Cryptology and Information Security Series

The Cryptology and Information Security (CIS) series presents the latest research results in the theory and practice, analysis and design, implemen…(read more)


Radio Frequency Identification System Security

Pub. date
November 2014
Editors
Lo, N.-W. , Li, Y., Yeh, K.-H.
Volume
12
Price
US$110 / €81 / £69
ISBN print
978-1-61499-461-9
Subject
Computer Science, Computer Security

The increasing reliance on sophisticated computer technology for the management of data and infor…


read more...

Radio Frequency Identification System Security

Pub. date
November 2013
Editors
Ma, C. , Weng, J.
Volume
11
Price
US$131 / €90 / £77
ISBN print
978-1-61499-327-8
Subject
Computer Security

Our reliance on ever more sophisticated computer systems for the management of data and informati…


read more...

Secure Multi-Party Computation

Pub. date
January 2013
Editors
Prabhakaran, M.M. , Sahai, A.
Volume
10
Price
US$152 / €105 / £89
ISBN print
978-1-61499-168-7
Subject
Computer & Communication Sciences, Computer Security

Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern crypto…


read more...

Multilaterally Secure Pervasive Cooperation

Pub. date
December 2012
Author
Weber, S.G.
Volume
9
Price
US$138 / €95 / £81
ISBN print
978-1-61499-156-4
Subject
Computer & Communication Sciences, Telecommunication

The mechanisms which support secure communication, privacy protection and accountability are cruc…


read more...

Radio Frequency Identification System Security

Pub. date
November 2012
Editors
Lo, N.-W. , Li, Y.
Volume
8
Price
US$131 / €90 / £77
ISBN print
978-1-61499-142-7
Subject
Computer & Communication Sciences

The revolution in information management, brought about in recent years by advances in computer s…


read more...

Advanced Linear Cryptanalysis of Block and Stream Ciphers

Pub. date
October 2011
Editors
Junod, P., Canteaut, A.
Volume
7
Price
US$131 / €90
ISBN print
978-1-60750-843-4
Subject
Computer & Communication Sciences, Computer Science

The origins of linear cryptanalysis can be traced back to a number of seminal works of the early …


read more...

Radio Frequency Identification System Security

Pub. date
March 2011
Editors
Li, T., Chu, C.-H., Wang, P., Wang, G.
Volume
6
Price
US$138 / €95
ISBN print
978-1-60750-721-5
Subject
Computer & Communication Sciences, Computer Science, Security & Terrorism

This book, which forms part of the Cryptology and Information Security Series (CISS), presents th…


read more...

Formal Models and Techniques for Analyzing Security Protocols

Pub. date
March 2011
Editors
Cortier, V., Kremer, S.
Volume
5
Price
US$152 / €105
ISBN print
978-1-60750-713-0
Subject
Computer & Communication Sciences, Computer Science, Security & Terrorism, Social Sciences

Security protocols are the small distributed programs which are omnipresent in our daily lives in…


read more...

Radio Frequency Identification System Security

Pub. date
February 2010
Editors
Li, Y., Zhou, J.
Volume
4
Price
US$138 / €95
ISBN print
978-1-60750-484-9
Subject
Engineering, Security & Terrorism

This volume contains papers presented at the 2010 Workshop on Radio Frequency Identification Secu…


read more...

The Virtual Battlefield: Perspectives on Cyber Warfare

Pub. date
October 2009
Editors
Czosseck, C., Geers, K.
Volume
3
Price
US$152 / €105
ISBN print
978-1-60750-060-5
Subject
Computer & Communication Sciences, Computer Science, Computer Security

All political and military conflicts now have a cyber dimension, the size and impact of which are…


read more...

Identity-Based Cryptography

Pub. date
December 2008
Editors
Joye, M., Neven, G.
Volume
2
Price
US$145 / €100
ISBN print
978-1-58603-947-9
Subject
Computer & Communication Sciences, Computer Science, Computer Security

Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encry…


read more...

Wireless Sensor Network Security

Pub. date
April 2008
Editors
Lopez, J., Zhou, J.
Volume
1
Price
US$140 / €100
ISBN print
978-1-58603-813-7
Subject
Computer & Communication Sciences, Computer Science

Wireless sensor networks (WSN) are quickly gaining popularity in both military and civilian appli…


read more...

The Cryptology and Information Security (CIS) series presents the latest research results in the theory and practice, analysis and design, implementation, application and experience of cryptology and information security techniques. It covers all aspects of cryptology and information security for an audience of information security researchers with specialized technical backgrounds:

  • cryptography
  • cryptanalysis
  • crypto hardware & implementations
  • security services
  • security protocols
  • provable security
  • formal security analysis
  • malicious crypto/codes and prevention
  • security in mobile/wireless/web/network/pervasive computing environments
  • privacy
  • security biometrics
  • security management, practice & experience
  • security economics and human factors
  • information hiding, watermarking and steganology.

The CIS series includes the following types of publications:

  • research monographs (based on high quality and significantly novel projects, PhDs, etc.)
  • edited volumes (collection of chapters, surveys, tutorials, lectures by multiple qualified authors on a focus area, unconventional ideas, new notions or emerging technologies)
  • proceedings (of refereed conferences on cryptology, information security, etc.)

Proposals for publication as a volume in the CIS series should be sent to the CIS Coordinating Editors Raphael C.-W. Phan and Jianying Zhou by email: cis@iospress.nl

Raphael C.-W. Phan (coordinating editor)
Faculty of Engineering (FOE)
Multimedia University
63100 Cyberjaya
Malaysia
Email: raphael@mmu.edu.my


Jianying Zhou (coordinating editor)
Institute for Infocomm Research
1 Fusionopolis Way, #21-01 Connexis, South Tower
138632 Singapore
Email: jyzhou@i2r.a-star.edu.sg


Feng Bao
Institute for Infocomm Research
Singapore


Kefei Chen
Shanghai Jiaotong University
China


Robert Deng
SMU
Singapore


Yevgeniy Dodis
New York University
USA


Dieter Gollmann
TU Hamburg-Harburg
Germany


Markus Jakobsson
Indiana University
RavenWhite
USA


Marc Joye
Technicolor
France


Javier Lopez
University of Malaga
Spain


Gavin Lowe
Oxford University
United Kingdom


Nasir Memon
Polytech University
USA


Chris Mitchell
RHUL
United Kingdom


David Naccache
Ecole Normale Superieure
France


Gregory Neven
IBM Research
Switzerland


Phong Nguyen
CNRS / Ecole Normale Superieure
France


Andrew Odlyzko
University of Minnesota
USA


Adam Young
MITRE Corporation
USA


Moti Yung
Columbia University
USA