Digital Rights Management Technologies, Issues, Challenges and Systems (Lecture Notes in Computer Science / Security and Cryptology) by ReihanehSafavi-Naini, Moti Yung, Moti Young Paperback, 360 Pages, Published 2006 by Springer ISBN-13: 978-3-540-35998-2, ISBN: 3-540-35998-2
"This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems, DRMTICS 2005, held in Sydney, Australia, in October/November 2005. Presents 26 carefully reviewed full papers organized in topical sections on assurance and authentication issues, legal and related issues, expressing rights and management, watermarking, software is ..."
"This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical sections on stream ciphers, symmetric key ciphers, network security, cryptographic applications, secure implementation, signatures, theory, security applica ..."
Financial Cryptography and Data Security(2014th Edition) 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ... Computer Science / Security and Cryptology) by Nicolas Christin, ReihanehSafavi-Naini Paperback, 506 Pages, Published 2015 by Springer ISBN-13: 978-3-662-45471-8, ISBN: 3-662-45471-8
"This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014.The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, cas ..."
Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) by ReihanehSafavi-Naini Paperback, 249 Pages, Published 2008 by Springer ISBN-13: 978-3-540-85092-2, ISBN: 3-540-85092-9
"This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008. The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions. There were nine invited speeches to the conference. The topics covered are secure and reliable communication; quantum information and communication; networks and devices; multiparty computat ..."
Advances in Cryptology -- CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) by ReihanehSafavi-Naini, Ran Canetti Paperback, 904 Pages, Published 2012 by Springer ISBN-13: 978-3-642-32008-8, ISBN: 3-642-32008-2
"This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functi ..."
"This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; ..."
Information Hiding 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) by Rainer Böhme, ReihanehSafavi-Naini Paperback, 277 Pages, Published 2010 by Springer ISBN-13: 978-3-642-16434-7, ISBN: 3-642-16434-X
"IH 2010 was the 12th Information Hiding Conference, held in Calgary, Canada, June 28 30, 2010. This series of conferences started with the First Workshop on Information Hiding, held in Cambridge, UK in May 1996. Since then, the conference locations have alternated between Europe and North America. The conference has been held annually since 2005. For many years, information hiding has captured the imagination of - searchers. This confer ..."
Lecture Notes in Computer Science Advances in Cryptology -- CRYPTO 2012 : 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings 7417 by ReihanehSafavi-Naini, Ran Canetti 888 Pages, Published 2012 by Springer ISBN-13: 978-3-642-32009-5, ISBN: 3-642-32009-0
"32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23,
2012, Proceedings Reihaneh Safavi-Naini, Ran Canetti. Acknowledgments. The
second author was supported by the Swedish Foundation for Strategic Research
(SSF) ... Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B.,
Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In:
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, v ..."
"235 Dong Zhang, Jiangqun Ni, Qiping Zeng, Dah-Jye Lee, and Jiwu Huang
Provably Secure Spread-Spectrum Watermarking Schemes in the Known
Message Attack Framework................................. Jian Cao and Jiwu Huang A New
Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between
Security and Robustness .................................. Jian Cao, Jiwu Huang, and
Jiangqun Ni Author Index .................................. ..."
Lecture Notes in Computer Science Ser. Information Theoretic Security : Third International Conference, Icits 2008, Calgary, Canada, August 10-13, 2008. Proceedings 5155 by ReihanehSafavi-Naini, David Hutchison 249 Pages, Published 2008 by Springer ISBN-13: 978-3-540-85093-9, ISBN: 3-540-85093-7
"ACM Press, New York (2003) Eschenauer, L., Gligor, V.D.: A Key-Management
Scheme for Distributed Sensor Networks. In: Atluri, V. (ed.) CCS 2002, pp. ... In:
Setia, S., Swarup ... ACM Press, New York (2005) Lee, J., Stinson, D.R.: A
Combinatorial Approach to Key Predistribution for Distributed Sensor Networks.
In: IEEE ..."
"... Gerardo Peters, Christiane Pointcheval, David Pu, Yu Radczewski, Raimo
Reyhanitabar, Reza Romanosky, Sasha Samari, Katerina Samelin, Kai
Schellekens, Dries Schroepfer, Axel Shokri, Reza Simkin, Mark Su, Le Sušil, Petr
Tanaka, Yu Tang, Qiang Teruya, Tadanori Tews, Erik Tselekounis, Yiannis
Vercauteren, Frederik Visconti, Ivan Wachsmann, Christian Wang, Na Wenzel,
Jakob Xu, Jia Yang, Yanjiang Zacharias, Thomas Zhang, Bingsheng Zh ..."
"11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28,
2013. Proceedings Michael Jacobson, Michael Locasto, Payman Mohassel,
Reihaneh Safavi-Naini. X 9 0 X 9 1 X 9 2 X 9 3 b a c k w o r d c h u n k
forwordchun k X 2 0 X 2 1 X 2 2 X 2 3 k 4 PS k 5 PS X 3 0 X 3 1 X 3 2 X 3 3 k 6 PS
k 7 PS X 4 0 X 4 1 X 4 2 X 4 3 k 8 PS k 9 PS X 5 0 X 5 1 X 5 2 X 5 3 k 10 PS k 11
PS X 6 0 X 6 1 X 6 2 X 6 3 k 12 PS k 13 PS X 7 0 X 7 1 ..."
Lecture Notes in Computer Science Ser. Information Security and Privacy : 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006Proceedings 4058 by Lynn Batten, ReihanehSafavi-Naini 446 Pages, Published 2006 by Springer ISBN-13: 978-3-540-35459-8, ISBN: 3-540-35459-X
"Efficient authentication is one of important security requirements in mobile ad hoc
network (MANET) routing systems. However, the digital signature enabled
approach is too costly for MANET due to the computation overheads. In addition,
due to the diversity of different routing protocols, a universal scheme that suits all
MANET routing systems does not exist in the literature. Specifically, an
authentication scheme for the AODV rout ..."
"Finally, we note that the given scheme provides us with a series of difficult to
remove unique identifications integrally embedded into the transformed
programs that could be used for software watermarking purposes. Keywords:
Software Obfuscation, Software Copy Protection, Software Watermarking. 1
Introduction Intellectual Property Protection (IPP) related to software distribution
and production is a longstanding problem. Early wor ..."
"The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary,in Calgary, Alberta, Canada, during August 13-14, 2009. There were 74 participants from 19 countries. Previous workshops in this series were held at Queens University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of - terloo (2000 and 2004), Fi ..."