|
Showing 1 - 12 of
12 matches in All Departments
This book constitutes the refereed proceedings of the
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held
in San Francisco, CA, USA, in February/March 2013. The 25 revised
full papers presented were carefully reviewed and selected from 89
submissions. The papers are grouped into topical sections covering:
side channel attacks, digital signatures, public-key encryption,
cryptographic protocols, secure implementation methods, symmetric
key primitives, and identity-based encryption.
This book constitutes the refereed proceedings of the Third
International Information Security Practice and Experience
Conference, ISPEC 2007, held in Hong Kong, China in May 2007.
The 24 revised full papers presented together with 2 invited
papers were carefully reviewed and selected from 135 submissions.
The papers are organized in topical sections on cryptanalysis,
signatures, network security and security management, privacy and
applications, cryptographic algorithms and implementations,
authentication and key management, as well as cryptosystems.
Mycrypt 2005 was the inaugural international conference on
cryptology hosted in Malaysia. The conference was co-organized by
the Information Security - search Lab at Swinburne University of
Technology (Sarawak Campus), NISER (National ICT Security and
Emergency Response Centre) and INSPEM (Ins- tute for
MathematicalResearch)at UPM (UniversityPutra Malaysia).Mycrypt 2005
was held in Kuala Lumpur, Malaysia during September 28-30 2005, in
conjunction with the e-Secure Malaysia 2005 convention.
Therewere90paper submissionsfrom23 countriescoveringall areasof cr-
tologic research, from which 19 were accepted. We would like to
extend our thanks to all authors who submitted papers to Mycrypt
2005. Each paper was
sentanonymouslytoatleast3membersoftheInternationalProgramCommittee
for reviews and comments. The review comments were then followed by
disc- sions among the Program Committee. A recipient of the Best
Paper Award was also selected after voting among Program Committee
members. The winning paper was "Distinguishing Attacks on
T-functions" by Simon Kunzli ] (FH A- gau, Swizerland), Pascal
Junod (Nagravision SA, Switzerland) and Willi Meier (FH Aargau,
Swizerland). These proceedings contain revised versions of all the
accepted papers. The conference program included three keynote
papers: Hideki Imai (Tokyo University)presenteda paper entitled
"TrendsandChallenges forSecurer Cr- tography in Practice." Moti
Yung (Columbia University) presented a paper entitled "E?cient
Secure Group Signatures with Dynamic Joins and Keeping Anonymity
Against Group Managers." Colin Boyd (QUT) presented a paper
entitled "Security of Two-Party Identity-Based Key Agreement." We
are extremely grateful for the time and e?ort of all the members of
the Program Committee in the review process. Their names may be
found overleaf."
ACISP 2000, the Fifth Australasian Conference on Information
Security and Privacy, was held in Brisbane, Australia, 10-12 July,
2000. The conference was sponsored by the Information Security
Research Centre at Queensland Univ- sity of Technology, the
Australian Computer Society, Telstra, Boeing Australia Limited,
SecureGate Limited, and RSA Security Pty Ltd. We are grateful to
all these organizations for their support of the conference. The
conference brought together researchers, designers, implementors,
and users of information security systems. The aim of the
conference is to have a series of technical refereed and invited
papers to discuss all di?erent aspects of information security. The
program committee invited seven distinguished sp- kers: Mike
Burmester, G. R. Blakley, Bob Blakley, Brian Denehy, Roger Lyle,
John Snare, and Alan Underwood. Mike Burmester from Royal Holloway
C- lege,
UniversityofLondonpresentedapaperentitled"ASurveyofKeyDistri-
tion"; G. R. Blakley from Texas A&M University and Bob Blakley
from the IBM Tivoli Security Business Unit presented a paper
entitled "All Sail, No Anchor, I: Cryptography, Risk, and
e-Commerce"; Brian Denehy from SecureGate Limited presented a paper
entitled "Secure Networks or Network Security - Approaches
toBoth";RogerLylefromStandardsAustraliaandJohnSnarefromTelstrap-
sented a paper entitled "Perspectives on Australia's New
Information Security Management Standard"; and Alan Underwood from
the Australian Computer
Societypresentedapaperentitled"ProfessionalEthicsinaSecurityandPrivacy
Context - The Perspective of a National Computing Society." There
were 81 technical papers submitted to the conference from an int-
national authorship. These papers were refereed by the program
committee and 37 papers were accepted for the conference.
This book constitutes the refereed proceedings of the Third
Australasian Conference on Information Security and Privacy,
ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of
66 submissions; also included are two invited contributions. The
book is divided in sections on network security, block ciphers,
stream ciphers, authorization codes and Boolean functions, software
security and electronic commerce, public key cryptography,
hardware, access control, protocols, secret sharing, and digital
signatures.
|
Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Josef Pieprzyk, Hossein Ghodosi, Ed Dawson
|
R1,620
Discovery Miles 16 200
|
Ships in 10 - 15 working days
|
Here is a highly relevant book that covers a wide array of key
aspects in information security. It constitutes the refereed
proceedings of the 12th Australasian Conference on Information
Security and Privacy held in Townsville, Australia in July 2007.
The 33 revised full papers presented were carefully reviewed and
selected from 132 submissions. The papers are organized in topical
sections on stream ciphers, hashing, biometrics, secret sharing,
cryptanalysis, public key cryptography, authentication, e-commerce,
and security.
|
You may like...
Tenet
John David Washington, Robert Pattinson, …
DVD
R53
Discovery Miles 530
Not available
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|