- Table View
- List View
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings (Lecture Notes in Computer Science #10946)
by Willy Susilo Guomin YangThis book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.
Information Security and Privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings (Lecture Notes in Computer Science #11547)
by Fuchun Guo Julian Jang-JaccardThis book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019. The 32 revised full papers and 8 short papers presented were carefully revised and selected from 129 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as encryption; post-quantum security; cryptocurrency related; foundations; system and network security; and symmetric cryptography.
Information Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings (Lecture Notes in Computer Science #12248)
by Joseph K. Liu Hui CuiThis book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic.
Information Security and Privacy: 26th Australasian Conference, ACISP 2021, Virtual Event, December 1–3, 2021, Proceedings (Lecture Notes in Computer Science #13083)
by Joonsang Baek Sushmita RujThis book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021.The 35 full papers presented were carefully revised and selected from 157 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.
Information Security and Privacy: 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022, Proceedings (Lecture Notes in Computer Science #13494)
by Willy Susilo Guomin Yang Fuchun Guo Khoa NguyenThis book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.
Information Security and Privacy: 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5–7, 2023, Proceedings (Lecture Notes in Computer Science #13915)
by Leonie Simpson Mir Ali Rezazadeh BaeeThis book constitutes the refereed proceedings of the 28th Australasian Conference on Information Security and Privacy, ACISP 2023, held in Brisbane, QLD, Australia, during July 5-7, 2023. The 27 full papers presented were carefully revised and selected from 87 submissions. The papers present and discuss different aspects of symmetric-key cryptography, public-key cryptography, post-quantum cryptography, cryptographic protocols, and system security.
Information Security and Privacy: 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14895)
by Tianqing Zhu Yannan LiThis volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15–17, 2024. The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Symmetric Key Cryptography, Homomorphic Encryption, Encryption and its Applications, Digital Signatures.
Information Security and Privacy: 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14896)
by Tianqing Zhu Yannan LiThis volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15–17, 2024. The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security.
Information Security and Privacy: 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part III (Lecture Notes in Computer Science #14897)
by Tianqing Zhu Yannan LiThis volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15–17, 2024. The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Blockchain Technology, Privacy Enhancing Technologies, System Security, Network Security, AI Security.
Information Security for Automatic Speaker Identification
by Fathi E. El-SamieThe author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking, speech encryption, steganography, multilevel security systems comprising speaker identification, real transmission of watermarked or encrypted speech signals, and more. The book is especially useful for information security specialist, government security analysts, speech development professionals, and for individuals involved in the study and research of speech recognition at advanced levels.
Information Security in Healthcare: Managing Risk (HIMSS Book Series)
by Terrell W. HerzigInformation Security in Healthcare is an essential guide for implementing a comprehensive information security management program in the modern healthcare environment. Combining the experience and insights of top healthcare IT managers and information security professionals, this book offers detailed coverage of myriad
Information Security in a Connected World: Celebrating the Life and Work of Ed Dawson (Lecture Notes in Computer Science #15600)
by Reihaneh Safavi-Naini Colin Boyd Leonie SimpsonThis Festschrift is a celebration of Ed Dawson's life and impact on research, teaching and leadership. Ed originally trained as a mathematician and first worked as a schoolteacher before joining Queensland Institute (later University) of Technology where he engaged with the emerging world of applied cryptology. He first concentrated on symmetric-key cryptography, analyzing randomness, searching for new building blocks and designing cryptographic engines, he later expanded his interests to public-key cryptography with a particular focus on the implementation aspects of elliptic curves. Ed was made a Fellow of the IACR for his visionary service and for fostering the Asia-Pacific cryptographic community. He cofounded conferences, workshops, courses and communities, first in Australia and then throughout the Pacific Rim. Ed's instincts and experiences were always interdisciplinary and he developed successful networks of researchers and practitioners in mathematics, computer science, engineering, business and law. In recent years he broadened his expertise to incorporate the human, socio-technical, aspects of security. Throughout his career Ed was a noted teacher, mentor and motivator, building and encouraging teams with effort, knowledge, enthusiasm and humor. His successes are reflected in the papers contributed to this volume.
Information Security of Intelligent Vehicles Communication: Overview, Perspectives, Challenges, and Possible Solutions (Studies in Computational Intelligence #978)
by Madhusudan SinghThis book highlights cyber-security overview, perspectives, and challenges that affect advanced Vehicular technology. It considers vehicular security issues and possible solutions, with the aim of providing secure vehicle-to-vehicle, vehicle-to-infrastructure and inside-of-vehicle communication. This book introduces vehicle cryptography mechanism including encryption and decryption approaches and cryptography algorithms such as symmetric and asymmetric cryptography, Hash functions and Digital Signature certificates for modern vehicles. It discusses cybersecurity structure and provides specific security challenges and possible solutions in Vehicular Communication such as vehicle to vehicle communication, vehicle to Infrastructure and in-vehicle communciation. It also presents key insights from security with regards to vehicles collaborative information technology. The more our vehicles become intelligent, the more we need to work on safety and security for vehicle technology. This book is of interest to automotive engineers and technical managers who want to learn about security technologies, and for those with a security background who want to learn about basic security issues in modern automotive applications.
Information Security, Privacy and Digital Forensics: Select Proceedings of the International Conference, ICISPD 2022 (Lecture Notes in Electrical Engineering #1075)
by S. S. Iyengar Sankita J. Patel Bhavesh N. Gohil Naveen Kumar ChaudharyThis volume comprises the select proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2022). The content discusses novel contributions and latest developments in cyber-attacks and defenses, computer forensics and cybersecurity database forensics, cyber threat intelligence, data analytics for security, anonymity, penetration testing, incident response, Internet of Things security, malware and botnets, social media security, humanitarian forensics, software and media piracy, crime analysis, hardware security, among others. This volume will be a useful guide for researchers across industry and academia working in the field of security, privacy, and digital forensics from both technological and social perspectives.
Information Security: 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers (Communications in Computer and Information Science #973)
by Jan Eloff Hein Venter Marianne Loock Marijke Coetzee Mariki EloffThis book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.
Information Security: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (Lecture Notes in Computer Science #10599)
by Phong Q. Nguyen and Jianying ZhouThis book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.
Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings (Lecture Notes in Computer Science #11060)
by Liqun Chen Mark Manulis Steve SchneiderThis book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
Information Security: 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings (Lecture Notes in Computer Science #11723)
by Michalis Polychronakis Zhiqiang Lin Charalampos PapamanthouThis book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. The papers were organized in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; Crypto II: Zero-Knowledge Proofs; Defenses; Web Security; Side Channels; Malware Analysis; Crypto III: Signatures and Authentication.
Information Security: 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings (Lecture Notes in Computer Science #12472)
by Robert H. Deng Yannan Li Willy Susilo Fuchun Guo Rolly IntanThis book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers cover topics of research in theory and applications of information security, such as Security and privacy and Network security as well.
Information Security: 24th International Conference, ISC 2021, Virtual Event, November 10–12, 2021, Proceedings (Lecture Notes in Computer Science #13118)
by Sokratis Katsikas Joseph K. Liu Willy Susilo Weizhi Meng Rolly IntanThis book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security.
Information Security: 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings (Lecture Notes in Computer Science #13640)
by Xiaofeng Chen Willy Susilo Fuchun Guo Rolly Intan Yudi ZhangThis book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.
Information Security: 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings (Lecture Notes in Computer Science #14411)
by Elias Athanasopoulos Bart MenninkThis book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023.The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
Information Security: 27th International Conference, ISC 2024, Arlington, VA, USA, October 23–25, 2024, Proceedings, Part I (Lecture Notes in Computer Science #15257)
by Nicky Mouha Nick NikiforakisThe two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23–25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.
Information Security: 27th International Conference, ISC 2024, Arlington, VA, USA, October 23–25, 2024, Proceedings, Part II (Lecture Notes in Computer Science #15258)
by Nicky Mouha Nick NikiforakisThe two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23–25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.
Information Security: Design, Implementation, Measurement, and Compliance
by Timothy P. LaytonOrganizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.