Login | Sign Up | Settings | Wish List

 



Searching ...
0 %

Books by Reihaneh Safavi-Naini






Digital Rights Management
Technologies, Issues, Challenges and Systems (Lecture Notes in Computer Science / Security and Cryptology)
by Reihaneh Safavi-Naini, Moti Yung, Moti Young
Paperback, 360 Pages, Published 2006 by Springer
ISBN-13: 978-3-540-35998-2, ISBN: 3-540-35998-2

"This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, DRMTICS 2005, held in Sydney, Australia, in October/November 2005. Presents 26 carefully reviewed full papers organized in topical sections on assurance and authentication issues, legal and related issues, expressing rights and management, watermarking, software is ..."






Information Security and Privacy
11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (Lecture Notes in Computer Science / Security and Cryptology)
by Lynn Batten, Reihaneh Safavi-Naini, Lynn Margaret Batten, Reihanah Safavi-Naini
Paperback, 446 Pages, Published 2006 by Springer
ISBN-13: 978-3-540-35458-1, ISBN: 3-540-35458-1

"This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical sections on stream ciphers, symmetric key ciphers, network security, cryptographic applications, secure implementation, signatures, theory, security applica ..."






Financial Cryptography and Data Security(2014th Edition)
18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ... Computer Science / Security and Cryptology)
by Nicolas Christin, Reihaneh Safavi-Naini
Paperback, 506 Pages, Published 2015 by Springer
ISBN-13: 978-3-662-45471-8, ISBN: 3-662-45471-8

"This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014.The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, cas ..."






Information Theoretic Security
Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings (Lecture Notes in Computer Science / Security and Cryptology)
by Reihaneh Safavi-Naini
Paperback, 249 Pages, Published 2008 by Springer
ISBN-13: 978-3-540-85092-2, ISBN: 3-540-85092-9

"This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008. The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions. There were nine invited speeches to the conference. The topics covered are secure and reliable communication; quantum information and communication; networks and devices; multiparty computat ..."






Advances in Cryptology -- CRYPTO 2012
32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology)
by Reihaneh Safavi-Naini, Ran Canetti
Paperback, 904 Pages, Published 2012 by Springer
ISBN-13: 978-3-642-32008-8, ISBN: 3-642-32008-2

"This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functi ..."






Applied Cryptography and Network Security
11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings (Lecture Notes in Computer Science / Security and Cryptology)
by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
Paperback, 588 Pages, Published 2013 by Springer
ISBN-13: 978-3-642-38979-5, ISBN: 3-642-38979-1

"This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; ..."






Information Hiding
12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology)
by Rainer Böhme, Reihaneh Safavi-Naini
Paperback, 277 Pages, Published 2010 by Springer
ISBN-13: 978-3-642-16434-7, ISBN: 3-642-16434-X

"IH 2010 was the 12th Information Hiding Conference, held in Calgary, Canada, June 28 30, 2010. This series of conferences started with the First Workshop on Information Hiding, held in Cambridge, UK in May 1996. Since then, the conference locations have alternated between Europe and North America. The conference has been held annually since 2005. For many years, information hiding has captured the imagination of - searchers. This confer ..."






Lecture Notes in Computer Science
Advances in Cryptology -- CRYPTO 2012 : 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings 7417
by Reihaneh Safavi-Naini, Ran Canetti
888 Pages, Published 2012 by Springer
ISBN-13: 978-3-642-32009-5, ISBN: 3-642-32009-0

"32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings Reihaneh Safavi-Naini, Ran Canetti. Acknowledgments. The second author was supported by the Swedish Foundation for Strategic Research (SSF) ... Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, v ..."






Lecture Notes in Computer Science
Information Hiding : 12Th International Conference, Ih 2010, Calgary, Ab, Canada, June 28-30, 2010: Revised Selected Papers 6387
by Rainer Böhme, Reihaneh Safavi-Naini, David Hutchison
277 Pages, Published 2010 by Springer
ISBN-13: 978-3-642-16435-4, ISBN: 3-642-16435-8

"235 Dong Zhang, Jiangqun Ni, Qiping Zeng, Dah-Jye Lee, and Jiwu Huang Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework................................. Jian Cao and Jiwu Huang A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness .................................. Jian Cao, Jiwu Huang, and Jiangqun Ni Author Index .................................. ..."






Lecture Notes in Computer Science Ser.
Information Theoretic Security : Third International Conference, Icits 2008, Calgary, Canada, August 10-13, 2008. Proceedings 5155
by Reihaneh Safavi-Naini, David Hutchison
249 Pages, Published 2008 by Springer
ISBN-13: 978-3-540-85093-9, ISBN: 3-540-85093-7

"ACM Press, New York (2003) Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Atluri, V. (ed.) CCS 2002, pp. ... In: Setia, S., Swarup ... ACM Press, New York (2005) Lee, J., Stinson, D.R.: A Combinatorial Approach to Key Predistribution for Distributed Sensor Networks. In: IEEE ..."






Financial Cryptography and Data Security
18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
by Nicolas Christin, Reihaneh Safavi-Naini
506 Pages, Published 2014 by Springer
ISBN-13: 978-3-662-45472-5, ISBN: 3-662-45472-6

"... Gerardo Peters, Christiane Pointcheval, David Pu, Yu Radczewski, Raimo Reyhanitabar, Reza Romanosky, Sasha Samari, Katerina Samelin, Kai Schellekens, Dries Schroepfer, Axel Shokri, Reza Simkin, Mark Su, Le Sušil, Petr Tanaka, Yu Tang, Qiang Teruya, Tadanori Tews, Erik Tselekounis, Yiannis Vercauteren, Frederik Visconti, Ivan Wachsmann, Christian Wang, Na Wenzel, Jakob Xu, Jia Yang, Yanjiang Zacharias, Thomas Zhang, Bingsheng Zh ..."






Lecture Notes in Computer Science
Applied Cryptography and Network Security : 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings 7954
by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
572 Pages, Published 2013 by Springer
ISBN-13: 978-3-642-38980-1, ISBN: 3-642-38980-5

"11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini. X 9 0 X 9 1 X 9 2 X 9 3 b a c k w o r d c h u n k forwordchun k X 2 0 X 2 1 X 2 2 X 2 3 k 4 PS k 5 PS X 3 0 X 3 1 X 3 2 X 3 3 k 6 PS k 7 PS X 4 0 X 4 1 X 4 2 X 4 3 k 8 PS k 9 PS X 5 0 X 5 1 X 5 2 X 5 3 k 10 PS k 11 PS X 6 0 X 6 1 X 6 2 X 6 3 k 12 PS k 13 PS X 7 0 X 7 1 ..."






Lecture Notes in Computer Science Ser.
Information Security and Privacy : 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006Proceedings 4058
by Lynn Batten, Reihaneh Safavi-Naini
446 Pages, Published 2006 by Springer
ISBN-13: 978-3-540-35459-8, ISBN: 3-540-35459-X

"Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. However, the digital signature enabled approach is too costly for MANET due to the computation overheads. In addition, due to the diversity of different routing protocols, a universal scheme that suits all MANET routing systems does not exist in the literature. Specifically, an authentication scheme for the AODV rout ..."






Digital Rights Management
Technologies, Issues, Challenges and Systems
by Reihaneh Safavi-Naini, Moti Young, Moti Yung
360 Pages, Published 2006 by Springer
ISBN-13: 978-3-540-35999-9, ISBN: 3-540-35999-0

"Finally, we note that the given scheme provides us with a series of difficult to remove unique identifications integrally embedded into the transformed programs that could be used for software watermarking purposes. Keywords: Software Obfuscation, Software Copy Protection, Software Watermarking. 1 Introduction Intellectual Property Protection (IPP) related to software distribution and production is a longstanding problem. Early wor ..."






Digital Rights Management
by Reihaneh Safavi-Naini
Paperback
ISBN-13: 978-3-540-82636-1, ISBN: 3-540-82636-X






Information Theoretic Security
by Reihaneh Safavi-Naini
Paperback
ISBN-13: 978-3-540-87319-8, ISBN: 3-540-87319-8






Selected Areas in Cryptography
16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology)
by Michael Jacobson Jr, Vincent Rijmen, Reihaneh Safavi-Naini, Elena Andreeva, Rei Safavi-Naini, Michael J. Jacobson
Paperback, 467 Pages, Published 2009 by Springer
ISBN-13: 978-3-642-05443-3, ISBN: 3-642-05443-9

"The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary,in Calgary, Alberta, Canada, during August 13-14, 2009. There were 74 participants from 19 countries. Previous workshops in this series were held at Queens University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of - terloo (2000 and 2004), Fi ..."

All Authors

Reihaneh Safavi-Naini

Michael Jacobson

Moti Young

Lynn Batten

Moti Yung

Nicolas Christin

Ran Canetti

Rainer Böhme

Michael Locasto

Payman Mohassel


All Bindings

Paperback

Unknown


All Years

2015

2014

2013

2012

2010

2009

2008

2006