Tag Archives: Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee

Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee, Jong In Lim)


Author(s): Dong Hoon Lee, Jong In Lim

Publisher: Springer
Publish date: 2004-05-14
ISBN-10: 3540213767
ISBN-13: 9783540213765
Language: English
Description:
This book constitutes the thoroughly refereed post-proceedings of
the 6th International Conference on Information Security and
Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.

The 32 revised full papers presented together with an invited
paper were carefully selected from 163 submissions during two
rounds of reviewing and improvement. The papers are organized in
topical sections on digital signatures, primitives, fast
implementations, computer security and mobile security, voting
and auction protocols, watermarking, authentication and threshold
protocols, and block ciphers and stream ciphers.

Read Source: Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee, Jong In Lim)»

Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee, Jong In Lim)


Author(s): Dong Hoon Lee, Jong In Lim

Publisher: Springer
Publish date: 2004-05-14
ISBN-10: 3540213767
ISBN-13: 9783540213765
Language: English
Description:
This book constitutes the thoroughly refereed post-proceedings of
the 6th International Conference on Information Security and
Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.

The 32 revised full papers presented together with an invited
paper were carefully selected from 163 submissions during two
rounds of reviewing and improvement. The papers are organized in
topical sections on digital signatures, primitives, fast
implementations, computer security and mobile security, voting
and auction protocols, watermarking, authentication and threshold
protocols, and block ciphers and stream ciphers.

Read Source: Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee, Jong In Lim)»