Search from the table of contents of 2.5 million books
Advanced Search (Beta)
Home > Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings

Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings


Book Informaton

Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings

Author

Ruilin Li, Bing Sun, Chao Li, Longjiang Qu (auth.), Ron Steinfeld, Philip Hawkes (eds.)

Series

Lecture Notes in Computer Science 6168: Security and Cryptology

Year of Publication

2010

Publisher

Springer-Verlag Berlin Heidelberg

City of Publication

Berlin; New York

Pages

402

Language

en

ISBN

3642140807, 9783642140808

ARI Id

1672508365525


Find on

World Cat

OpenLibrary

Internet Archive


This page has been accessed 3 times.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Citation Options
Download Citation

Showing 1 to 20 of 25 entries
Chapters/HeadingsAuthor(s)PagesInfo
Cryptanalysis of a Generalized Unbalanced Feistel Network Structu
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Syste
On Multidimensional Linear Cryptanalys
Side-Channel Analysis of the K2 Stream Ciph
On Unbiased Linear Approximatio
Distinguishers for the Compression Function and Output Transformation of Hamsi-2
Second-Preimage Analysis of Reduced SHA
Some Observations on Indifferentiabili
Adaptive and Composable Non-committing Encryptio
Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracl
Strong Knowledge Extractors for Public-Key Encryption Schem
A Multi-trapdoor Commitment Scheme from the RSA Assumpti
Identity-Based Chameleon Hash Scheme without Key Exposu
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature K
Security Estimates for Quadratic Field Based Cryptosyste
Solving Generalized Small Inverse Proble
One-Time-Password-Authenticated Key Exchan
Predicate-Based Key Exchan
Attribute-Based Authenticated Key Exchan
Optimally Tight Security Proofs for Hash-Then-Publish Time-Stampi
Chapters/HeadingsAuthor(s)PagesInfo
Showing 1 to 20 of 25 entries