As your bath water drains down the plughole, that slurping sound is the Bath Monster - dirty bath water is his SECOND favourite food. No one wants to find out what his FIRST favourite food is... until Jackson decides he doesn't believe in the Bath Monster any more, and he is never going to have a bath again.
Colin Boyd Livres






Protocols for authentication and key establishment
- 300pages
- 11 heures de lecture
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.
Information security
- 443pages
- 16 heures de lecture
This book constitutes the refereed proceedings of the 6th International Conference on Information Security, ISC 2003, held in Bristol, UK in October 2003. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on network security, public key algorithms, cryptographic protocols, protocol attacks, attacks on public key cryptosystems, block ciphers, authorization, water marking, software security, and codes and related issues.
Advances in cryptology
- 603pages
- 22 heures de lecture
The Asiacrypt series of conferences originated in 1990 with the first Auscrypt conference, and the name was officially adopted in 1991 during the conference in Japan. Since Asiacrypt 2000, it has become one of three annual conferences organized by the International Association for Cryptologic Research (IACR). The conference's success is largely attributed to the Asiacrypt Steering Committee and the IACR Board of Directors. In 2001, 153 papers were submitted, with 33 accepted for inclusion in the proceedings. Each author's contribution, whether accepted or not, was vital to the conference's success. The Program Chair faced the challenging task of sending rejection notifications to many dedicated authors. The review process spanned approximately 10 weeks, beginning with an initial refereeing phase followed by extensive discussions. Special thanks are extended to the Program Committee members who dedicated significant time to provide expert analyses of the submissions. Each paper was reviewed by at least three committee members, and additional reviews were often sought, particularly for submissions from committee members. The process was further supported by numerous external reviewers, whose insights were crucial for informed decision-making.
Information security and privacy
- 423pages
- 15 heures de lecture
This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998. The volume presents 35 revised full papers selected from a total of 66 submissions; also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures.