pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: INFORMATION AND COMMUNICATIONS SECURITY
THIRD INTERNATIONAL CONFERENCE, ICICS 2001, XIAN CHINA, NOVEMBER 13-16, 2001 PROCEEDINGS
By: Sihan Qing (Editor), Tatsuaki Okamoto (Editor), Jianying Zhou (Editor)
Format: Paperback

List price: £81.00


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 3540428801
ISBN 13: 9783540428800
Publisher: SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH & CO. KG
Pub. date: 24 October, 2001
Edition: 2001 ed.
Series: Lecture Notes in Computer Science v. 2229
Pages: 524
Description: These are the refereed proceedings of the Third International Conference on Information and Communications Security ICICS 2001, held in Xian, China in November 2001.
Synopsis: ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi'an, China, 13-16 November 2001. Among the preceding conferences, ICICS'97 was held in Beijing, China, 11-14 November 1997 and ICICS'99 in Sydney, Australia, 9-11 November 1999. The ICICS'97 and ICICS'99 proceedings were released as volumes 1334 and 1726 of Springer- Verlag's Lecture Notes in Computer Science series. ICICS 2001 was sponsored by the Chinese Academy of Sciences (CAS), the - tional Natural Science Foundation of China, and the China Computer Fe- ration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Association for Cryptologic Re- arch (IACR), the International Communications and Information Security - sociation (ICISA), and the Asiacrypt Steering Committee. The format of ICICS 2001 was selected to cover the complete spectrum of - formation and communications security, and to promote participant interaction.The sessions were designed to promote interaction between the major topics of the conference: theoretical foundations of security, secret sharing, network - curity, authentication and identi?cation, boolean functions and stream ciphers, security evaluation, signatures, block ciphers and public-key systems, infor- tion hiding, protocols and their analysis, and cryptanalysis. The 29-member Program Committee considered 134 submissions from 23 di- rent countries and regions, among them 56 papers were accepted for presentation.
Illustrations: biography
Publication: Germany
Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Returns: Returnable
Some other items by this author:
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2000 (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
CRYPTOLOGY AND NETWORK SECURITY (PB)
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (PB)
INFORMATION AND COMMUNICATION SECURITY (PB)
INFORMATION AND COMMUNICATION SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES (HB)
INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES (PB)
INFORMATION SECURITY PRACTICE AND EXPERIENCE (PB)
INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION (PB)
NON-REPUDIATION IN ELECTRONIC COMMERCE (HB)
PAIRING-BASED CRYPTOGRAPHY - PAIRING 2007 (PB)
PROTECTING MOBILE NETWORKS AND DEVICES (HB)
PUBLIC KEY CRYPTOGRAPHY - PKC 2004 (PB)
PUBLIC KEY CRYPTOGRAPHY - PKC 2007 (PB)
SECURE MULTI-PARTY NON-REPUDIATION PROTOCOLS AND APPLICATIONS (HB)
SECURE MULTI-PARTY NON-REPUDIATION PROTOCOLS AND APPLICATIONS (PB)
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (PB)
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (PB)
SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING (HB)
SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING (PB)
TOPICS IN CRYPTOLOGY - CT-RSA 2004 (PB)
TRUST MANAGEMENT VIII (HB)
TRUST MANAGEMENT VIII (PB)



Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket