Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8544)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ACISP 2014.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
- RSA
- block and stream ciphers
- cryptanalysis and other attacks
- cryptographic applications
- cryptographic protocols
- cryptographic theory
- cryptography
- digital signatures
- formal methods and theory of security
- homomorphic encryption
- information security
- key exchange protocols
- lattices
- mobile security
- security services
- signcryption
Table of contents (32 papers)
-
Cryptanalysis
-
Cryptographic Protocols
-
Cryptanalysis
-
Fine-grain Cryptographic Protocols
Other volumes
-
Information Security and Privacy
Editors and Affiliations
Bibliographic Information
Book Title: Information Security and Privacy
Book Subtitle: 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
Editors: Willy Susilo, Yi Mu
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-08344-5
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2014
Softcover ISBN: 978-3-319-08343-8Published: 14 July 2014
eBook ISBN: 978-3-319-08344-5Published: 05 July 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 464
Number of Illustrations: 61 b/w illustrations
Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems