You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Focuses on Information Assurance, Security and Privacy Services. This book discusses Program Security, Data Security and Authentication, Internet Scourges, Web Security, Usable Security, Human-Centric Aspects, Security, Privacy and Access Control, Economic Aspects of Security, Threat Modeling, Intrusion and Response.
This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Privacy Enhancing Technologies, PET 2002, held in Dresden, Germany in March 2003. The 14 revised full papers presented were carefully selected from 52 submissions during two rounds of reviewing and improvement. Among the topics addressed are mix-networks, generalized mixes, unlinkability, traffic analysis prevention, face recognition, privacy legislation, Web censorship, anonymous networking, personalized Web-based systems, and privacy in enterprises.
This book constitutes the refereed proceedings of the Second International Information Security Workshop, ISW'99, held in Kuala Lumpur, Malaysia in November 1999. The 23 revised full papers presented were carefully reviewed and selected from 38 submissions. The book is divided in topical sections on electronic money; electronic payment and unlinkability; secure software components, mobile agents, and authentication; network security; digital watermarking; protection of software and data; key recovery and electronic voting; and digital signatures.
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special backg...
Financial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on the smallislandofAnguilla,BritishWestIndiestodiscussanddiscovernewadvances in securing electronic ?nancial transactions. The conference, sponsored by the International Financial Cryptography Association, was held on February 20– 24, 2000. The General Chair, Don Beaver, oversaw the local organization and registration. The program committee considered 68 submissions of which 21 papers were accepted. Each submitted paper was reviewed by a minimum of three referees. These proceedings contain revised versions of the 21 accepted papers. Revisions w...
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Financial Cryptography, FC'99, held in Anguilla, British West Indies in February 1999. The 19 revised full papers presented were carefully reviewed for inclusion in the book. The papers are organized in sections on electronic commerce, anonymity control, fraud management, public-key certificates, steganography, content distribution, anonymity mechanisms, auctions and markets, and distributed cryptography.
This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006. The 19 revised full papers and six revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections.
This book constitutes the refereed proceedings of the Third International Workshop on Applied Parallel Computing, PARA'96, held in Lyngby, Denmark, in August 1996. The volume presents revised full versions of 45 carefully selected contributed papers together with 31 invited presentations. The papers address all current aspects of applied parallel computing relevant for industrial computations. The invited papers review the most important numerical algorithms and scientific applications on several types of parallel machines.
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Ano
This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, held in Kamakura, Japan in March 1999. The 25 revised full papers presented were carefully reviewed and selected from a total of 61 submissions. The volume reports most recent research results on all relevant aspects in public key cryptography. Among the topics covered are digital signatures, anonymous finger printing, message authentication, digital payment, key escrow, RSA systems, hash functions, decision oracles, random numbers, finite field computations, pay-per-view-systems, and electronic commerce.