ASIACRYPT 2009,the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo,Japan,during December 6-10, 2009. The conference was sponsored by the International - sociation for Cryptologic Research (IACR) in cooperation with the Technical Group on Information Security (ISEC) of the Institute of Electronics, Infor- tion and Communication Engineers (IEICE). ASIACRYPT 2009 was chaired by Eiji Okamoto and I had the honor of serving as the Program Chair. The conference received 300 submissions from which two papers were wi- drawn.Eachpaperwasassignedatleastthreereviewers,andpapersco-authored by ProgramCommittee members wereassigned at least ?ve reviewers.We spent eightweeksforthereviewprocess,whichconsistedoftwostages.Inthe?rstfo- week stage, each Program Committee member individually read and evaluated assigned papers (individual review phase), and in the second four-week stage, the papers werescrutinized with an extensive discussion(discussion phase). The review reports and discussion comments reached a total of 50,000 lines. Finally,theProgramCommitteedecidedtoaccepted42submissions,ofwhich two submissions were merged into one paper. As a result, 41 presentations were given at the conference. The authors of the accepted papers had four weeks to prepare ?nal versions for these proceedings. These revised papers were not s- ject to editorialreviewandthe authorsbear full responsibility fortheir contents. Unfortunately there were a number of good papers that could not be included in the program due to this year's tough competition.
ASIACRYPT 2009,the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo,Japan,during December 6-10, 2009. The conference was sponsored by the International - sociation for Cryptologic Research (IACR) in cooperation with the Technical Group on Information Security (ISEC) of the Institute of Electronics, Infor- tion and Communication Engineers (IEICE). ASIACRYPT 2009 was chaired by Eiji Okamoto and I had the honor of serving as the Program Chair. The conference received 300 submissions from which two papers were wi- drawn.Eachpaperwasassignedatleastthreereviewers,andpapersco-authored by ProgramCommittee members wereassigned at least ?ve reviewers.We spent eightweeksforthereviewprocess,whichconsistedoftwostages.Inthe?rstfo- week stage, each Program Committee member individually read and evaluated assigned papers (individual review phase), and in the second four-week stage, the papers werescrutinized with an extensive discussion(discussion phase). The review reports and discussion comments reached a total of 50,000 lines. Finally,theProgramCommitteedecidedtoaccepted42submissions,ofwhich two submissions were merged into one paper. As a result, 41 presentations were given at the conference. The authors of the accepted papers had four weeks to prepare ?nal versions for these proceedings. These revised papers were not s- ject to editorialreviewandthe authorsbear full responsibility fortheir contents. Unfortunately there were a number of good papers that could not be included in the program due to this year's tough competition.
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in...
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security,...
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The...
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security,...
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in...
Discover your next great read at BookLoop, Australiand online bookstore offering a vast selection of titles across various genres and interests. Whether you're curious about what's trending or searching for graphic novels that captivate, thrilling crime and mystery fiction, or exhilarating action and adventure stories, our curated collections have something for every reader. Delve into imaginative fantasy worlds or explore the realms of science fiction that challenge the boundaries of reality. Fans of contemporary narratives will find compelling stories in our contemporary fiction section. Embark on epic journeys with our fantasy and science fiction titles,
Shop Trending Books and New Releases
Explore our new releases for the most recent additions in romance books, fantasy books, graphic novels, crime and mystery books, science fiction books as well as biographies, cookbooks, self help books, tarot cards, fortunetelling and much more. With titles covering current trends, booktok and bookstagram recommendations, and emerging authors, BookLoop remains your go-to local australian bookstore for buying books online across all book genres.
Shop Best Books By Collection
Stay updated with the literary world by browsing our trending books, featuring the latest bestsellers and critically acclaimed works. Explore titles from popular brands like Minecraft, Pokemon, Star Wars, Bluey, Lonely Planet, ABIA award winners, Peppa Pig, and our specialised collection of ADHD books. At BookLoop, we are committed to providing a diverse and enriching reading experience for all.
Sign In
your cart
Your cart is empty
Menu
Search
PRE-SALES
If you have any questions before making a purchase chat with our online operators to get more information.