Editors:
Unique visibility
State-of-the-art research
Fast-track conference proceedings
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6151)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): Inscrypt: International Conference on Information Security and Cryptology
Conference proceedings info: Inscrypt 2009.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (32 papers)
-
Front Matter
-
Signature and Signcryption
Keywords
- access control
- authentication
- control
- cryptoanalysis
- cryptographic protocol
- cryptographic protocols
- cryptography
- cryptology
- digital signature
- digital signatures
- information security
- networks
- security
- security modeling
- trusted computing
- algorithm analysis and problem complexity
Editors and Affiliations
-
Institute for Infocomm Research, Singapore
Feng Bao
-
Google Inc. and Computer Science Department, Columbia University, New York, USA
Moti Yung
-
Institute of Software, SKLOIS, Chinese Academy of Sciences, Beijing, China
Dongdai Lin
-
SKLOIS, Graduate University of Chinese Academy of Sciences, Beijing, China
Jiwu Jing
Bibliographic Information
Book Title: Information Security and Cryptology
Book Subtitle: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers
Editors: Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-16342-5
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2010
Softcover ISBN: 978-3-642-16341-8Published: 16 November 2010
eBook ISBN: 978-3-642-16342-5Published: 18 November 2010
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 460
Number of Illustrations: 75 b/w illustrations
Topics: Computer Communication Networks, Cryptology, IT Operations, Algorithms, Data and Information Security, Computers and Society