Advances in Cryptology — ASIACRYPT’98
Title | Advances in Cryptology — ASIACRYPT’98 PDF eBook |
Author | Kazuo Ohta |
Publisher | Springer |
Pages | 447 |
Release | 2003-06-29 |
Genre | Computers |
ISBN | 3540496491 |
ASIACRYPT’98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22. This is the fourth of the Asiacrypt conferences. ASIACRYPT’98 is sponsored by the State Key Laboratory of Information Security (SKLOIS), University of Science and Technology of China (USTC), and the Asiacrypt Steering Committee (ASC), in cooperation with the International Association for Cryptology Research (IACR). The 16-member Program Committee organized the scientific program and considered 118 submissions. Of these, 32 were accepted for presentation. The authors’ affiliations of the 118 submissions and the 32 accepted papers range over 18 and 13 countries or regions, respectively. The submitted version of each paper was sent to all members of the Program Committee and was extensively examined by at least three committee members and/or outside experts. The review process was rigorously blinded and the anonymity of each submission are maintained until the selection was completed. We followed the traditional policy that each member of the Program Committee could be an author of at most one accepted paper. These proceedings contain the revised versions of the 32 contributed talks as well as a short note written by one invited speaker. Comments from the Program Committee were taken into account in the revisions. However, the authors (not the committee) bear full responsibility for the contents of their papers.
Advances in Cryptology - ASIACRYPT'99
Title | Advances in Cryptology - ASIACRYPT'99 PDF eBook |
Author | Kwok Yan Lam |
Publisher | Springer |
Pages | 426 |
Release | 2004-03-23 |
Genre | Computers |
ISBN | 3540480005 |
Asiacrypt’99 was held in Singapore on 14-18 November 1999. Asiacrypt is one of the major events in the cryptology research community. Asiacrypt’99, the ?fth annual Asiacrypt conference, was sponsored by the Asiacrypt Steering Comm- tee and the Centre for Systems Security of the National University of Singapore, and in cooperation with the International Association for Cryptology Research. As the Program Co-Chairs of Asiacrypt’99, we are extremely honored to or- nize this event, which showcases the state-of-the-art development of cryptology research at the conclusion of this millennium. This year, a total of 96 research papers were submitted to Asiacrypt’99. The portfolio of country of origin of submissions serves as a good indicator of the - ternational reputation of the conference. Countries from which submissions or- inated include: Australia, Belgium, China, Estonia, France, Germany, Greece, India, Iran, Japan, Korea, Norway, Russia, Saudi Arabia, Switzerland, Sin- pore, Spain, Taiwan, Thailand, The Netherlands, Turkey, Ukraine, UK, USA and Yugoslavia. Through a stringent refereeing process by the Program C- mittee, 31 papers of outstanding quality were accepted and are included in the conference proceedings. Accepted papers were authored by researchers from the following countries: Australia, Belgium, France, Germany, India, Japan, China, Singapore, Switzerland, Taiwan, The Netherlands, UK, and USA.
Advances in Cryptology – ASIACRYPT 2005
Title | Advances in Cryptology – ASIACRYPT 2005 PDF eBook |
Author | Bimal Kumar Roy |
Publisher | Springer |
Pages | 715 |
Release | 2005-11-16 |
Genre | Computers |
ISBN | 3540322671 |
This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2005, held in Chennai, India in December 2005.The 37 revised full papers presented were carefully reviewed and selected from 237 submissions. The papers are organized in topical sections on algebra and number theory, multiparty computation, zero knowledge and secret sharing, information and quantum theory, privacy and anonymity, cryptanalytic techniques, stream cipher cryptanalysis, block ciphers and hash functions, bilinear maps, key agreement, provable security, and digital signatures.
Progress in Cryptology -- INDOCRYPT 2003
Title | Progress in Cryptology -- INDOCRYPT 2003 PDF eBook |
Author | Thomas Johansson |
Publisher | Springer |
Pages | 442 |
Release | 2003-12-16 |
Genre | Computers |
ISBN | 3540245820 |
This book constitutes the refereed proceedings of the 4th International Conference on Cryptology in India, INDOCRYPT 2003, held in New Delhi, India in December 2003. The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on stream ciphers, block ciphers, Boolean functions, secret sharing, bilinear pairings, public key cryptography, signature schemes, protocols, elliptic curve cryptography and algebraic geometry, implementation and digital watermarking, and authentication.
Public Key Cryptography
Title | Public Key Cryptography PDF eBook |
Author | Kwangjo Kim |
Publisher | Springer |
Pages | 428 |
Release | 2003-06-29 |
Genre | Computers |
ISBN | 3540445862 |
This book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, held in Cheju Island, Korea in February 2001. The 30 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers address all current issues in public key cryptography, ranging from mathematical foundations to implementation issues.
Information Security and Privacy
Title | Information Security and Privacy PDF eBook |
Author | Ed Dawson |
Publisher | Springer |
Pages | 501 |
Release | 2006-12-30 |
Genre | Computers |
ISBN | 3540450300 |
This book constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000. The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on network security, public key cryptography, cryptographic implementation issues, electronic commerce, key recovery, public key infrastructure, Boolean functions, intrusion detection, codes, digital signatures, secret sharing, and protocols.
Application of Petri Nets to Communication Networks
Title | Application of Petri Nets to Communication Networks PDF eBook |
Author | Jonathan Billington |
Publisher | Springer Science & Business Media |
Pages | 330 |
Release | 1999-04-21 |
Genre | Computers |
ISBN | 9783540658702 |
Petri nets offer a mathematically defined technique for the specification, design, analysis, verification and performance evaluation of concurrent distributed systems. Communications networks, ranging from traditional telecommunication systems to advanced Internet-based information services, are inherently distributed and comprise systems with concurrently operating components. This volume presents a selection of the latest advances in the use of Petri nets for the modeling, analysis and management of communication networks and systems in the broadest sense of these terms.