|
|
Showing 1 - 7 of
7 matches in All Departments
This book constitutes the refereed proceedings of the
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held
in San Francisco, CA, USA, in February/March 2013. The 25 revised
full papers presented were carefully reviewed and selected from 89
submissions. The papers are grouped into topical sections covering:
side channel attacks, digital signatures, public-key encryption,
cryptographic protocols, secure implementation methods, symmetric
key primitives, and identity-based encryption.
This book constitutes the refereed proceedings of the Third
International Information Security Practice and Experience
Conference, ISPEC 2007, held in Hong Kong, China in May 2007.
The 24 revised full papers presented together with 2 invited
papers were carefully reviewed and selected from 135 submissions.
The papers are organized in topical sections on cryptanalysis,
signatures, network security and security management, privacy and
applications, cryptographic algorithms and implementations,
authentication and key management, as well as cryptosystems.
Mycrypt 2005 was the inaugural international conference on
cryptology hosted in Malaysia. The conference was co-organized by
the Information Security - search Lab at Swinburne University of
Technology (Sarawak Campus), NISER (National ICT Security and
Emergency Response Centre) and INSPEM (Ins- tute for
MathematicalResearch)at UPM (UniversityPutra Malaysia).Mycrypt 2005
was held in Kuala Lumpur, Malaysia during September 28-30 2005, in
conjunction with the e-Secure Malaysia 2005 convention.
Therewere90paper submissionsfrom23 countriescoveringall areasof cr-
tologic research, from which 19 were accepted. We would like to
extend our thanks to all authors who submitted papers to Mycrypt
2005. Each paper was
sentanonymouslytoatleast3membersoftheInternationalProgramCommittee
for reviews and comments. The review comments were then followed by
disc- sions among the Program Committee. A recipient of the Best
Paper Award was also selected after voting among Program Committee
members. The winning paper was "Distinguishing Attacks on
T-functions" by Simon Kunzli ] (FH A- gau, Swizerland), Pascal
Junod (Nagravision SA, Switzerland) and Willi Meier (FH Aargau,
Swizerland). These proceedings contain revised versions of all the
accepted papers. The conference program included three keynote
papers: Hideki Imai (Tokyo University)presenteda paper entitled
"TrendsandChallenges forSecurer Cr- tography in Practice." Moti
Yung (Columbia University) presented a paper entitled "E?cient
Secure Group Signatures with Dynamic Joins and Keeping Anonymity
Against Group Managers." Colin Boyd (QUT) presented a paper
entitled "Security of Two-Party Identity-Based Key Agreement." We
are extremely grateful for the time and e?ort of all the members of
the Program Committee in the review process. Their names may be
found overleaf."
This book constitutes the refereed proceedings of the Third
Australasian Conference on Information Security and Privacy,
ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of
66 submissions; also included are two invited contributions. The
book is divided in sections on network security, block ciphers,
stream ciphers, authorization codes and Boolean functions, software
security and electronic commerce, public key cryptography,
hardware, access control, protocols, secret sharing, and digital
signatures.
|
Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Josef Pieprzyk, Hossein Ghodosi, Ed Dawson
|
R1,462
Discovery Miles 14 620
|
Ships in 18 - 22 working days
|
Here is a highly relevant book that covers a wide array of key
aspects in information security. It constitutes the refereed
proceedings of the 12th Australasian Conference on Information
Security and Privacy held in Townsville, Australia in July 2007.
The 33 revised full papers presented were carefully reviewed and
selected from 132 submissions. The papers are organized in topical
sections on stream ciphers, hashing, biometrics, secret sharing,
cryptanalysis, public key cryptography, authentication, e-commerce,
and security.
|
You may like...
Catan
(16)
R1,347
Discovery Miles 13 470
Gloria
Sam Smith
CD
R174
R164
Discovery Miles 1 640
|