Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3822)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: CISC 2005.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (35 papers)
-
Intrusion Detection Systems
Other volumes
-
Information Security and Cryptology
Keywords
- authentication
- bluetooth security
- cryptanalysis
- cryptographic protocols
- cryptography
- dos attacks
- error-correcting code
- information
- intrusion detection
- secure computation
- secure proxy
- security modeling
- signature schemes
- systems security
- threshold cryptography
- algorithm analysis and problem complexity
About this book
Editors and Affiliations
Bibliographic Information
Book Title: Information Security and Cryptology
Book Subtitle: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
Editors: Dengguo Feng, Dongdai Lin, Moti Yung
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/11599548
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2005
Softcover ISBN: 978-3-540-30855-3Published: 07 December 2005
eBook ISBN: 978-3-540-32424-9Published: 02 December 2005
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XII, 428
Topics: Cryptology, Coding and Information Theory, Computer Communication Networks, Operating Systems, Algorithm Analysis and Problem Complexity, Computers and Society
Industry Sectors: Aerospace, Electronics, Engineering, Finance, Business & Banking, IT & Software, Law, Telecommunications