You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book is a select collection of edited papers from the International Conference on Security of Information and Networks (SIN 2007) on the main theme of Information Assurance, Security, and Public Policy. SIN 2007 was hosted by the Eastern Mediterranean University in Gazimagusa, North Cyprus and co-organized by the Istanbul Technical University, Turkey. While SIN 2007 covered all areas of information and network security, the papers included here focused on the following topics: - cryptology: design and analysis of cryptographic algorithms, hardware and software implementations of cryptographic algorithms, and steganography; - network security: authentication, authorization and access con...
This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, held in Singapore in June 2006. Book presents 33 revised full papers, organized in topical sections on intrusion detection and avoidance, cryptographic applications, DoS attacks and countermeasures, key management, cryptanalysis, security of limited devices, cryptography, authentication and Web security, ad-hoc and sensor network security, cryptographic constructions, and security and privacy.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Smart Card Research and Advanced Applications, CARDIS 2018, held in Monpellier, France, in November 2018. The 13 revised full papers presented in this book were carefully reviewed and selected from 28 submissions. CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006. Coverage in the 30 revised full papers includes public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, and mobile security.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009. The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.
This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2005, CT-RSA 2005, held in San Francisco, CA, USA in February 2005. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on cryptanalysis, public key encryption, signature schemes, design principles, password-based protocols, pairings, and efficient and secure implementations.
The 8th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information Security and Cryptology (KIISC) and sponsored by the Ministry of Information and Communication of Korea (MIC).
This book constitutes the refereed proceedings of the 8th International Conference on Information and Communications Security, ICICS 2006, held in Raleigh, NC, USA, December 2006. The 22 revised full papers and 17 revised short papers cover security protocols, applied cryptography, access control, privacy and malicious code, network security, systems security, cryptanalysis, applied cryptography and network security, and security implementations.