Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5107)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy
Conference proceedings info: ACISP 2008.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (34 papers)
-
Front Matter
About this book
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008.
The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
Keywords
- anonymity
- biometrics
- block ciphers
- classifier
- cryptanalysis
- cryptographic hash function
- cryptographic protocols
- cryptography
- cryptosystems
- data security
- digital signature schemes
- distributed system
- elliptic curve cryptography
- encryption
- faul
- algorithm analysis and problem complexity
Bibliographic Information
Book Title: Information Security and Privacy
Book Subtitle: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Editors: Yi Mu, Willy Susilo, Jennifer Seberry
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-540-70500-0
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2008
Softcover ISBN: 978-3-540-69971-2Published: 24 June 2008
eBook ISBN: 978-3-540-70500-0Published: 29 June 2008
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 480
Topics: Cryptology, IT Operations, Data and Information Security, Computer Communication Networks, Coding and Information Theory, Algorithms