Browse Results

Showing 25,151 through 25,175 of 53,255 results

Information Security and Cryptology -- ICISC 2013

by Hyang-Sook Lee Dong-Guk Han

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.

Information Security and Cryptology - ICISC 2014

by Jooyoung Lee Jongsung Kim

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.

Information Security and Cryptology - ICISC 2015

by Soonhak Kwon Aaram Yun

This book constitutes the thoroughly refereedpost-conference proceedings of the 18th International Conference on InformationSecurity and Cryptology, ICISC 2015, held in Seoul, South Korea, in November2015. The 23 revised full papers presented were carefullyselected from 84 submissions during two rounds of reviewing and improvement. The papers provide the latest results in research, development and applicationsin the field of information security and cryptology. They are grouped aroundthe following topics: digital signatures; public-key cryptography; block ciphercryptanalysis; elliptic curve cryptography; protocols; security; side-channelattacks.

Information Security and Optimization

by Rohit Tanwar Tanupriya Choudhury Mazdak Zamani Sunil Gupta

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.

Information Security and Privacy: 26th Australasian Conference, ACISP 2021, Virtual Event, December 1–3, 2021, Proceedings (Lecture Notes in Computer Science #13083)

by Joonsang Baek Sushmita Ruj

This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021.The 35 full papers presented were carefully revised and selected from 157 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

Information Security and Privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings (Lecture Notes in Computer Science #11547)

by Julian Jang-Jaccard Fuchun Guo

This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019. The 32 revised full papers and 8 short papers presented were carefully revised and selected from 129 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as encryption; post-quantum security; cryptocurrency related; foundations; system and network security; and symmetric cryptography.

Information Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings (Lecture Notes in Computer Science #12248)

by Joseph K. Liu Hui Cui

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic.

Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (Lecture Notes in Computer Science #9722)

by Joseph K. Liu Ron Steinfeld

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random/One-Way Function.

Information Security and Privacy: 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022, Proceedings (Lecture Notes in Computer Science #13494)

by Khoa Nguyen Guomin Yang Fuchun Guo Willy Susilo

This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

Information Security and Privacy

by Josef Pieprzyk Suriadi Suriadi

The4thAustralasianConferenceonInformationSecurityandPrivacywasheld attheUniversityofWollongong, Australia. Theconferencewassponsoredby theCentreforComputerSecurityResearch, UniversityofWollongong, andthe AustralianComputerSociety. Theaimoftheconferencewastobringtogether peopleworkingindi erentareasofcomputer, communication, andinformation securityfromuniversities, industry, andgovernmentinstitutions. Theconference gavetheparticipantsanopportunitytodiscussthelatestdevelopmentsinthe quicklygrowingareaofinformationsecurityandprivacy. Theprogramcommitteeaccepted26papersfrom53submitted. Fromthose accepted, thirteen papers were from Australia, two each from Belgium and China, andoneeachfromAustria, Belarus, France, India, Japan, Korea, Sin- pore, theUSA, andYugoslavia. Conferencesessionscoveredthefollowingtopics: accesscontrolandsecuritymodels, networksecurity, Booleanfunctions, group communication, cryptanalysis, keymanagementsystems, electroniccommerce, signatureschemes, RSAcryptosystems, andoddsandends. We would like to thank the members of the program committee who - nerouslyspenttheirtimereadingandevaluatingthepapers. Wewouldalsolike tothankmembersoftheorganisingcommitteeand, inparticular, ChrisCh- nes, HosseinGhodosi, MarcGysin, Tiang-BingXia, Cheng-XinQu, SanYeow Lee, YejingWang, Hua-XiongWang, Chih-HungLi, WillySusilo, ChintanShah, Je reyHorton, andGhulamRasoolChaudhryfortheircontinuousandtireless e ortinorganisingtheconference. Finally, wewouldliketothanktheauthorsof allthesubmittedpapers, especiallytheacceptedones, andalltheparticipants whomadetheconferenceasuccessfulevent. February1999 JosefPieprzyk ReiSafavi-Naini JenniferSeberry FOURTHAUSTRALASIANCONFERENCE ONINFORMATIONSECURITY ANDPRIVACY ACISP'99 Sponsoredby CenterforComputerSecurityResearch UniversityofWollongong, Australia and AustralianComputerSociety GeneralChair: JenniferSeberry UniversityofWollongong ProgramCo-Chairs: JosefPieprzyk UniversityofWollongong ReiSafavi-Naini UniversityofWollongong ProgramCommittee: ColinBoyd QueenslandUniversityofTechnology, Australia LawrieBrown AustralianDefenceForceAcademy, Australia BillCaelli QueenslandUniversityofTechnology, Australia EdDawson QueenslandUniversityofTechnology, Australia CunshengDing NationalUniversityofSingapore, Singapore DieterGollmann MicrosoftResearch, UK YongfeiHan Gemplus, Singapore ThomasHardjono BayNetworks, US ErlandJonsson ChalmersUniversity, Sweden SveinKnapskog UniversityofTrondheim, Norway KeithMartin KatholiekeUniversiteitLeuven, Belgium CathyMeadows NavalResearchLaboratory, US KaisaNyberg NokiaResearchCenter, Finland Choon-SikPark ElectronicsandTelecommunicationResearchInstitute, Korea DingyiPei AcademiaSinica, China SteveRoberts WithamPtyLtd, Australia ConferenceOrganization VII GregRose Qualcomm, Australia RaviSandhu GeorgeMasonUniversity, US Sta ordTavares Queen'sUniversity, Canada VijayVaradharajan WesternSydneyUniversity, Australia YuliangZheng MonashUniversity, Australia Referees N. Asokan ZhangJiang DingyiPei YunBai ErlandJonsson JosefPieprzyk SimonBlackburn SveinKnapskog VincentRijmen ColinBoyd HuLei SteveRoberts LawrieBrown LeszekMaciaszek GregRose BillCaelli KeithMartin ReiSafavi-Naini EdDawson CathyMeadows RaviSandhu CunshengDing BillMillan RajanShankaran GaryGaskell QiMing Sta ordTavares JanuszGetta Sang-JaeMoon VijayVaradharajan DieterGollmann YiMu Kapaleeswaran MarcGysin KennyNguyen Viswanathan YongfeiHan KaisaNyberg ChuanWu ThomasHardjono Choon-SikPark YuliangZheng. TableofContents BooleanFunctions BooleanFunctionDesignUsingHillClimbingMethods WilliamMillan, AndrewClark, andEdDawson. . . . . . . . . . .

Information Security and Privacy

by Josef Pieprzyk Suriadi Suriadi

The4thAustralasianConferenceonInformationSecurityandPrivacywasheld attheUniversityofWollongong, Australia. Theconferencewassponsoredby theCentreforComputerSecurityResearch, UniversityofWollongong, andthe AustralianComputerSociety. Theaimoftheconferencewastobringtogether peopleworkingindi erentareasofcomputer, communication, andinformation securityfromuniversities, industry, andgovernmentinstitutions. Theconference gavetheparticipantsanopportunitytodiscussthelatestdevelopmentsinthe quicklygrowingareaofinformationsecurityandprivacy. Theprogramcommitteeaccepted26papersfrom53submitted. Fromthose accepted, thirteen papers were from Australia, two each from Belgium and China, andoneeachfromAustria, Belarus, France, India, Japan, Korea, Sin- pore, theUSA, andYugoslavia. Conferencesessionscoveredthefollowingtopics: accesscontrolandsecuritymodels, networksecurity, Booleanfunctions, group communication, cryptanalysis, keymanagementsystems, electroniccommerce, signatureschemes, RSAcryptosystems, andoddsandends. We would like to thank the members of the program committee who - nerouslyspenttheirtimereadingandevaluatingthepapers. Wewouldalsolike tothankmembersoftheorganisingcommitteeand, inparticular, ChrisCh- nes, HosseinGhodosi, MarcGysin, Tiang-BingXia, Cheng-XinQu, SanYeow Lee, YejingWang, Hua-XiongWang, Chih-HungLi, WillySusilo, ChintanShah, Je reyHorton, andGhulamRasoolChaudhryfortheircontinuousandtireless e ortinorganisingtheconference. Finally, wewouldliketothanktheauthorsof allthesubmittedpapers, especiallytheacceptedones, andalltheparticipants whomadetheconferenceasuccessfulevent. February1999 JosefPieprzyk ReiSafavi-Naini JenniferSeberry FOURTHAUSTRALASIANCONFERENCE ONINFORMATIONSECURITY ANDPRIVACY ACISP'99 Sponsoredby CenterforComputerSecurityResearch UniversityofWollongong, Australia and AustralianComputerSociety GeneralChair: JenniferSeberry UniversityofWollongong ProgramCo-Chairs: JosefPieprzyk UniversityofWollongong ReiSafavi-Naini UniversityofWollongong ProgramCommittee: ColinBoyd QueenslandUniversityofTechnology, Australia LawrieBrown AustralianDefenceForceAcademy, Australia BillCaelli QueenslandUniversityofTechnology, Australia EdDawson QueenslandUniversityofTechnology, Australia CunshengDing NationalUniversityofSingapore, Singapore DieterGollmann MicrosoftResearch, UK YongfeiHan Gemplus, Singapore ThomasHardjono BayNetworks, US ErlandJonsson ChalmersUniversity, Sweden SveinKnapskog UniversityofTrondheim, Norway KeithMartin KatholiekeUniversiteitLeuven, Belgium CathyMeadows NavalResearchLaboratory, US KaisaNyberg NokiaResearchCenter, Finland Choon-SikPark ElectronicsandTelecommunicationResearchInstitute, Korea DingyiPei AcademiaSinica, China SteveRoberts WithamPtyLtd, Australia ConferenceOrganization VII GregRose Qualcomm, Australia RaviSandhu GeorgeMasonUniversity, US Sta ordTavares Queen'sUniversity, Canada VijayVaradharajan WesternSydneyUniversity, Australia YuliangZheng MonashUniversity, Australia Referees N. Asokan ZhangJiang DingyiPei YunBai ErlandJonsson JosefPieprzyk SimonBlackburn SveinKnapskog VincentRijmen ColinBoyd HuLei SteveRoberts LawrieBrown LeszekMaciaszek GregRose BillCaelli KeithMartin ReiSafavi-Naini EdDawson CathyMeadows RaviSandhu CunshengDing BillMillan RajanShankaran GaryGaskell QiMing Sta ordTavares JanuszGetta Sang-JaeMoon VijayVaradharajan DieterGollmann YiMu Kapaleeswaran MarcGysin KennyNguyen Viswanathan YongfeiHan KaisaNyberg ChuanWu ThomasHardjono Choon-SikPark YuliangZheng. TableofContents BooleanFunctions BooleanFunctionDesignUsingHillClimbingMethods WilliamMillan, AndrewClark, andEdDawson. . . . . . . . . . .

Information Security and Privacy: 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5–7, 2023, Proceedings (Lecture Notes in Computer Science #13915)

by Leonie Simpson Mir Ali Rezazadeh Baee

This book constitutes the refereed proceedings of the 28th Australasian Conference on Information Security and Privacy, ACISP 2023, held in Brisbane, QLD, Australia, during July 5-7, 2023. The 27 full papers presented were carefully revised and selected from 87 submissions. The papers present and discuss different aspects of symmetric-key cryptography, public-key cryptography, post-quantum cryptography, cryptographic protocols, and system security.

Information Security and Privacy

by Ron Steinfeld Joseph K. Liu

The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research from around the globe on a range of topics. ACISP 2010 was held during July 5-7, 2010, at Macquarie University in Sydney, Australia. There were 97 paper submissions for the conference. These submission were reviewed by the Program Committee and a number of other individuals, whose namescanbefoundoverleaf. TheProgramCommitteethenselected24papersfor presentationatthe conference. Thesepapersarecontainedin theseproceedings. In addition to the peer-reviewedpapers, two invited speakers presented talks at the conference: Craig Gentry (IBM, USA); and Stephan Overbeek (Shear- ter Solutions, Australia). We would like to express our gratitude to Craig and Stephan for contributing their knowledge and insight, and thus expanding the horizons of the conference delegates. We would like to thank the authors of all of submission for o?ering their researchforpublicationinACISP2010. WeextendoursincerethankstotheP- gram Committee and other reviewers for the high-quality reviews and in-depth discussion. The Program Committee made use of the iChair electronic subm- sion and reviewing software written by Thomas Baign eres and Matthieu Finiasz at EPFL, LASEC. We would like to express our thanks to Springer for conti- ing to support the ACISP conference and for help in the conference proceedings production. We also thank the Organizing Committee, led by the ACISP 2010 General Chair Josef Pieprzyk, for their contribution to the conference.

Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings (Lecture Notes in Computer Science #10946)

by Willy Susilo Guomin Yang

This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.

Information Security Applications

by Dooho Choi Sylvain Guilley

This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016. The 31 revised full papers including two invited talks presented in this volume were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections such as network security, threat analysis, application security, cryptographic. Protocols, cryptanalysis, cryptographic implementations, authentication using bio and ML, authentication, ICT Convergent security

Information Security Applications

by Dooho Choi Ho-Won Kim

This book constitutes the thoroughly refereedpost-workshop proceedings of the 16th International Workshop on InformationSecurity Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume werecarefully reviewed and selected from 78 submissions. The papers are organizedin topical sections such as hardware security; cryptography, side channelattacks and countermeasures; security and threat analysis; IoT security;network security; cryptography; application security.

Information Security Applications: 19th International Conference, Wisa 2018, Jeju Island, Korea, August 23-24, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11402)

by Brent ByungHoon Kang JinSoo Jang

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Information Security Applications, WISA 2018, held on Jeju Island, Korea, in August 2018. The 11 revised full papers and 11 short papers presented in this volume were carefully reviewed and selected from 44 submissions. #The primary focus of WISA 2018 was on systems and network security including all other technical and practical aspects of security applications and also on the embedded, unmanned or autonomous systems and cyber physical systems in general.

Information Security Applications: 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers (Lecture Notes in Computer Science #10763)

by Brent ByungHoon Kang Taesoo Kim

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017.The 12 revised full papers and 15 short papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections such as attack and defense; theory in security; web security and emerging technologies; systems security and authentication; crypto protocols; and attack detections and legal aspects.

Information Security Applications: 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers (Lecture Notes in Computer Science #14402)

by Howon Kim Jonghee Youn

This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in Jeju Island, South Korea, during August 23–25, 2023.The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis.

Information Security Applications: 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11–13, 2021, Revised Selected Papers (Lecture Notes in Computer Science #13009)

by Hyoungshick Kim

This book constitutes the revised selected papers from the 22nd International Conference on Information Security Applications, WISA 2021, which took place on Jeju Island, South Korea, during August 2021. The 23 papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: machine learning security; cryptography; hardware security; and application security.

Information Security Applications

by Yongdae Kim Heejo Lee Adrian Perrig

This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.

Information Security Applications

by Kyung-Hyune Rhee Jeong Hyun Yi

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.

Information Security Applications: 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11897)

by Ilsun You

This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions. The primary focus of WISA 2019 was on systems and network security including all other technical and practical aspects of security application in general. The papers are grouped in the following topical sections: Application and Game Security; Network Security and Blockchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues.

Information Security Applications: 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26–28, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12583)

by Ilsun You

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, WISA 2020, held in Jeju Island, South Korea, in August 2020. The 30 full research papers included in this book were carefully reviewed and selected from 89 submissions. They are organized in the following topical sections: AI Security and Intrusion Detection; Steganography and Malware; Application, System, and Hardware Security; Cryptography; Advances in Network Security and Attack Defense; and Cyber Security.

Information Security Applications: 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24–26, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13720)

by Ilsun You Taek-Young Youn

This book constitutes the revised selected papers from the 23rd International Conference on Information Security Applications, WISA 2022, which took place on Jeju Island, South Korea, during August 2022.The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: network security; cryptography; vulnerability analysis; privacy enhancing technique; security management; security engineering.

Refine Search

Showing 25,151 through 25,175 of 53,255 results