Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Information Security and Privacy
  • Language: en
  • Pages: 504

Information Security and Privacy

This book constitutes the refereed proceedings of the 9th Australasian Conference on Information Security and Privacy, ACISP 2004, held in Sydney, Australia in July 2004. The 41 revised full papers presented were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on broadcast encryption and traitor tracing, private information retrieval and oblivious transfer, trust and secret sharing, cryptanalysis, digital signatures, cryptosystems, fast computation, mobile agents security, protocols, security management, and access control and authorization.

Computer Science and its Applications
  • Language: en
  • Pages: 962

Computer Science and its Applications

The 4th FTRA International Conference on Computer Science and its Applications (CSA-12) will be held in Jeju, Korea on November 22~25, 2012. CSA-12 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applications. CSA-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. CSA-12 is the next event in a series of highly successful International Conference on Computer Science and its Applications, previously held as CSA-11 (3rd Edition: Jeju, December, 2011), CSA-09 (2nd Edition: Jeju, December, 2009), and CSA-08 (1st Edition: Australia, October, 2008).

Side Channel Attacks
  • Language: en
  • Pages: 258

Side Channel Attacks

  • Type: Book
  • -
  • Published: 2019
  • -
  • Publisher: Unknown

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

Side Channel Attacks
  • Language: en
  • Pages: 258

Side Channel Attacks

  • Type: Book
  • -
  • Published: 2019-06-12
  • -
  • Publisher: MDPI

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

Information Security and Cryptology - ICISC 2005
  • Language: en
  • Pages: 470

Information Security and Cryptology - ICISC 2005

The 8th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information Security and Cryptology (KIISC) and sponsored by the Ministry of Information and Communication of Korea (MIC).

Progress in Cryptology - INDOCRYPT 2005
  • Language: en
  • Pages: 429

Progress in Cryptology - INDOCRYPT 2005

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology in India, INDOCRYPT 2005, held in Bangalore, India in December 2005. The 31 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on sequences, boolean function and S-box, hash functions, design principles, cryptanalysis, time memory trade-off, new constructions, pairings, signatures, applications, e-cash, and implementations.

ICISC 2003
  • Language: en
  • Pages: 471

ICISC 2003

This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers.

Computational Science and Its Applications - ICCSA 2006
  • Language: en
  • Pages: 1268
Information Security Applications
  • Language: en
  • Pages: 361

Information Security Applications

This book constitutes the revised selected papers from the 23rd International Conference on Information Security Applications, WISA 2022, which took place on Jeju Island, South Korea, during August 2022. The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: network security; cryptography; vulnerability analysis; privacy enhancing technique; security management; security engineering.

Information Security and Cryptology – ICISC 2006
  • Language: en
  • Pages: 369

Information Security and Cryptology – ICISC 2006

  • Type: Book
  • -
  • Published: 2006-11-09
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busan, Korea in November/December 2006. The 26 revised full papers cover such topics as hash functions, block and stream ciphers, network security and access control, mobile communications security, forensics, copyright protection, biometrics, public key cryptosystems, and digital signatures.