Limit this search to....

Information Security and Cryptology - Icisc'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings 2000 Edition
Contributor(s): Song, Jooseok (Editor)
ISBN: 3540673806     ISBN-13: 9783540673804
Publisher: Springer
OUR PRICE:   $52.24  
Product Type: Paperback
Published: April 2000
Qty:
Annotation: This book constitutes the thoroughly refereed post-proceedings of the Second International Conference on Information Security and Cryptology, ICISC'99, held in Seoul, Korea, in December 1999.
The 20 revised full papers presented together with an invited paper were carefully reviewed and selected from a total of 61 submissions. The book is divided into topical sections on cryptoanalysis and cryptographic design; cryptographic theory and computation complexity; cryptographic protocols and authentication design; digital signatures and secret sharing; and electronic cash, applications, and implementation.
Additional Information
BISAC Categories:
- Computers | Security - Cryptography
- Computers | Computer Science
- Mathematics | Discrete Mathematics
Dewey: 005.8
LCCN: 00038822
Series: Lecture Notes in Computer Science
Physical Information: 0.63" H x 6.14" W x 9.21" (0.93 lbs) 284 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a?liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who wasreviewing which paper. The 23 TPC members ?nallyselected 20 top-quality papers for presentation at ICISC 1999 together with one invited talk. Serge Vaudenay gave an invited talk on "Provable Security for Conventional Crypt- raphy". Many people contributed to ICISC'99. First of all I would like to thank all the authorswho submitted papers. I amgrateful to the TPC members fortheirhard workreviewing the papers andthe OrganizationCommittee members for all the supporting activities which made ICISC'99 a success. I would like to thank the Ministry of Information and Communication of Korea (MIC) which ?nancially sponsored ICISC'99. Special thanks go to Pil Joong Lee and Heung Youl Youm who helped me during the wholeprocess of preparation for the conference. Last, but notleast, I thank my students, KyuMan Ko, SungkyuChie, andChan Yoon Jung.