Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Post-Quantum Cryptography
  • Language: en
  • Pages: 502

Post-Quantum Cryptography

This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021. The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.

Provable Security
  • Language: en
  • Pages: 246

Provable Security

  • Type: Book
  • -
  • Published: 2007-10-06
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia. The 10 revised full papers presented together with seven short papers were carefully reviewed and selected. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.

Information and Communications Security
  • Language: en
  • Pages: 500

Information and Communications Security

This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997. The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.

Information Security and Privacy
  • Language: en
  • Pages: 598

Information Security and Privacy

  • Type: Book
  • -
  • Published: 2005-07-11
  • -
  • Publisher: Springer

ACISP 2005 was held at Queensland University of Technology in Brisbane, during July 4–6, 2005.

A Novel RFID Based Anti-Counterfeiting Scheme For Retailer Environment- PhD.Thesis
  • Language: en
  • Pages: 130

A Novel RFID Based Anti-Counterfeiting Scheme For Retailer Environment- PhD.Thesis

This Book is published as a submitted PhD Thesis to Deakin university

Information Security Applications
  • Language: en
  • Pages: 409

Information Security Applications

  • Type: Book
  • -
  • Published: 2017-03-29
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016. The 31 revised full papers including two invited talks presented in this volume were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections such as network security, threat analysis, application security, cryptographic. Protocols, cryptanalysis, cryptographic implementations, authentication using bio and ML, authentication, ICT Convergent security

Information Security and Cryptoloy - ICISC 2008
  • Language: en
  • Pages: 444

Information Security and Cryptoloy - ICISC 2008

  • Type: Book
  • -
  • Published: 2009-03-18
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.

Information Security Applications
  • Language: en
  • Pages: 482

Information Security Applications

  • Type: Book
  • -
  • Published: 2005-02-10
  • -
  • Publisher: Springer

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and impleme...

Information Security Applications
  • Language: en
  • Pages: 517

Information Security Applications

This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Information Security Applications, WISA 2003, held on Jeju Island, Korea, in August 2003. The 36 revised full papers were carefully reviewed and selected from 200 submissions. The papers are organized in topical sections on network security, mobile security; intrusion detection; Internet security; secure software, hardware, and systems; e-commerce security; digital rights management; biometrics and human interfaces; public key cryptography and key management; and applied cryptography.

Information Security Applications
  • Language: en
  • Pages: 396

Information Security Applications

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009. The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.