Normal view MARC view ISBD view

Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

By: Gorodetsky, Vladimir.
Contributor(s): Popyack, Leonard | Skormin, Victor.
Material type: materialTypeLabelBookSeries: 2776. Lecture notes in computer science.Publisher: New York: Springer-Verlag, 2003Description: 470p.; ill.: 23 cm.ISBN: 3540407979 .Subject(s): Computer network security | Computer communication networks | Data encryption | Operating systems | Information systems | Intrusion detection | Public key distribution | Authentication and access control | Cryptography | StenographyDDC classification: 004 Summary: This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003. The 29 revised full papers and 12 revised short papers presented together with 6 invited papers were carefully reviewed and selected from a total of 62 submissions. The papers are organized in topical sections on mathematical models and architectures for computer network security; intrusion detection; public key distribution, authentication, and access control; cryptography; and stenography
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number Status Date due Barcode
Books 004 GOR (Browse shelf) Available 008451

This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003. The 29 revised full papers and 12 revised short papers presented together with 6 invited papers were carefully reviewed and selected from a total of 62 submissions. The papers are organized in topical sections on mathematical models and architectures for computer network security; intrusion detection; public key distribution, authentication, and access control; cryptography; and stenography

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha