This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009. The 25 papers presented together with one invited...
详细信息
ISBN:
(数字)9783642023842
ISBN:
(纸本)9783642023835
This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009. The 25 papers presented together with one invited talk were carefully reviewed and selected from 70 submissions. The topics covered are hash functions, block ciphers, asymmetric encryption, digital signatures, asymmetric encryption and anonymity, key agreement protocols, cryptographic protocols, efficient implementations, and implementation attacks.
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and process...
详细信息
ISBN:
(数字)9781484277997
ISBN:
(纸本)9781484277980
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure.;IT security managers, chief information security officers, information security practitioners, and IT auditors will use the book as a reference and support guide to conduct gap analyses and audits of their organizations’ IT security controls implementations.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT 2020, held in Bangalore, India, in December *** 39 full papers presented together with 3 invited ab...
详细信息
ISBN:
(数字)9783030652777
ISBN:
(纸本)9783030652760
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT 2020, held in Bangalore, India, in December *** 39 full papers presented together with 3 invited abstracts in this book were carefully reviewed and selected from 84 submissions. Apart from its traditional focus on areas in applied and theoretical cryptology, this year INDOCRYPT solicited papers in the area of Formal Methods for Cryptographic systems as well and much more.
The 5th International Conference on Information security Practice and Expe- ence (ISPEC 2009) was held in Xi’an, China, April 13–15, 2009. The ISPEC conference series is an established forum that brings together - s...
详细信息
ISBN:
(数字)9783642008436
ISBN:
(纸本)9783642008429
The 5th International Conference on Information security Practice and Expe- ence (ISPEC 2009) was held in Xi’an, China, April 13–15, 2009. The ISPEC conference series is an established forum that brings together - searchers and practitioners to provide a con?uence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors. In previous years, ISPEC has taken place in Sin- pore (2005), Hangzhou, China (2006), Hong Kong, China (2007), and Sydney, Australia (2008). For all sessions, as this one, the conference proceedings were published by Springer in the Lecture Notes in Computer Science series. In total, 147 papers from 26 countries were submitted to ISPEC 2009, and 34 were ?nally selected for inclusion in the proceedings (acceptance rate 23%). The accepted papers cover multiple topics of information security and applied cryptography. Each submission was anonymously reviewed by at least three - viewers. We are grateful to the Program Committee, which was composed of more than 40 well-known security experts from 15 countries; we heartily thank them as well as all external reviewers for their time and valued contributions to the tough and time-consuming reviewing process. Inadditiontothe regularpaperpresentations,the programalsofeaturedfour invited talks by Yupu Hu, from Xidian University, China; Youki Kadobayashi, from Nara Institute of Science and Technology, Japan; Mark Ryan, from the University of Birmingham, UK; and Gene Tsudik, from the University of C- ifornia at Irvine, USA. We are grateful to them for accepting our invitation to speak at the conference.
This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and security (CSS 2012), held in Melbourne, Australia, in December 2012. The 30 revised full papers presented tog...
详细信息
ISBN:
(数字)9783642353628
ISBN:
(纸本)9783642353611
This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and security (CSS 2012), held in Melbourne, Australia, in December 2012.
The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn systems, network and cloud security, wireless security, security protocols and models.
This book constitutes the thoroughly refereed proceedings of the fourth International Conference on Ad Hoc Networks, ADHOCNETS 2012, held in Paris, France, in October 2012. The 18 revised full papers presented were ca...
详细信息
ISBN:
(数字)9783642369582
ISBN:
(纸本)9783642369575
This book constitutes the thoroughly refereed proceedings of the fourth International Conference on Ad Hoc Networks, ADHOCNETS 2012, held in Paris, France, in October 2012. The 18 revised full papers presented were carefully selected and reviewed from 43 submissions. These – and 6 invited papers now cover and even broader scope, referring to many types of autonomous wireless networks designed and deployed for a specific task or function, such as wireless sensor networks, vehicular networks, and home networks. They are organized in topical sections on MAC and PHY layers, localization and position-based protocols in WSNs, resource allocations and cognitive radio, key, service and caching management, network architectures and frameworks, and mobility and disconnection management.
暂无评论