Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_1650923678
    Format: Online-Ressource
    ISBN: 9783540399278 , 3540201505 , 9783540201502
    Series Statement: Lecture Notes in Computer Science 2836
    Content: This book constitutes the refereed proceedings of the 5th International Conference on Information and Communication Security, ICICS 2003, held in Huhehaote, China, in October 2003. The 37 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers address a broad variety of topics in information and communications security including finite field computations, digital signature schemes, mobile agents security, access control, cryptographic attacks, public key cryptography, peer-to-peer security, watermarking, broadcast encryption, information hiding, cryptographic protocols, oblivious transfer, fingerprinting schemes, security verification, TCP/IP security, support vector machine, intrusion detection, and authenticated encryption schemes
    Note: Literaturangaben
    Additional Edition: ISBN 9783540201502
    Additional Edition: Buchausg. u.d.T. Information and communications security Berlin : Springer, 2003 ISBN 3540201505
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Kryptosystem ; Public-Key-Kryptosystem ; Datensicherung ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages