Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5107)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ACISP 2008.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents(34 papers)
Other volumes
-
Information Security and Privacy
About this book
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008.
The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
Bibliographic Information
Book Title: Information Security and Privacy
Book Subtitle: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Editors: Yi Mu, Willy Susilo, Jennifer Seberry
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-540-70500-0
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2008
Softcover ISBN: 978-3-540-69971-2Published: 24 June 2008
eBook ISBN: 978-3-540-70500-0Published: 29 June 2008
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 480
Topics: Cryptology, Management of Computing and Information Systems, Systems and Data Security, Computer Communication Networks, Coding and Information Theory, Algorithm Analysis and Problem Complexity