Tag Archives: Seoul

Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee, Jong In Lim)


Author(s): Dong Hoon Lee, Jong In Lim

Publisher: Springer
Publish date: 2004-05-14
ISBN-10: 3540213767
ISBN-13: 9783540213765
Language: English
Description:
This book constitutes the thoroughly refereed post-proceedings of
the 6th International Conference on Information Security and
Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.

The 32 revised full papers presented together with an invited
paper were carefully selected from 163 submissions during two
rounds of reviewing and improvement. The papers are organized in
topical sections on digital signatures, primitives, fast
implementations, computer security and mobile security, voting
and auction protocols, watermarking, authentication and threshold
protocols, and block ciphers and stream ciphers.

Read Source: Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee, Jong In Lim)»

Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee, Jong In Lim)


Author(s): Dong Hoon Lee, Jong In Lim

Publisher: Springer
Publish date: 2004-05-14
ISBN-10: 3540213767
ISBN-13: 9783540213765
Language: English
Description:
This book constitutes the thoroughly refereed post-proceedings of
the 6th International Conference on Information Security and
Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.

The 32 revised full papers presented together with an invited
paper were carefully selected from 163 submissions during two
rounds of reviewing and improvement. The papers are organized in
topical sections on digital signatures, primitives, fast
implementations, computer security and mobile security, voting
and auction protocols, watermarking, authentication and threshold
protocols, and block ciphers and stream ciphers.

Read Source: Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee, Jong In Lim)»

Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers (Lecture Notes in Computer Science) (by Ingemar J. Cox, Ton Kalker, Yong M. Ro)


Author(s): Ingemar J. Cox, Ton Kalker, Yong M. Ro

Publisher: Springer
Publish date: 2004-02-24
ISBN-10: 354021061X
ISBN-13: 9783540210610
Language: English
Description: We are happy to present to you the proceedings of the 2nd
International Workshop on Digital Watermarking, IWDW 2003. Since
its modern re-appearance in the academic community in the early
1990s, great progress has been made in understanding both the
capabilities and the weaknesses of digital watermarking. On the
theoretical side, we all are now well aware of the fact that
digital waterma- ing is best viewed as a form of communication
using side information. In the case of digital watermarking the
side information in question is the document to be wat- marked.
This insight has led to a better understanding of the limits of the
capacity and robustness… more…

Read Source: Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers (Lecture Notes in Computer Science) (by Ingemar J. Cox, Ton Kalker, Yong M. Ro)»

Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers (Lecture Notes in Computer Science) (by Ingemar J. Cox, Ton Kalker, Yong M. Ro)


Author(s): Ingemar J. Cox, Ton Kalker, Yong M. Ro

Publisher: Springer
Publish date: 2004-02-24
ISBN-10: 354021061X
ISBN-13: 9783540210610
Language: English
Description: We are happy to present to you the proceedings of the 2nd
International Workshop on Digital Watermarking, IWDW 2003. Since
its modern re-appearance in the academic community in the early
1990s, great progress has been made in understanding both the
capabilities and the weaknesses of digital watermarking. On the
theoretical side, we all are now well aware of the fact that
digital waterma- ing is best viewed as a form of communication
using side information. In the case of digital watermarking the
side information in question is the document to be wat- marked.
This insight has led to a better understanding of the limits of the
capacity and robustness… more…

Read Source: Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers (Lecture Notes in Computer Science) (by Ingemar J. Cox, Ton Kalker, Yong M. Ro)»

Information Security and Cryptology – ICISC 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers (Lecture Notes in Computer Science) (by Jongsung Kim, Jooyoung Lee)


Author(s): Jongsung Kim, Jooyoung Lee

Publisher: Springer
Publish date: 2015-03-17
ISBN-10: 3319159429
ISBN-13: 9783319159423
Language: English
Description: This book constitutes the thoroughly refereed post-conference
proceedings of the 17th International Conference on Information
Security and Cryptology, ICISC 2014, held in Seoul, South Korea in
December 2014. The 27 revised full papers presented were carefully
selected from 91 submissions during two rounds of reviewing. The
papers provide the latest results in research, development and
applications in the field of information security and cryptology.
They are organized in topical sections on RSA security, digital
signature, public key cryptography, block ciphers, network
security, mobile security, hash functions, information hiding and
efficiency,… more…

Read Source: Information Security and Cryptology – ICISC 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers (Lecture Notes in Computer Science) (by Jongsung Kim, Jooyoung Lee)»

Information Security and Cryptology – ICISC 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers (Lecture Notes in Computer Science) (by Jongsung Kim, Jooyoung Lee)


Author(s): Jongsung Kim, Jooyoung Lee

Publisher: Springer
Publish date: 2015-03-17
ISBN-10: 3319159429
ISBN-13: 9783319159423
Language: English
Description: This book constitutes the thoroughly refereed post-conference
proceedings of the 17th International Conference on Information
Security and Cryptology, ICISC 2014, held in Seoul, South Korea in
December 2014. The 27 revised full papers presented were carefully
selected from 91 submissions during two rounds of reviewing. The
papers provide the latest results in research, development and
applications in the field of information security and cryptology.
They are organized in topical sections on RSA security, digital
signature, public key cryptography, block ciphers, network
security, mobile security, hash functions, information hiding and
efficiency,… more…

Read Source: Information Security and Cryptology – ICISC 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers (Lecture Notes in Computer Science) (by Jongsung Kim, Jooyoung Lee)»