Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5594)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy
Conference proceedings info: ACISP 2009.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (31 papers)
-
Front Matter
-
Invited Lecture
-
Symmetric Key Encryption
-
Hash Functions
-
Invited Lecture
About this book
Keywords
- AES
- block ciphers
- broadcast encryption
- cluster analysis
- collision resistant
- common scrambling algorithm
- cryptanalysis
- cryptographic attacks
- cryptography
- cryptosystems
- data security
- differential attack
- differential probability
- network security
- privacy
- algorithm analysis and problem complexity
Editors and Affiliations
-
Information Security Institute, Queensland University of Technology, Brisbane, Australia
Colin Boyd
-
Information Security Institute, Queensland Univ. of Technology, Brisbane, Australia
Juan González Nieto
Bibliographic Information
Book Title: Information Security and Privacy
Book Subtitle: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
Editors: Colin Boyd, Juan González Nieto
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-02620-1
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2009
Softcover ISBN: 978-3-642-02619-5Published: 15 June 2009
eBook ISBN: 978-3-642-02620-1Published: 22 June 2009
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XI, 470
Topics: Computer Communication Networks, Data and Information Security, Cryptology, IT Operations, Coding and Information Theory, Algorithms