|
|
Showing 1 - 16 of
16 matches in All Departments
Information Systems (IS) are a nearly omnipresent aspect of the
modern world, playing crucial roles in the fields of science and
engineering, business and law, art and culture, politics and
government, and many others. As such, identity theft and
unauthorized access to these systems are serious concerns. Theory
and Practice of Cryptography Solutions for Secure Information
Systems explores current trends in IS security technologies,
techniques, and concerns, primarily through the use of
cryptographic tools to safeguard valuable information resources.
This reference book serves the needs of professionals, academics,
and students requiring dedicated information systems free from
outside interference, as well as developers of secure IS
applications. This book is part of the Advances in Information
Security, Privacy, and Ethics series collection.
This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.
This book constitutes the refereed proceedings of the 11th
International Conference on Cryptology and Network Security, CANS
2012, held in Darmstadt, Germany, in December 2012. The 22 revised
full papers, presented were carefully reviewed and selected from 99
submissions. The papers are organized in topical sections on
cryptanalysis; network security; cryptographic protocols;
encryption; and s-box theory.
This reference work looks at modern concepts of computer security.
It introduces the basic mathematical background necessary to follow
computer security concepts before moving on to modern developments
in cryptography. The concepts are presented clearly and illustrated
by numerous examples. Subjects covered include: private-key and
public-key encryption, hashing, digital signatures, authentication,
secret sharing, group-oriented cryptography, and many others. The
section on intrusion detection and access control provide examples
of security systems implemented as a part of operating system.
Database and network security is also discussed. The final chapters
introduce modern e- business systems based on digital cash.
The RSA Conference is an annual event that attracts hundreds of
vendors and thousands of participants from industry and academia.
Since 2001, the conf- ence has included an academic
Cryptographers'Track (CT-RSA). This year was the 10th anniversary
of CT-RSA. Since its conception, the CT-RSA conference has become a
major avenue for publishing high-quality research papers. The RSA
conference was held in San Francisco, California, during March 1-5,
2010. This year we received94 submissions. Eachpaper gotassignedto
three ref- ees. Papers submitted by the members of the Program
Committee got assigned
to?vereferees.Inthe?rststageofthereviewprocess,
thesubmittedpaperswere read and evaluated by the ProgramCommittee
members and then in the second stage, the papers were scrutinized
during an extensive discussion. Finally, the Program Committee
chose 25 papers to be included in the conference program. The
authors of the accepted papers had two weeks for revision and
preparation of ?nal versions.The revised papers were not subject to
editorial review and the authors bear full responsibility for their
contents. The submission and review process was supported by the
iChair conference submission server. We thank Matthiew Finiasz and
Thomas Baign eres for letting us use iChair. The conf- ence
proceedings were published by Springer in this volume of Lecture
Notes in Computer Science.
|
Information Security and Privacy - 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings (Paperback, 2004 ed.)
Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan
|
R2,855
Discovery Miles 28 550
|
Ships in 18 - 22 working days
|
The 9th Australasian Conference on Information Security and Privacy
(ACISP 2004) was held in Sydney, 13-15 July, 2004. The conference
was sponsored by the Centre for Advanced Computing - Algorithms and
Cryptography (ACAC), Information and Networked Security Systems
Research (INSS), Macquarie U- versity and the Australian Computer
Society.
Theaimsoftheconferencearetobringtogetherresearchersandpractitioners
working in areas of information security and privacy from
universities, industry and government sectors. The conference
program covered a range of aspects including cryptography,
cryptanalysis, systems and network security. The program committee
accepted 41 papers from 195 submissions. The - viewing process took
six weeks and each paper was carefully evaluated by at least three
members of the program committee. We appreciate the hard work of
the members of the program committee and external referees who gave
many hours of their valuable time. Of the accepted papers, there
were nine from Korea, six from Australia, ?ve each from Japan and
the USA, three each from China and Singapore, two each from Canada
and Switzerland, and one each from Belgium, France, Germany,
Taiwan, The Netherlands and the UK. All the authors, whether or not
their papers were accepted, made valued contributions to the
conference. In addition to the contributed papers, Dr Arjen Lenstra
gave an invited talk, entitled Likely and Unlikely Progress in
Factoring.
ThisyeartheprogramcommitteeintroducedtheBestStudentPaperAward. The
winner of the prize for the Best Student Paper was Yan-Cheng Chang
from Harvard University for his paper Single Database Private
Information Retrieval with Logarithmic Communication.
