Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings

Front Cover
Petra Perner, Dieter Gollmann, Jianying Zhou
Springer, Nov 13, 2003 - Computer security - 416 pages
This book constitutes the refereed proceedings of the 5th International Conference on Information and Communication Security, ICICS 2003, held in Huhehaote, China, in October 2003. The 37 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers address a broad variety of topics in information and communications security including finite field computations, digital signature schemes, mobile agents security, access control, cryptographic attacks, public key cryptography, peer-to-peer security, watermarking, broadcast encryption, information hiding, cryptographic protocols, oblivious transfer, fingerprinting schemes, security verification, TCP/IP security, support vector machine, intrusion detection, and authenticated encryption schemes.

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

A Fast Square Root Computation Using the Frobenius Mapping
1
Secure Route Structures for the Fast Dispatch of LargeScale
22
A Policy Based Framework for Access Control
47
Copyright

17 other sections not shown

Other editions - View all

Common terms and phrases

Bibliographic information