Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5107)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy
Conference proceedings info: ACISP 2008.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (34 papers)
-
Front Matter
About this book
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008.
The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
Keywords
Bibliographic Information
Book Title: Information Security and Privacy
Book Subtitle: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Editors: Yi Mu, Willy Susilo, Jennifer Seberry
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-540-70500-0
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2008
Softcover ISBN: 978-3-540-69971-2Published: 24 June 2008
eBook ISBN: 978-3-540-70500-0Published: 29 June 2008
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 480
Topics: Cryptology, Management of Computing and Information Systems, Systems and Data Security, Computer Communication Networks, Coding and Information Theory, Algorithm Analysis and Problem Complexity