Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Information Theoretic Security
  • Language: en
  • Pages: 260

Information Theoretic Security

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008. The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions. There were nine invited speeches to the conference. The topics covered are secure and reliable communication; quantum information and communication; networks and devices; multiparty computation; information hiding and tracing; coding theory and security; quantum computation; foundation; and encryption.

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
  • Language: en
  • Pages: 348

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

This book constitutes the refereed proceedings of the 16th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-16, held in Las Vegas, NV, USA in February 2006. The 25 revised full papers presented together with 7 invited papers were carefully reviewed and selected from 32 submissions. Among the subjects addressed are block codes; algebra and codes: rings, fields, and AG codes; cryptography; sequences; decoding algorithms; and algebra: constructions in algebra, Galois groups, differential algebra, and polynomials.

Information Security and Privacy
  • Language: en
  • Pages: 456

Information Security and Privacy

This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical sections on stream ciphers, symmetric key ciphers, network security, cryptographic applications, secure implementation, signatures, theory, security applications, provable security, protocols, as well as hashing and message authentication.

Knowledge-Based Intelligent Information and Engineering Systems
  • Language: en
  • Pages: 1154

Knowledge-Based Intelligent Information and Engineering Systems

  • Type: Book
  • -
  • Published: 2007-09-14
  • -
  • Publisher: Springer

Annotation The three volume set LNAI 4692, LNAI 4693, and LNAI 4694, constitute the refereed proceedings of the 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2007, held in Vietri sul Mare, Italy, September 12-14, 2007. The 409 revised papers presented were carefully reviewed and selected from about 1203 submissions. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense; topics covered in the first volume are artificial neural networks and connectionists systems, fuzzy and neuro-fuzzy systems, evolutionary computation, machine learning and classical AI, agent s...

Applied Cryptography and Network Security
  • Language: en
  • Pages: 562

Applied Cryptography and Network Security

  • Type: Book
  • -
  • Published: 2011-06-14
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

Advances in Cryptology - ASIACRYPT 2002
  • Language: en
  • Pages: 589

Advances in Cryptology - ASIACRYPT 2002

  • Type: Book
  • -
  • Published: 2003-08-02
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002. The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography.

Information Security and Cryptoloy - ICISC 2008
  • Language: en
  • Pages: 444

Information Security and Cryptoloy - ICISC 2008

  • Type: Book
  • -
  • Published: 2009-03-18
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.

Provable Security
  • Language: en
  • Pages: 364

Provable Security

  • Type: Book
  • -
  • Published: 2014-10-01
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.

Practical Signcryption
  • Language: en
  • Pages: 280

Practical Signcryption

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide securi...

Public Key Cryptography
  • Language: en
  • Pages: 434

Public Key Cryptography

  • Type: Book
  • -
  • Published: 2003-06-29
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, held in Cheju Island, Korea in February 2001. The 30 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers address all current issues in public key cryptography, ranging from mathematical foundations to implementation issues.