ring modulo an arbitrary divisor d of p - 1. The case
of d = 2 is of special interest since it corresponds to the
representation of the right most bit of the discrete logarithm and
defines whether the argument is a quadratic residue. We also obtain
non-trivial upper bounds on the de gree, sensitivity and Fourier
coefficients of Boolean functions on bits of x deciding whether x
is a quadratic residue. These results are used to obtain lower
bounds on the parallel arithmetic and Boolean complexity of
computing the discrete logarithm. For example, we prove that any
unbounded fan-in Boolean circuit. of sublogarithmic depth computing
the discrete logarithm modulo p must be of superpolynomial size.
A comprehensive evaluation of information security analysis
spanning the intersection of cryptanalysis and side-channel
analysis * Written by authors known within the academic
cryptography community, this book presents the latest developments
in current research * Unique in its combination of both
algorithmic-level design and hardware-level implementation; this
all-round approach - algorithm to implementation covers security
from start to completion * Deals with AES (Advanced Encryption
standard), one of the most used symmetric-key ciphers, which helps
the reader to learn the fundamental theory of cryptanalysis and
practical applications of side-channel analysis
|
|