Secure Networking - Cqre (Secure) '99: International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings 1999 Edition Contributor(s): Baumgart, Rainer (Editor) |
|
![]() |
ISBN: 3540668004 ISBN-13: 9783540668008 Publisher: Springer OUR PRICE: $52.24 Product Type: Paperback Published: November 1999 Annotation: This book constitutes the refereed proceedings of the International Exhibition and Congress on Network Security, CQRE'99, held in D?sseldorf, Germany, in November/December 1999. The 15 revised full papers presented together with two invited papers and five workshop papers were carefully reviewed and selected from 46 submissions. The papers are organized in sections on risk management, security design, electronic payment, smartcards, applications, PKI experiences, mobile security, cryptography, network security, key recovery, intrusion detection, interoperability, and biometrics. |
Additional Information |
BISAC Categories: - Computers | Operating Systems - General - Computers | Networking - Hardware - Computers | Security - Cryptography |
Dewey: 005.8 |
LCCN: 99058804 |
Series: Lecture Notes in Computer Science |
Physical Information: 0.58" H x 6.14" W x 9.21" (0.86 lbs) 266 pages |
Descriptions, Reviews, Etc. |
Publisher Description: The CQRE Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes. The unprecedented reliance on computer technology has transformed the previous technical side-issue "information security" to a management problem requiring decisions of strategic importance. Thus one of the main goals of the conference is to provide a platform for both technical specialists as well as decision makers from government, industry, commercial, and academic communities. The target of CQRE is to promote and stimulate dialogue between managers and experts, which seems to be necessary for providing secure information systems in the next millennium. Therefore CQRE consists of two parts: Part I mainly focuses on strategic issues of information security, while the focus of Part II is more technical in nature. This volume of the conference proceedings consists of the reviewed and invited contributions of the second part. The program committee considered 46 papers and selected only 15 for full presentation. For the participants' convenience we have also included the notes of the invited lectures and short workshop talks in this volume. |