Information and communications security 5th international conference ; proceedings ICICS 2003, Huhehaote, China, October 10 - 13, 2003. Sihan Qing ... (eds.)
Materialtyp: TextSprache: Englisch Reihen: ; 283600 | Lecture notes in computer science ; 2836Verlag: Berlin Heidelberg [u.a.] Springer 2003Beschreibung: XI, 416 S. graph. DarstInhaltstyp:- Text
- ohne Hilfsmittel zu benutzen
- Band
- 3540201505
- ICICS 2003
- Computer security -- Congresses
- Telecommunication systems -- Security measures -- Congresses
- Datensicherung
- Datensicherung
- Kryptologie
- Kryptologie
- Kryptosystem
- Kryptosystem
- Public-Key-Kryptosystem
- Public-Key-Kryptosystem
- Kryptologie
- Kryptosystem
- Public-Key-Kryptosystem
- Datensicherung
- Kryptologie
- Kryptosystem
- Public-Key-Kryptosystem
- Datensicherung
- QA76.9.A25
- 28
- SS 4800
- *00B25
- 68-06
- 94-06
- 94A60
- 94A62
- 68P25
- 54.38
- 54.62
- Archivierung/Langzeitarchivierung gewährleistet PEBW
Medientyp | Aktuelle Bibliothek | Sammlung | Standort | Signatur | Status | Fälligkeitsdatum | Barcode | |
---|---|---|---|---|---|---|---|---|
Buch | Gebäude E2 3 (UdS Campusbibliothek für Informatik und Mathematik) | Campusbibliothek für Informatik und Mathematik (E2 3) | Series (GF) | LNCS 2836 (Regal durchstöbern(Öffnet sich unterhalb)) | Verfügbar | 2000000189901 |
Literaturangaben
This book constitutes the refereed proceedings of the 5th International Conference on Information and Communication Security, ICICS 2003, held in Huhehaote, China, in October 2003. The 37 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers address a broad variety of topics in information and communications security including finite field computations, digital signature schemes, mobile agents security, access control, cryptographic attacks, public key cryptography, peer-to-peer security, watermarking, broadcast encryption, information hiding, cryptographic protocols, oblivious transfer, fingerprinting schemes, security verification, TCP/IP security, support vector machine, intrusion detection, authenticated encryption schemes, etc
Qing, Sihan: Information and Communications Security
Archivierung/Langzeitarchivierung gewährleistet PEBW pdager DE-31