The third International Workshop on Information Security was held
at the U- versity of Wollongong, Australia. The conference was
sponsored by the Centre for Computer Security Research, University
of Wollongong. The main themes of the conference were the newly
emerging issues of Information Security. Mul- media copyright
protection and security aspects of e-commerce were two topics that
clearly re?ect the focus of the conference. Protection of the
copyright of electronic documents seems to be driven by strong
practical demand from the industry for new, e cient and secure
solutions. Although e-commerce is already booming, it has not
reached its full potential in terms of new, e cient and secure
e-commerce protocols with added properties. There were 63 papers
submitted to the conference. The program committee accepted 23. Of
those accepted, six papers were from Australia, ve from Japan, two
each from Spain, Germany and the USA, and one each from Finland and
Sweden. Four papers were co-authored by international teams from
Canada and China, Korea and Australia, Taiwan and Australia, and
Belgium, France and Germany, respectively. Final versions of the
accepted papers were gathered using computing and other resources
of the Institute of Mathematics, Polish Academy of Sciences,
Warsaw, Poland. We are especially grateful to Jerzy Urbanowicz and
Andrzej Pokrzywa for their help during preparation of the
proceedings.
|
Information Security and Privacy - 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings (Paperback)
Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
|
R1,521
Discovery Miles 15 210
|
Ships in 18 - 22 working days
|
The4thAustralasianConferenceonInformationSecurityandPrivacywasheld
attheUniversityofWollongong, Australia. Theconferencewassponsoredby
theCentreforComputerSecurityResearch, UniversityofWollongong,
andthe AustralianComputerSociety.
Theaimoftheconferencewastobringtogether peopleworkingindi
erentareasofcomputer, communication, andinformation
securityfromuniversities, industry, andgovernmentinstitutions.
Theconference
gavetheparticipantsanopportunitytodiscussthelatestdevelopmentsinthe
quicklygrowingareaofinformationsecurityandprivacy.
Theprogramcommitteeaccepted26papersfrom53submitted. Fromthose
accepted, thirteen papers were from Australia, two each from
Belgium and China, andoneeachfromAustria, Belarus, France, India,
Japan, Korea, Sin- pore, theUSA, andYugoslavia.
Conferencesessionscoveredthefollowingtopics:
accesscontrolandsecuritymodels, networksecurity, Booleanfunctions,
group communication, cryptanalysis, keymanagementsystems,
electroniccommerce, signatureschemes, RSAcryptosystems,
andoddsandends. We would like to thank the members of the program
committee who -
nerouslyspenttheirtimereadingandevaluatingthepapers.
Wewouldalsolike tothankmembersoftheorganisingcommitteeand,
inparticular, ChrisCh- nes, HosseinGhodosi, MarcGysin,
Tiang-BingXia, Cheng-XinQu, SanYeow Lee, YejingWang, Hua-XiongWang,
Chih-HungLi, WillySusilo, ChintanShah, Je reyHorton,
andGhulamRasoolChaudhryfortheircontinuousandtireless e
ortinorganisingtheconference. Finally,
wewouldliketothanktheauthorsof allthesubmittedpapers,
especiallytheacceptedones, andalltheparticipants
whomadetheconferenceasuccessfulevent. February1999 JosefPieprzyk
ReiSafavi-Naini JenniferSeberry FOURTHAUSTRALASIANCONFERENCE
ONINFORMATIONSECURITY ANDPRIVACY ACISP 99 Sponsoredby
CenterforComputerSecurityResearch UniversityofWollongong, Australia
and AustralianComputerSociety GeneralChair: JenniferSeberry
UniversityofWollongong ProgramCo-Chairs: JosefPieprzyk
UniversityofWollongong ReiSafavi-Naini UniversityofWollongong
ProgramCommittee: ColinBoyd QueenslandUniversityofTechnology,
Australia LawrieBrown AustralianDefenceForceAcademy, Australia
BillCaelli QueenslandUniversityofTechnology, Australia EdDawson
QueenslandUniversityofTechnology, Australia CunshengDing
NationalUniversityofSingapore, Singapore DieterGollmann
MicrosoftResearch, UK YongfeiHan Gemplus, Singapore ThomasHardjono
BayNetworks, US ErlandJonsson ChalmersUniversity, Sweden
SveinKnapskog UniversityofTrondheim, Norway KeithMartin
KatholiekeUniversiteitLeuven, Belgium CathyMeadows
NavalResearchLaboratory, US KaisaNyberg NokiaResearchCenter,
Finland Choon-SikPark
ElectronicsandTelecommunicationResearchInstitute, Korea DingyiPei
AcademiaSinica, China SteveRoberts WithamPtyLtd, Australia
ConferenceOrganization VII GregRose Qualcomm, Australia RaviSandhu
GeorgeMasonUniversity, US Sta ordTavares Queen sUniversity, Canada
VijayVaradharajan WesternSydneyUniversity, Australia YuliangZheng
MonashUniversity, Australia Referees N. Asokan ZhangJiang DingyiPei
YunBai ErlandJonsson JosefPieprzyk SimonBlackburn SveinKnapskog
VincentRijmen ColinBoyd HuLei SteveRoberts LawrieBrown
LeszekMaciaszek GregRose BillCaelli KeithMartin ReiSafavi-Naini
EdDawson CathyMeadows RaviSandhu CunshengDing BillMillan
RajanShankaran GaryGaskell QiMing Sta ordTavares JanuszGetta
Sang-JaeMoon VijayVaradharajan DieterGollmann YiMu Kapaleeswaran
MarcGysin KennyNguyen Viswanathan YongfeiHan KaisaNyberg ChuanWu
ThomasHardjono Choon-SikPark YuliangZheng. TableofContents
BooleanFunctions BooleanFunctionDesignUsingHillClimbingMethods
WilliamMillan, AndrewClark, andEdDawson. . . . . . . . . . . . . .
. . . . . . . . . . . . . . 1
EnumerationofCorrelationImmuneBooleanFunctions
SubhamoyMaitraandPalashSarkar. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 12
OntheSymmetricPropertyofHomogeneousBooleanFunctions ChengxinQu,
JenniferSeberry, andJosefPieprzyk. . . . . . . . . . . . . . . . .
. . . . . . . 26 KeyManagement PubliclyVeri
ableKeyEscrowwithLimitedTimeSpan KapaliViswanathan, ColinBoyd,
andEdDawson. . . . . . . . . . . . . . . . . . . . . . . . . 36
AcceleratingKeyEstablishmentProtocolsforMobileCommunication
SeungwonLee, Seong-MinHong, HyunsooYoon, andYookunCho. . . . . . .
. . 51 ConferenceKeyAgreementfromSecretSharing
Chih-HungLiandJosefPieprzyk . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 64 Cryptanalysis
Onm-PermutationProtectionSchemeAgainstModi cationAttack W. W.
FungandJ. W. Gray, III. . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 77
InversionAttackandBranching JovanDj. Golic, AndrewClark,
andEdDawson . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Signatures Fail-StopThresholdSignatureSchemesBasedonEllipticCurves
WillySusilo, ReiSafavi-Naini, andJosefPieprzyk. . . . . . . . . . .
. . . . . . . . . . . . 103
DivertibleZero-KnowledgeProofofPolynomialRelationsand
BlindGroupSignature KhanhQuocNguyen, YiMu, andVijayVaradharajan. .
. . . . . . . . . . . . . . . . . . 117
RepudiationofCheatingandNon-repudiationof Zhang
sProxySignatureSchemes HosseinGhodosiandJosefPieprzyk . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 X
TableofContents RSACryptosystems
OntheSecurityofanRSABasedEncryptionScheme SigunaMul ]ler . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 135
GeneralisedCyclingAttacksonRSAandStrongRSAPrimes
MarcGysinandJenniferSeberry. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 149
RSAAccelerationwithFieldProgrammableGateArrays
AlexanderTiountchikandElenaTrichina. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . 164 GroupCryptography
ChangingThresholdsintheAbsenceofSecureChannels KeithM. Martin,
JosefPieprzyk, ReiSafavi-Naini, andHuaxiongWang . 177 ASelf-Certi
edGroup-OrientedCryptosystemWithoutaCombiner
ShahrokhSaeedniaandHosseinGhodosi . . . . . . . . . . . . . . . . .
. . .
|
Information Security and Privacy - Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings (Paperback, 1997 ed.)
Vijav Varadharajan, Josef Pieprzyk, Yi Mu
|
R1,525
Discovery Miles 15 250
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the Second
Australasian Conference on Information Security and Privacy,
ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for
inclusion in the proceedings. The book is divided into sections on
security models and access control, network security, secure
hardware and implementation issues, cryptographic functions and
ciphers, authentication codes and secret sharing systems,
cryptanalysis, key escrow, security protocols and key management,
and applications.
|
Information Security and Privacy - First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings (Paperback, 1996 ed.)
