Normal view MARC view ISBD view

Information and Communications Security : 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003 : Proceedings

By: Qing, Sihan.
Contributor(s): Gollmann, Dieter | Zhou, Jianying.
Material type: materialTypeLabelBookSeries: 2836. Lecture notes in computer science.Publisher: New York: Springer-Verlag, 2003Description: xi, 416 p.; : 23 cm.ISBN: 3540201505 .Subject(s): Computer security | Operating systems | Discrete Mathematics in Computer Science | Algorithm Analysis and Problem Complexity | Data Encryption | Algorithms | Mobile agents security | Information hiding | Watermarking | Cryptographic protocols | Fingerprinting schemes | Security verification | TCP/​IP security | Security measures | Telecommunication systemsDDC classification: 004 Summary: This book constitutes the refereed proceedings of the 5th International Conference on Information and Communication Security, ICICS 2003, held in Huhehaote, China, in October 2003. The 37 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers address a broad variety of topics in information and communications security including finite field computations, digital signature schemes, mobile agents security, access control, cryptographic attacks, public key cryptography, peer-to-peer security, watermarking, broadcast encryption, information hiding, cryptographic protocols, oblivious transfer, fingerprinting schemes, security verification, TCP/​IP security, support vector machine, intrusion detection, and authenticated encryption schemes
Tags from this library: No tags from this library for this title. Log in to add tags.

This book constitutes the refereed proceedings of the 5th International Conference on Information and Communication Security, ICICS 2003, held in Huhehaote, China, in October 2003. The 37 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers address a broad variety of topics in information and communications security including finite field computations, digital signature schemes, mobile agents security, access control, cryptographic attacks, public key cryptography, peer-to-peer security, watermarking, broadcast encryption, information hiding, cryptographic protocols, oblivious transfer, fingerprinting schemes, security verification, TCP/​IP security, support vector machine, intrusion detection, and authenticated encryption schemes

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha