Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

Buy

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included the Cryptographers’ Track (called the CT-RSA), which enables the forefront of cryptographic research to be presented within the formal program of the conference. CT-RSA has become a major publication venue for cryptographers worldwide.

This year the RSA conference was held in San Francisco, California, during February 14–18, 2011. The CT-RSA conference servers were running in the University of Athens, Greece, and we received 82 submissions out of which 3 were withdrawn. Every paper was reviewed by at least three committee members. The Program Committee members were also allowed to submit up to one paper for inclusion in the program. Such paperswere reviewed by at least five committeemembers.

The reviewing of the submissions proceeded in two stages: in the first stage papers were read individually by committee members without knowledge of other committeemembers’ opinions. In the second stage, all reviews weremade available to committeemembers and discussion through aWeb bulletin board ensued. After a total of seven weeks the committee work concluded and a selection of 24 papers wasmade for inclusion in the conference program. In a small number of cases a final round of reviewing took place as some of the papers were accepted conditionally on specific changes that were requested by the ProgramCommittee. The final revised versions of the accepted papers is what you will find in this volume.

We were very pleased this year to have three keynote talks included in the CTRSA program. Dan Boneh from Stanford University gave a talk on computing with signed data. Dickie George of the Information Assurance Directorate at NSA spoke on NSA’s role in the development of DES. Adi Shamir from the Weizmann Institute of Science gave a talk on the role of academia and industry in the design and analysis of DES. The talk also featured a mini-talk by Martin Hellman on that subject.

A number of people played key roles in the success of the conference this year. First and foremost I would like to thank the authors of all submitted papers; without their contributions the conference would not have been possible. Second, a special thanks is due to the members of the Program Committee and the subreviewers that invested a lot of their time in carefully reading the submitted papers and contributing to the discussion of each paper. The submission and review process was supported by the Web submission software written by Shai Halevi. I would also like to thank Bree LaBollita and Amy Szymanski, who worked very hard to properly organize the conference this year.

(HTML tags aren't allowed.)

The Ruby Way, Second Edition: Solutions and Techniques in Ruby Programming (2nd Edition)
The Ruby Way, Second Edition: Solutions and Techniques in Ruby Programming (2nd Edition)
Ruby is an agile object-oriented language, borrowing some of the best features from LISP, Smalltalk, Perl, CLU, and other languages. Its popularity has grown tremendously in the five years since the first edition of this book.

 

The Ruby Way takes a “how-to” approach to Ruby...

Making Games with Python & Pygame
Making Games with Python & Pygame

Making Games with Python & Pygame is a programming book that covers the Pygame game library for the Python programming language. Each chapter gives you the complete source code for a new game and teaches the programming concepts from these examples. The book is available under a Creative Commons license and can be downloaded in full for...

SUSE Linux 10.0 Unleashed
SUSE Linux 10.0 Unleashed

Master the newest version of SUSE Linux with SUSE Linux 10 Unleashed. This comprehensive guide to SUSE Linux includes a DVD with the full version of SUSE Linux 10.0 and provides you with intermediate and advanced information to guide you through the installation, management and maintenance of...


Cardiovascular OCT Imaging
Cardiovascular OCT Imaging

This heavily revised second edition comprehensively reviews the use of optical coherence tomography (OCT) in cardiovascular practice. It provides detailed guidance on how to properly interpret OCT images and successfully utilise it in daily clinical practice  Chapters cover the development and physics associated with OCT,...

Photoshop CS4 for Nature Photographers: A Workshop in a Book
Photoshop CS4 for Nature Photographers: A Workshop in a Book

Using field-tested methods and practical instruction in both Photoshop and Photoshop Elements, this book reveals eye-opening techniques, terrific workflow ideas, and timesaving ways to apply a broad array of Photoshop tools to optimize digital images of nature. You’ll encounter spectacular photographs from exotic places around the world...

iOS Forensic Analysis: for iPhone, iPad, and iPod touch (Books for Professionals by Professionals)
iOS Forensic Analysis: for iPhone, iPad, and iPod touch (Books for Professionals by Professionals)

iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS information and data sets that are new and evolving, this book gives the examiner and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy