Wonder Club world wonders pyramid logo
×

Information Security and Privacy Book

Information Security and Privacy
Information Security and Privacy, This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical, Information Security and Privacy has a rating of 3 stars
   2 Ratings
X
Information Security and Privacy, This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical, Information Security and Privacy
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $123.84
Original Magazine
Physical Format

Sold Out

  • Information Security and Privacy
  • Written by author Lynn Batten
  • Published by Springer-Verlag New York, LLC, February 2008
  • This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical
  • This book constitutes the refereed proceedings of the 7th Australasian Conference on Information Security and Privacy, ACISP 2002, held in Melbourne, Australia, in July 2002.The 36 revised full papers presented together with one invited paper were car
Buy Digital  USD$123.84

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Algebraic attacks on clock-controlled stream ciphers1
Cache based power analysis attacks on AES17
Distinguishing attack on SOBER-128 with linear masking29
Evaluating the resistance of stream ciphers with linear feedback against fast algebraic attacks40
Ensuring fast implementations of symmetric ciphers on the Intel Pentium 4 and beyond52
Improved cryptanalysis of MAG64
On exact algebraic [non-]immunity of S-boxes based on power functions76
Augmented certificate revocation lists87
Online/offline signatures and multisignatures for AODV and DSR routing security99
Towards an invisible honeypot monitoring system111
Adaptively secure traitor tracing against key exposure and its application to anywhere TV service123
Fingercasting - joint fingerprinting and decryption of broadcast messages136
More on stand-alone and setup-free verifiably committed signatures148
API monitoring system for defeating worms and exploits in MS-Windows system159
Hiding circuit topology from unbounded reverse engineers171
The role of the self-defending object concept in developing distributed security-aware applications183
Efficient and provably secure multi-receiver identity-based signcryption195
Efficient identity-based signatures secure in the standard model207
Event-oriented k-times revocable-iff-linked group signatures223
Key replacement attack against a generic construction of certificateless signature235
A novel range test247
Efficient primitives from exponentiation in Z[subscript p]259
PA in the two-key setting and a generic conversion for encryption with anonymity271
Statistical decoding revisited283
Towards provable security for ubiquitous applications295
Oblivious scalar-product protocols313
On optimizing the k-ward micro-aggregation technique for secure statistical databases324
Direct chosen-ciphertext secure identity-based key encapsulation without random Oracles336
Generic transforms to acquire CCA-security for identity based encryption : the cases of FOpkc and REACT348
Tag-KEM from set partial domain one-way permutations360
An extension to Bellare and Rogaway (1993) model : resetting compromised long-term keys371
Graphical representation of authorization policies for weighted credentials383
Secure cross-realm C2C-PAKE protocol395
Constructing secure hash functions by enhancing Merkle-Damgard construction407
Forgery and key recovery attacks on PMAC and Mitchell's TMAC variant421
Side channel attacks against HMACs based on block-cipher based hash functions432


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Information Security and Privacy, This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical, Information Security and Privacy

X
WonderClub Home

This item is in your Collection

Information Security and Privacy, This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical, Information Security and Privacy

Information Security and Privacy

X
WonderClub Home

This Item is in Your Inventory

Information Security and Privacy, This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical, Information Security and Privacy

Information Security and Privacy

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: