Browse Results

Showing 28,301 through 28,325 of 61,737 results

Information Security and Cryptology – ICISC 2016

by Seokhie Hong Jong Hwan Park

This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis.

Information Security and Cryptology – ICISC 2017: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers (Lecture Notes in Computer Science #10779)

by Howon Kim Dong-Chan Kim

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.

Information Security and Cryptology – ICISC 2018: 21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11396)

by Kwangsu Lee

This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018. The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.

Information Security and Cryptology – ICISC 2019: 22nd International Conference, Seoul, South Korea, December 4–6, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11975)

by Jae Hong Seo

This book constitutes revised selected papers from the 22nd International Conference on Information Security and Cryptology, ICISC 2019, held in Seoul, South Korea, in December 2019. The total of 18 papers presented in this volume were carefully reviewed and selected from 43 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.

Information Security and Cryptology – ICISC 2021: 24th International Conference, Seoul, South Korea, December 1–3, 2021, Revised Selected Papers (Lecture Notes in Computer Science #13218)

by Jong Hwan Park Seung-Hyun Seo

This book constitutes selected papers from the 24th International Conference on Information Security and Cryptology, ICISC 2021, held in Seoul, South Korea, in December 2021. The total of 23 papers presented in this volume were carefully reviewed and selected from 63 submissions. The papers are arranged by topic: Cryptographic Protocol in Quantum Computer Age; Security Analysis of Hash Algorithm; Security analysis of Symmetric Key Encryption Algorithm; Fault and Side-Channel Attack; Constructions and Designs; Quantum Circuit; Efficient Implementation. The aim of this conference was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptology.

Information Security and Cryptology – ICISC 2022: 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13849)

by Seung-Hyun Seo Hwajeong Seo

This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30–December 2, 2022. The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: ​Public Key Encryption with Hierarchical Authorized Keyword Search, Implicit Key-stretching Security of Encryption Schemes.

Information Security and Cryptology – ICISC 2023: 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 – December 1, 2023, Revised Selected Papers, Part I (Lecture Notes in Computer Science #14561)

by Hwajeong Seo Suhri Kim

This book constitutes the refereed proceedings of the 26th International Conference on Information Security and Cryptology on Information Security and Cryptology – ICISC 2023, held in Seoul, South Korea, during November 29–December 1, 2023The 31 full papers included in this book were carefully reviewed and selected from 78 submissions. They were organized in topical sections as follows:Part I: cryptanalysis and quantum cryptanalysis; side channel attack; signature schemes.Part II: cyber security; applied cryptography; and korean post quantum cryptography.

Information Security and Cryptology – ICISC 2023: 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 – December 1, 2023, Revised Selected Papers, Part II (Lecture Notes in Computer Science #14562)

by Hwajeong Seo Suhri Kim

This book constitutes the refereed proceedings of the 26th International Conference on Information Security and Cryptology on Information Security and Cryptology – ICISC 2023, held in Seoul, South Korea, during November 29–December 1, 2023The 31 full papers included in this book were carefully reviewed and selected from 78 submissions. They were organized in topical sections as follows:Part I: Cryptanalysis and Quantum Cryptanalysis; Side Channel Attack; Signature Schemes.Part II: Cyber Security; Applied Cryptography; and Korean Post Quantum Cryptography.

Information Security and Cryptology: 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers (Lecture Notes in Computer Science #10726)

by Moti Yung Dongdai Lin Xiaofeng Chen

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.

Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11449)

by Moti Yung Xinyi Huang Fuchun Guo

This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.The 31 full papers presented together with 5 short papers and 1 invited paper were carefully reviewed and selected from 93 submissions. The papers cover topics in the field of blockchain and crypto currency; lattice-based cryptology; symmetric cryptology; applied cryptography; information security; assymetric encryption; and foundations.

Information Security and Cryptology: 15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers (Lecture Notes in Computer Science #12020)

by Moti Yung Zhe Liu

This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.

Information Security and Cryptology: 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12612)

by Moti Yung Yongdong Wu

This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020.Due the COVID-19, the conference was held online and physical. The 24 full papers presented together with 8 short papers were carefully reviewed and selected from 79 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications.

Information Security and Cryptology: 17th International Conference, Inscrypt 2021, Virtual Event, August 12–14, 2021, Revised Selected Papers (Lecture Notes in Computer Science #13007)

by Moti Yung Yu Yu

This book constitutes the post-conference proceedings of the 17th International Conference on Information Security and Cryptology, Inscrypt 2021, in August 2021. Due the COVID-19, the conference was held onlineThe 28 full papers presented were carefully reviewed and selected from 81 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications.

Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11–13, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13837)

by Moti Yung Yi Deng

This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11–13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.

Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part I (Lecture Notes in Computer Science #14526)

by Moti Yung Chunpeng Ge

The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023.The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.

Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II (Lecture Notes in Computer Science #14527)

by Moti Yung Chunpeng Ge

The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023.The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.

Information Security and Cryptology: 20th International Conference, Inscrypt 2024, Kunming, China, December 14–16, 2024, Revised Selected Papers, Part I (Lecture Notes in Computer Science #15543)

by Moti Yung Dongdai Lin Meiqin Wang

The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14–16, 2024. The 46 full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers were organized in the following topical sections: Part I : Big data and cloud security; Foundations of Cryptography; Implementation of Cryptosystems; Key Exchange; AI and Security; Security Analysis; Privacy-enhancing technologies; Watermarking. Part II : Public Key Cryptosystems; Security Protocols Analysis; Symmetric Cryptanalysis; Quantum and Post Quantum Cryptography.

Information Security and Cryptology: 20th International Conference, Inscrypt 2024, Kunming, China, December 14–16, 2024, Revised Selected Papers, Part II (Lecture Notes in Computer Science #15544)

by Moti Yung Dongdai Lin Meiqin Wang

The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14–16, 2024. The 47 full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers were organized in the following topical sections: Part I : Big data and cloud security; Foundations of Cryptography; Implementation of Cryptosystems; Key Exchange; AI and Security; Security Analysis; Privacy-enhancing technologies; Watermarking. Part II : Public Key Cryptosystems; Security Protocols Analysis; Symmetric Cryptanalysis; Quantum and Post Quantum Cryptography.

Information Security and Optimization

by Sunil Gupta Mazdak Zamani Rohit Tanwar Tanupriya Choudhury

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.

Information Security and Privacy

by Suriadi Suriadi Josef Pieprzyk

The4thAustralasianConferenceonInformationSecurityandPrivacywasheld attheUniversityofWollongong, Australia. Theconferencewassponsoredby theCentreforComputerSecurityResearch, UniversityofWollongong, andthe AustralianComputerSociety. Theaimoftheconferencewastobringtogether peopleworkingindi erentareasofcomputer, communication, andinformation securityfromuniversities, industry, andgovernmentinstitutions. Theconference gavetheparticipantsanopportunitytodiscussthelatestdevelopmentsinthe quicklygrowingareaofinformationsecurityandprivacy. Theprogramcommitteeaccepted26papersfrom53submitted. Fromthose accepted, thirteen papers were from Australia, two each from Belgium and China, andoneeachfromAustria, Belarus, France, India, Japan, Korea, Sin- pore, theUSA, andYugoslavia. Conferencesessionscoveredthefollowingtopics: accesscontrolandsecuritymodels, networksecurity, Booleanfunctions, group communication, cryptanalysis, keymanagementsystems, electroniccommerce, signatureschemes, RSAcryptosystems, andoddsandends. We would like to thank the members of the program committee who - nerouslyspenttheirtimereadingandevaluatingthepapers. Wewouldalsolike tothankmembersoftheorganisingcommitteeand, inparticular, ChrisCh- nes, HosseinGhodosi, MarcGysin, Tiang-BingXia, Cheng-XinQu, SanYeow Lee, YejingWang, Hua-XiongWang, Chih-HungLi, WillySusilo, ChintanShah, Je reyHorton, andGhulamRasoolChaudhryfortheircontinuousandtireless e ortinorganisingtheconference. Finally, wewouldliketothanktheauthorsof allthesubmittedpapers, especiallytheacceptedones, andalltheparticipants whomadetheconferenceasuccessfulevent. February1999 JosefPieprzyk ReiSafavi-Naini JenniferSeberry FOURTHAUSTRALASIANCONFERENCE ONINFORMATIONSECURITY ANDPRIVACY ACISP'99 Sponsoredby CenterforComputerSecurityResearch UniversityofWollongong, Australia and AustralianComputerSociety GeneralChair: JenniferSeberry UniversityofWollongong ProgramCo-Chairs: JosefPieprzyk UniversityofWollongong ReiSafavi-Naini UniversityofWollongong ProgramCommittee: ColinBoyd QueenslandUniversityofTechnology, Australia LawrieBrown AustralianDefenceForceAcademy, Australia BillCaelli QueenslandUniversityofTechnology, Australia EdDawson QueenslandUniversityofTechnology, Australia CunshengDing NationalUniversityofSingapore, Singapore DieterGollmann MicrosoftResearch, UK YongfeiHan Gemplus, Singapore ThomasHardjono BayNetworks, US ErlandJonsson ChalmersUniversity, Sweden SveinKnapskog UniversityofTrondheim, Norway KeithMartin KatholiekeUniversiteitLeuven, Belgium CathyMeadows NavalResearchLaboratory, US KaisaNyberg NokiaResearchCenter, Finland Choon-SikPark ElectronicsandTelecommunicationResearchInstitute, Korea DingyiPei AcademiaSinica, China SteveRoberts WithamPtyLtd, Australia ConferenceOrganization VII GregRose Qualcomm, Australia RaviSandhu GeorgeMasonUniversity, US Sta ordTavares Queen'sUniversity, Canada VijayVaradharajan WesternSydneyUniversity, Australia YuliangZheng MonashUniversity, Australia Referees N. Asokan ZhangJiang DingyiPei YunBai ErlandJonsson JosefPieprzyk SimonBlackburn SveinKnapskog VincentRijmen ColinBoyd HuLei SteveRoberts LawrieBrown LeszekMaciaszek GregRose BillCaelli KeithMartin ReiSafavi-Naini EdDawson CathyMeadows RaviSandhu CunshengDing BillMillan RajanShankaran GaryGaskell QiMing Sta ordTavares JanuszGetta Sang-JaeMoon VijayVaradharajan DieterGollmann YiMu Kapaleeswaran MarcGysin KennyNguyen Viswanathan YongfeiHan KaisaNyberg ChuanWu ThomasHardjono Choon-SikPark YuliangZheng. TableofContents BooleanFunctions BooleanFunctionDesignUsingHillClimbingMethods WilliamMillan, AndrewClark, andEdDawson. . . . . . . . . . .

Information Security and Privacy

by Suriadi Suriadi Josef Pieprzyk

The4thAustralasianConferenceonInformationSecurityandPrivacywasheld attheUniversityofWollongong, Australia. Theconferencewassponsoredby theCentreforComputerSecurityResearch, UniversityofWollongong, andthe AustralianComputerSociety. Theaimoftheconferencewastobringtogether peopleworkingindi erentareasofcomputer, communication, andinformation securityfromuniversities, industry, andgovernmentinstitutions. Theconference gavetheparticipantsanopportunitytodiscussthelatestdevelopmentsinthe quicklygrowingareaofinformationsecurityandprivacy. Theprogramcommitteeaccepted26papersfrom53submitted. Fromthose accepted, thirteen papers were from Australia, two each from Belgium and China, andoneeachfromAustria, Belarus, France, India, Japan, Korea, Sin- pore, theUSA, andYugoslavia. Conferencesessionscoveredthefollowingtopics: accesscontrolandsecuritymodels, networksecurity, Booleanfunctions, group communication, cryptanalysis, keymanagementsystems, electroniccommerce, signatureschemes, RSAcryptosystems, andoddsandends. We would like to thank the members of the program committee who - nerouslyspenttheirtimereadingandevaluatingthepapers. Wewouldalsolike tothankmembersoftheorganisingcommitteeand, inparticular, ChrisCh- nes, HosseinGhodosi, MarcGysin, Tiang-BingXia, Cheng-XinQu, SanYeow Lee, YejingWang, Hua-XiongWang, Chih-HungLi, WillySusilo, ChintanShah, Je reyHorton, andGhulamRasoolChaudhryfortheircontinuousandtireless e ortinorganisingtheconference. Finally, wewouldliketothanktheauthorsof allthesubmittedpapers, especiallytheacceptedones, andalltheparticipants whomadetheconferenceasuccessfulevent. February1999 JosefPieprzyk ReiSafavi-Naini JenniferSeberry FOURTHAUSTRALASIANCONFERENCE ONINFORMATIONSECURITY ANDPRIVACY ACISP'99 Sponsoredby CenterforComputerSecurityResearch UniversityofWollongong, Australia and AustralianComputerSociety GeneralChair: JenniferSeberry UniversityofWollongong ProgramCo-Chairs: JosefPieprzyk UniversityofWollongong ReiSafavi-Naini UniversityofWollongong ProgramCommittee: ColinBoyd QueenslandUniversityofTechnology, Australia LawrieBrown AustralianDefenceForceAcademy, Australia BillCaelli QueenslandUniversityofTechnology, Australia EdDawson QueenslandUniversityofTechnology, Australia CunshengDing NationalUniversityofSingapore, Singapore DieterGollmann MicrosoftResearch, UK YongfeiHan Gemplus, Singapore ThomasHardjono BayNetworks, US ErlandJonsson ChalmersUniversity, Sweden SveinKnapskog UniversityofTrondheim, Norway KeithMartin KatholiekeUniversiteitLeuven, Belgium CathyMeadows NavalResearchLaboratory, US KaisaNyberg NokiaResearchCenter, Finland Choon-SikPark ElectronicsandTelecommunicationResearchInstitute, Korea DingyiPei AcademiaSinica, China SteveRoberts WithamPtyLtd, Australia ConferenceOrganization VII GregRose Qualcomm, Australia RaviSandhu GeorgeMasonUniversity, US Sta ordTavares Queen'sUniversity, Canada VijayVaradharajan WesternSydneyUniversity, Australia YuliangZheng MonashUniversity, Australia Referees N. Asokan ZhangJiang DingyiPei YunBai ErlandJonsson JosefPieprzyk SimonBlackburn SveinKnapskog VincentRijmen ColinBoyd HuLei SteveRoberts LawrieBrown LeszekMaciaszek GregRose BillCaelli KeithMartin ReiSafavi-Naini EdDawson CathyMeadows RaviSandhu CunshengDing BillMillan RajanShankaran GaryGaskell QiMing Sta ordTavares JanuszGetta Sang-JaeMoon VijayVaradharajan DieterGollmann YiMu Kapaleeswaran MarcGysin KennyNguyen Viswanathan YongfeiHan KaisaNyberg ChuanWu ThomasHardjono Choon-SikPark YuliangZheng. TableofContents BooleanFunctions BooleanFunctionDesignUsingHillClimbingMethods WilliamMillan, AndrewClark, andEdDawson. . . . . . . . . . .

Information Security and Privacy

by Joseph K. Liu Ron Steinfeld

The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research from around the globe on a range of topics. ACISP 2010 was held during July 5-7, 2010, at Macquarie University in Sydney, Australia. There were 97 paper submissions for the conference. These submission were reviewed by the Program Committee and a number of other individuals, whose namescanbefoundoverleaf. TheProgramCommitteethenselected24papersfor presentationatthe conference. Thesepapersarecontainedin theseproceedings. In addition to the peer-reviewedpapers, two invited speakers presented talks at the conference: Craig Gentry (IBM, USA); and Stephan Overbeek (Shear- ter Solutions, Australia). We would like to express our gratitude to Craig and Stephan for contributing their knowledge and insight, and thus expanding the horizons of the conference delegates. We would like to thank the authors of all of submission for o?ering their researchforpublicationinACISP2010. WeextendoursincerethankstotheP- gram Committee and other reviewers for the high-quality reviews and in-depth discussion. The Program Committee made use of the iChair electronic subm- sion and reviewing software written by Thomas Baign eres and Matthieu Finiasz at EPFL, LASEC. We would like to express our thanks to Springer for conti- ing to support the ACISP conference and for help in the conference proceedings production. We also thank the Organizing Committee, led by the ACISP 2010 General Chair Josef Pieprzyk, for their contribution to the conference.

Information Security and Privacy Quick Reference: The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer

by Mike Chapple James Michael Stewart Joe Shelley

A fast, accurate, and up-to-date desk reference for information security and privacy practitioners everywhere Information security and privacy roles demand up-to-date knowledge coming from a seemingly countless number of sources, including several certifications—like the CISM, CIPP, and CISSP—legislation and regulations issued by state and national governments, guidance from local and industry organizations, and even international bodies, like the European Union. The Information Security and Privacy Quick Reference: The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer is an updated, convenient, and accurate desk reference for information privacy practitioners who need fast and easy access to the latest guidance, laws, and standards that apply in their field. This book is the most effective resource for information security professionals who need immediate and correct solutions to common and rarely encountered problems. An expert team of writers—Joe Shelley, James Michael Stewart, and the bestselling technical author, Mike Chapple—draw on decades of combined technology and education experience to deliver organized and accessible coverage of: Security and Privacy Foundations Governance, Risk Management, and Compliance Security Architecture and Design Identity and Access Management Data Protection and Privacy Engineering Security and Privacy Incident Management Network Security and Privacy Protections Security Assessment and Testing Endpoint and Device Security Application Security Cryptography Essentials Physical and Environmental Security Legal and Ethical Considerations Threat Intelligence and Cyber Defense Business Continuity and Disaster Recovery Information Security and Privacy Quick Reference is a must-have resource for CISOs, CSOs, Chief Privacy Officers, and other information security and privacy professionals seeking a reliable, accurate, and fast way to answer the questions they encounter at work every single day.

Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (Lecture Notes in Computer Science #9722)

by Joseph K. Liu Ron Steinfeld

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random/One-Way Function.

Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings (Lecture Notes in Computer Science #10946)

by Willy Susilo Guomin Yang

This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.

Refine Search

Showing 28,301 through 28,325 of 61,737 results