Limit this search to....

Information and Communications Security: 4th International Conference, Icics 2002, Singapore, December 9-12, 2002, Proceedings 2002 Edition
Contributor(s): Deng, Robert H. (Editor), Bao, Feng (Editor), Zhou, Jianying (Editor)
ISBN: 3540001646     ISBN-13: 9783540001645
Publisher: Springer
OUR PRICE:   $52.24  
Product Type: Paperback
Published: November 2002
Qty:
Annotation: This book constitutes the refereed proceedings of the 4th International Conference on Information and Communication Security, ICICS 2002, held in Singapore in December 2002. The 41 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on system security, crypto systems, security protocols, fingerprinting and watermarking, efficient implementation of algorithms, access control, and cryptanalysis and cryptographic techniques.
Additional Information
BISAC Categories:
- Computers | Security - Cryptography
- Medical
- Computers | Computer Science
Dewey: 005.8
LCCN: 2002191200
Series: Lecture Notes in Computer Science
Physical Information: 1.12" H x 6.54" W x 9.26" (1.65 lbs) 500 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97), Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by o?ering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and di?cult-only41paperswereacceptedandmanygoodpapershadtoberejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did.