The primary goal of this book is to present the basic concepts in computer and networksecurity.Thestartingpointforthebookwasthelecturenotesthatwere used for teaching the undergraduate course on computer security at the U- versity of Wollongong (Australia). Later more topics were added to the book. Thesetopics weremainlytaught topostgraduatestudentsasanadvancedcr- tography course. Some chapters, especially those towards the end of the book, were included to help students in their seminar presentations. The book was recently used as the textbook for a new course, Cryptography and Infor- tion...
The primary goal of this book is to present the basic concepts in computer and networksecurity.Thestartingpointforthebookwasthelecturenotesthatwere us...
This volume contains the proceedings of an international conference on cryptologic research, covering various aspects of communications security, including authentication, cryptanalysis, cryptographic protocols, digital signatures, the design of block ciphers, pseudo-random sequences and more.
This volume contains the proceedings of an international conference on cryptologic research, covering various aspects of communications security, incl...
This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996. The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection,...
This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, A...
This book constitutes the refereed proceedings of the Third International Workshop on Information Security, ISW 2000, held in Wollongong, Australia in December 2000. from 63 submissions. protection, e-commerce, key management, network security and access control, and cryptographic systems.
This book constitutes the refereed proceedings of the Third International Workshop on Information Security, ISW 2000, held in Wollongong, Australia in...
The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3-5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together people working in di?erent areas of computer, communication, and information security from universities, industry, and government institutions. The conferences give the participants the opportunity to discuss the latest developments in the rapidly growing area of information security and privacy....
The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3-5July, 2002. The conference was sponsored by ...
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system....
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer securi...
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong...