Normal view MARC view ISBD view

Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003 : Proceedings

By: Boyd, Colin.
Contributor(s): Mao, Wenbo.
Material type: materialTypeLabelBookSeries: 2851. Lecture notes in computer science.Publisher: New York: Springer-Verlag, 2003Description: xi, 441 p.; index: 23 cm.ISBN: 3540201769 .Subject(s): Computer security | Block ciphers | Protocol attacks | Cryptographic protocols | Algorithms | Special Purpose and Application-Based Systems | Algorithm Analysis and Problem Complexity | Management of Computing and Information Systems | Water marking | Management information systems | Operating systems | Data encryption | Information systems | Computers access control | Computer communication networks | Software engineeringDDC classification: 004 Summary: This book constitutes the refereed proceedings of the 6th International Conference on Information Security, ISC 2003, held in Bristol, UK in October 2003. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on network security, public key algorithms, cryptographic protocols, protocol attacks, attacks on public key cryptosystems, block ciphers, authorization, water marking, software security, and codes and related issues
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number Status Date due Barcode
Books 004 BOY (Browse shelf) Available 008460

This book constitutes the refereed proceedings of the 6th International Conference on Information Security, ISC 2003, held in Bristol, UK in October 2003. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on network security, public key algorithms, cryptographic protocols, protocol attacks, attacks on public key cryptosystems, block ciphers, authorization, water marking, software security, and codes and related issues

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha