Information and Communications Security

Information and Communications Security

4.11 - 1251 ratings - Source

ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xia€™an, China, 13-16 November 2001. Among the preceding conferences, ICICSa€™97 was held in Beijing, China, 11-14 November 1997 and ICICSa€™99 in Sydney, Australia, 9-11 November 1999. The ICICSa€™97 and ICICSa€™99 proceedings were released as volumes 1334 and 1726 of Springer- Verlaga€™s Lecture Notes in Computer Science series. ICICS 2001 was sponsored by the Chinese Academy of Sciences (CAS), the - tional Natural Science Foundation of China, and the China Computer Fe- ration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Association for Cryptologic Re- arch (IACR), the International Communications and Information Security - sociation (ICISA), and the Asiacrypt Steering Committee. The format of ICICS 2001 was selected to cover the complete spectrum of - formation and communications security, and to promote participant interaction. The sessions were designed to promote interaction between the major topics of the conference: theoretical foundations of security, secret sharing, network - curity, authentication and identi?cation, boolean functions and stream ciphers, security evaluation, signatures, block ciphers and public-key systems, infor- tion hiding, protocols and their analysis, and cryptanalysis. The 29-member Program Committee considered 134 submissions from 23 di- rent countries and regions, among them 56 papers were accepted for presentation.C.-H. Lee1, X. Deng1, and H. Zhu2 1 Department of computer science, City university of Hong Kong, Hong Kong ... We remark that the reset attack is a real security concern since a malicious user can simply disconnect its battery so as to resetanbsp;...

Title:Information and Communications Security
Author: Sihan Qing, Tatsuaki Okamoto, Jianying Zhou
Publisher:Springer Science & Business Media - 2001-10-24

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA