|
Showing 1 - 11 of
11 matches in All Departments
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.
This book constitutes the refereed conference proceedings of the
18th Australasian Conference on Information Security and Privacy,
ACISP 2013, held in Brisbane, Australia, in July 2013. The 28
revised full papers presented were carefully selected from 78
submissions. Conference papers are organized in technical sessions,
covering topics of Cryptanalysis, RSA, Lattices and Security
Proofs, Public Key Cryptography, Hashing, Signatures, Passwords,
Mobile Security, and Secret Sharing.
The 2009 Australasian Conference on Information Security and
Privacy was the 14th in an annual series that started in 1996. Over
the years ACISP has grown froma relativelysmall conferencewith a
largeproportionof paperscoming from Australia into a truly
international conference with an established reputation. ACISP 2009
was held at Queensland University of Technology in Brisbane, d- ing
July 1-3, 2009. This year there were 106 paper submissions and from
those 30 papers were accepted for presentation, but one was
subsequently withdrawn. Authors of - cepted papers came from 17
countries and 4 continents, illustrating the inter- tional ?avorof
ACISP. We would like to extend our sincere thanks to all authors
who submitted papers to ACISP 2009. The contributed papers were
supplemented by two invited talks from e- nent researchers in
information security. Basie von Solms (University of Joh- nesburg),
currently President of IFIP, raised the question of how well
dressed is the information security king. L. Jean Camp (Indiana
University) talked about how to harden the network from the friend
within. We are grateful to both of them for sharing their extensive
knowledge and setting challenging questions for the ACISP 2009
delegates. We were fortunate to have an energetic team of experts
who formed the Program Committee. Their names may be found
overleaf, and we thank them warmly for their considerable e?orts.
This team was helped by an even larger number of individuals who
reviewedpapers in their particularareasof expertise.
The 2005 Australasian Conference on Information Security and
Privacy was the tenth in the annual series that started in
1996.Over the yearsACISP has grown from a
relativelysmallconferencewith a largeproportionof paperscoming from
Australia into a truly international conference with an established
reputation. ACISP 2005 was held at Queensland University of
Technology in Brisbane, d- ing July 4-6, 2005. This year there were
185 paper submissions and from these 45 papers were accepted.
Accepted papers came from 13 countries, with the largest
proportions coming from Australia (12), China (8) and Japan (6).
India and Korea both contributed 2 papers and one came from
Singapore. There were also 11 papers from European countries and 3
from North America. We would like to extend our sincere thanks to
all authors who submitted papers to ACISP 2005. The contributed
papers were supplemented by four invited talks from e- nent
researchers in information security. The father-and-son team of
Prof. and Dr. Bob Blakley (Texas A&M University and IBM) gave a
talk entitled "All Sail, No Anchor III," following up on a theme
started at their ACISP 2000 - vited talk. Adrian McCullagh
(Phillips Fox Lawyers and QUT) talked on the bene?t and perils of
Internet banking. Ted Dunstone (Biometix) enlightened us on
multimodal biometric systems. Yvo Desmedt (University College
London) elucidated the growing gap between theory and practice in
information security.
The 2003 Information Security Conference was the sixth in a series
that started with the InformationSecurity Workshopin 1997.A
distinct feature of this series is the wide coverage of topics with
the aim of encouraging interaction between researchers in di?erent
aspects of information security. This trend continued in the
program of this year s conference. There were 133 paper submissions
to ISC 2003. From these submissions the
31papersintheseproceedingswereselectedbytheprogramcommittee,
covering a wide range of technical areas. These papers are
supplemented by two invited
papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented
by a written paper. We would like to extend our sincere thanks to
all the authors that submitted papers to ISC 2003, and we hope that
those whose papers were declined will be able to ?nd an alternative
forum for their work. We are also very grateful to the three
eminent invited speakers at the conference: Paul van Oorschot
(Carleton University, Canada), Ueli Maurer (ETH Zur ] ich,
Switzerland), and Andy Clark (Inforenz Limited, UK). We were
fortunate to have an energetic team of experts who took onthe task
of the program committee. Their names may be found overleaf, and we
thank them warmly for their considerable e?orts. This team was
helped by an even larger number of individuals who reviewed papers
in their particular areas of expertise. A list of these names is
also provided, which we hope is complete."
This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001, held in Gold Coast, Australia in December 2001.The 33 revised full papers presented together with an invited paper were carefully reviewed and selected from 153 submissions. The papers are organized in topical sections on lattice based cryptography, human identification, practical public key cryptography, cryptography based on coding theory, block ciphers, provable security, threshold cryptography, two-party protocols, zero knowledge, cryptographic building blocks, elliptic curve cryptography, and anonymity.
ACISP 2000, the Fifth Australasian Conference on Information
Security and Privacy, was held in Brisbane, Australia, 10-12 July,
2000. The conference was sponsored by the Information Security
Research Centre at Queensland Univ- sity of Technology, the
Australian Computer Society, Telstra, Boeing Australia Limited,
SecureGate Limited, and RSA Security Pty Ltd. We are grateful to
all these organizations for their support of the conference. The
conference brought together researchers, designers, implementors,
and users of information security systems. The aim of the
conference is to have a series of technical refereed and invited
papers to discuss all di?erent aspects of information security. The
program committee invited seven distinguished sp- kers: Mike
Burmester, G. R. Blakley, Bob Blakley, Brian Denehy, Roger Lyle,
John Snare, and Alan Underwood. Mike Burmester from Royal Holloway
C- lege,
UniversityofLondonpresentedapaperentitled"ASurveyofKeyDistri-
tion"; G. R. Blakley from Texas A&M University and Bob Blakley
from the IBM Tivoli Security Business Unit presented a paper
entitled "All Sail, No Anchor, I: Cryptography, Risk, and
e-Commerce"; Brian Denehy from SecureGate Limited presented a paper
entitled "Secure Networks or Network Security - Approaches
toBoth";RogerLylefromStandardsAustraliaandJohnSnarefromTelstrap-
sented a paper entitled "Perspectives on Australia's New
Information Security Management Standard"; and Alan Underwood from
the Australian Computer
Societypresentedapaperentitled"ProfessionalEthicsinaSecurityandPrivacy
Context - The Perspective of a National Computing Society." There
were 81 technical papers submitted to the conference from an int-
national authorship. These papers were refereed by the program
committee and 37 papers were accepted for the conference.
This book constitutes the refereed proceedings of the Third
Australasian Conference on Information Security and Privacy,
ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of
66 submissions; also included are two invited contributions. The
book is divided in sections on network security, block ciphers,
stream ciphers, authorization codes and Boolean functions, software
security and electronic commerce, public key cryptography,
hardware, access control, protocols, secret sharing, and digital
signatures.
This book constitutes the refereed proceedings of the 5th IMA
Conference on Cryptography and Coding, held in Cirencester, UK in
December 1995.
The volume presents 22 full revised papers selected from 48
submissions together with five invited full papers and three
abstracts on the mathematical theory and practice of cryptography
and coding; continuing advances in these strongly related areas are
crucial for the security and reliability of data communication,
processing, and storage. Among the topics addressed are linear
codes, error-correcting codes, decoding, key distribution,
authentication, hash functions, block ciphers, cryptanalysis, and
electronic cash.
A captivating photographic portrait of the diverse experiences of
immigrants in the United States, depicting the resilience and
realities of building a home in a new place. Disturbed by the
increasingly hostile views of immigrants that arose in the United
States during the 2016 presidential election, photographer Colin
Boyd Shafer set out on a road trip to meet hundreds of families and
individuals with roots abroad who now live in America. The result,
after a year of travel covering fifty thousand miles, is this
collection of striking photos and moving stories that form a
portrait of the nation’s complex and shifting relationship to
immigration. Some of the participants chose to make America home;
others were displaced by crises. Some were warmly welcomed and
granted citizenship; others battled the immigration system for
years and still live with fear and uncertainty. Their circumstances
and origins vary, but all are united by a willingness to share
their stories—of harrowing journeys, intense love, separated
families, passionate activism—in hopes of adding nuance and depth
to a vital issue that continues to polarize Americans.
|
|