Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5339)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): CANS: International Conference on Cryptology and Network Security
Conference proceedings info: CANS 2008.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (27 papers)
-
Front Matter
-
Cryptosystems
-
Cryptographic Algorithms and Protocols
-
Stream Ciphers and Block Ciphers
-
Cryptographic Foundations
About this book
Keywords
- AES
- DoS attacks
- ad hoc networks
- anonymity
- authentication
- block ciphers
- cryptanalysis
- cryptographic protocols
- cryptography
- digital signature
- elliptic curve cryptography
- encryption
- group signatures
- network security
- security
- algorithm analysis and problem complexity
Editors and Affiliations
-
Department of Computer Science, University of California, Davis, USA
Matthew K. Franklin
-
Department of Computer Science, The University of Hong Kong, Hong Kong, China
Lucas Chi Kwong Hui
-
Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong
Duncan S. Wong
Bibliographic Information
Book Title: Cryptology and Network Security
Book Subtitle: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings
Editors: Matthew K. Franklin, Lucas Chi Kwong Hui, Duncan S. Wong
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-540-89641-8
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2008
Softcover ISBN: 978-3-540-89640-1Published: 13 November 2008
eBook ISBN: 978-3-540-89641-8Published: 27 November 2008
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 395
Topics: Cryptology, Computer Communication Networks, Data and Information Security, IT Operations, Computers and Society, Algorithms