Limit this search to....

Information Security and Privacy: 13th Australasian Conference, Acisp 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 Edition
Contributor(s): Mu, Yi (Editor), Susilo, Willy (Editor), Seberry, Jennifer (Editor)
ISBN: 3540699716     ISBN-13: 9783540699712
Publisher: Springer
OUR PRICE:   $52.24  
Product Type: Paperback - Other Formats
Published: June 2008
Qty:
Annotation: This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008.

The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.

Additional Information
BISAC Categories:
- Computers | Security - General
- Computers | Security - Networking
- Computers | Information Theory
Dewey: 005.8
Series: Lecture Notes in Computer Science
Physical Information: 1.1" H x 6.1" W x 9.2" (1.60 lbs) 480 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
The 13th Australasian Conference on Information Security and Privacy (ACISP 2008) was held at Wollongong, Australia, during July 7-9, 2008. The conference was sponsored by the Centre for Computer and Information Security of the University of Wollongong and the ResearchNetwork for a Secure Australia. The submission and review process was run using the iChair software, written by Thomas Baigneres and Matthieu Finiasz from EPFL, LASEC, Switzerland. We would like to thank them for letting us use their iChair software. The conferencereceived111submissions, out ofwhich the ProgramComm- tee selected 33 papers for presentation at the conference after a rigorous review process.Thesepapersareincludedintheproceedings.Theacceptedpaperscover a range of topics in information security, including authentication, key m- agement, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security. Theconferenceproceedingscontainrevisedversionsoftheselectedpapers.Since some of them were not checked again for correctness before publication, the - thors bear full responsibility for the contents of their papers. We would like to thank the authors of all papers for submitting their papers to the conference. In addition to the contributed papers, the program comprised three invited talks. The invited speakers were Xavier Boyen (Voltage, USA), Josef Pieprzyk (Macquarie University, Australia) and Nigel Phair (Australian High Tech Crime Centre). We would like to express our thanks to them.