The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic countries - thereby establishing a forum for discussions and co-operation between universities, industry and computer societies.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008.
This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008.
This book constitutes the refereed proceedings of the 8th International Conference on Independent Component Analysis and Signal Separation, ICA 2009, held in Paraty, Brazil, in March 2009.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009.
This book constitutes the thoroughly refereed post-workshop proceedings of the 2008 Pacific Rim Knowledge Acquisition Workshop, PKAW 2008, held in Hanoi, Vietnam, in December 2008 as part of 10th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2008.
This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008.
SSTD 2009 was the 11th in a series of biannual events that discuss new and exciting research in spatio-temporal data management and related technologies.
This volume contains the proceedings of the 13th International Conference on Financial Cryptography and Data Security, held at the Accra Beach Hotel and Resort, Barbados, February 23-26, 2009.
The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2009) took place in Adelaide, South Australia during January 19-21, 2009, at the Australian National Wine Centre, University of Adelaide.
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world.
The present volume contains the proceedings of the 5th International Workshop on Formal Aspects in Security and Trust (FAST 2008), held in Malaga, Spain, October 9-10, 2008.
This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008.
This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS 2008, held in Hong-Kong, China, in December 2008.
This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008.
This book constitutes the refereed proceedings of the 15th International Symposium on String Processing and Information Retrieval, SPIRE 2008, held in Melbourne, Australia, in November 2008.
This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008.
This book constitutes the thoroughly refereed post-workshop proceedings of the Third Workshop on Theory of Quantum Computation, Communication, and Cryptography, TQC 2008, held in Tokyo, Japan, in January/February 2008.
This book constitutes the refereed proceedings of the 12th European Conference on Research and Advanced Technology for Digital Libraries, ECDL 2008, held in Aarhus, Denmark, in September 2008.
This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2008, held in Newcastle upon Tyne, UK, in September 2008.
This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec 2008, held in Shanghai, China, October 30 - November 1, 2008.
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008.
This book constitutes the refereed proceedings of the 5th International Workshop on Visualization for Cyber Security held on September 15, 2008, in Cambridge, Massachusetts, USA, in conjunction with the 11th International Symposium on Recent Advances in Intrusion Detection (RAID).
This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ICICS 2008, held in Birmingham, UK, in October 2008.
This book constitutes the refereed proceedings of the Second Western European Workshop on Research in Cryptology, WEWoRC 2007, held in Bochum, Germany, in July 2007 The 12 revised full papers were carefully reviewed and selected from a total of 36 submissions.
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial Cryptography and Data Security, FC 2008, held in Cozumel, Mexico, in January 2008.
This book constitutes the thoroughly refereed post-conference proceedings of the Second IFIP TC 2 Central and East Conference on Software Engineering Techniques, CEE-SET 2007, held in Poznan, Poland, in October 2007.
This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008.
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008.
This book constitutes the refereed proceedings of the 8th International Algorithmic Number Theory Symposium, ANTS 2008, held in Banff, Canada, in May 2008.