Josef Pieprzyk, Jennifer Seberry
|
R1,523
Discovery Miles 15 230
|
Ships in 18 - 22 working days
|
This book constitutes the thoroughly refereed post-conference
proceedings of the First Australiasian Conference on Information
Security and Privacy, ACISP '96, held in Wollongong, NSW,
Australia, in June 1996.
The volume includes revised full versions of the 26 refereed papers
accepted for presentation at the conference; also included are
three invited contributions. The papers are organized in topical
sections on authentication, secret sharing, encryption and
cryptographic functions, authentication protocols, stream ciphers,
access control, security models and intrusion detection, threshold
cryptography, and hashing.
This work presents recent developments in hashing algorithm design.
Hashing is the process of creating a short digest (i.e., 64 bits)
for a message of arbitrary length, for exam- ple 20 Mbytes. Hashing
algorithms were first used for sear- ching records in databases;
they are central for digital si- gnature applications and are used
for authentication without secrecy. Covering all practical and
theoretical issues related to the design of secure hashing
algorithms the book is self contained; it includes an extensive
bibliography on the topic.
This volume is a collection of refereed papers presented during
AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This
was the first conference of a series sponsored by the International
Association for Cryptological Research (IACR) in addition to the
EUROCRYPT series held in European countries and the CRYPTO series
held in Santa Barbara, California. The volume is divided into
sections on: - Public-key cryptosystems - Pseudorandomness and
sequences - Network security - Authentication - Block ciphers -
Zero-knowledge protocols - Theory - Applications - Implementations.
It is a "must" for all researchers and students interested in
recent progress in cryptology.
|
Number-Theoretic Methods in Cryptology - First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykala
|
R2,153
Discovery Miles 21 530
|
Ships in 18 - 22 working days
|
This book constitutes the refereed post-conference proceedings of
the First International Conference on Number-Theoretic Methods in
Cryptology, NuTMiC 2017, held in Warsaw, Poland, in September
2017.The 15 revised full papers presented in this book together
with 3 invited talks were carefully reviewed and selected from 32
initial submissions. The papers are organized in topical sections
on elliptic curves in cryptography; public-key cryptography;
lattices in cryptography; number theory; pseudorandomness; and
algebraic structures and analysis.
|
Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Josef Pieprzyk, Suriadi Suriadi
|
R2,661
Discovery Miles 26 610
|
Ships in 18 - 22 working days
|
The two volume set LNCS 10342 and 10343 constitutes the refereed
Proceedings of the 22nd Australasian Conference on Information
Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in
July 2017. The 45 revised full papers, 2 keynotes, 8 invited papers
and 10 short papers presented in this double volume, were carefully
revised and selected from 150 submissions. The papers of Part I
(LNCS 10342) are organized in topical sections on public key
encryption; attribute-based encryption; identity-based encryption;
searchable encryption; cryptanalysis; digital signatures. The
papers of Part II (LNCS 10343) are organized in topical sections on
symmetric cryptography; software security; network security;
malware detection; privacy; authentication; elliptic curve
cryptography.
|
Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Josef Pieprzyk, Suriadi Suriadi
|
R2,693
Discovery Miles 26 930
|
Ships in 18 - 22 working days
|
The two volume set LNCS 10342 and 10343 constitutes the refereed
Proceedings of the 22nd Australasian Conference on Information
Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in
July 2017. The 45 revised full papers, 2 keynotes, 8 invited papers
and 10 short papers presented in this double volume, were carefully
revised and selected from 150 submissions. The papers of Part I
(LNCS 10342) are organized in topical sections on public key
encryption; attribute-based encryption; identity-based encryption;
searchable encryption; cryptanalysis; digital signatures. The
papers of Part II (LNCS 10343) are organized in topical sections on
symmetric cryptography; software security; network security;
malware detection; privacy; authentication; elliptic curve
cryptography.
|
Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Josef Pieprzyk, Hossein Ghodosi, Ed Dawson
|
R1,462
Discovery Miles 14 620
|
Ships in 18 - 22 working days
|
Here is a highly relevant book that covers a wide array of key
aspects in information security. It constitutes the refereed
proceedings of the 12th Australasian Conference on Information
Security and Privacy held in Townsville, Australia in July 2007.
The 33 revised full papers presented were carefully reviewed and
selected from 132 submissions. The papers are organized in topical
sections on stream ciphers, hashing, biometrics, secret sharing,
cryptanalysis, public key cryptography, authentication, e-commerce,
and security.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|