Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5487)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): Inscrypt: International Conference on Information Security and Cryptology
Conference proceedings info: Inscrypt 2008.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (31 papers)
-
Front Matter
-
Digital Signature and Signcryption Schemes
-
Message Authentication Code and Hash Function
-
Hardware Implementation and Side Channel Attack
About this book
Keywords
- Public Key
- Trusted Computing
- anonymity
- code
- cryptography
- data security
- identity
- information
- privacy
- security
- trust
Editors and Affiliations
-
Computer Science Department, Google Inc. and Columbia University, New York, NY, USA
Moti Yung
-
College of Information Sciences and Technology, Pennsylvania State University, University Park, USA
Peng Liu
-
SKLOIS, Institute of Software, Chinese Academy of Sciences, Beijing, China
Dongdai Lin
Bibliographic Information
Book Title: Information Security and Cryptology
Book Subtitle: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers
Editors: Moti Yung, Peng Liu, Dongdai Lin
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-01440-6
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2009
Softcover ISBN: 978-3-642-01439-0Published: 06 April 2009
eBook ISBN: 978-3-642-01440-6Published: 29 April 2009
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 439
Topics: Cryptology, Coding and Information Theory, Data and Information Security, IT Operations, Computers and Society, Computer Communication Networks