Skip to main content

Secure Networking - CQRE (Secure) '99

International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings

  • Conference proceedings
  • © 1999

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1740)

Included in the following conference series:

Conference proceedings info: CQRE 1999.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (22 papers)

  1. Security Design

  2. Electronic Payment

  3. SmartCard Issues

  4. Applications

  5. PKI-experiences (Workshop Notes)

  6. Mobile Security

  7. Cryptography

  8. Network Security (Workshop Notes)

  9. Key Recovery

  10. Intrusion Detection

Other volumes

  1. Secure Networking — CQRE [Secure] ’ 99

Keywords

About this book

The CQRE [Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes. The unprecedented reliance on computer technology has transformed the previous technical side-issue "information security" to a management problem requiring decisions of strategic importance. Thus one of the main goals of the conference is to provide a platform for both technical specialists as well as decision makers from government, industry, commercial, and academic communities. The target of CQRE is to promote and stimulate dialogue between managers and experts, which seems to be necessary for providing secure information systems in the next millennium. Therefore CQRE consists of two parts: Part I mainly focuses on strategic issues of information security, while the focus of Part II is more technical in nature. This volume of the conference proceedings consists of the reviewed and invited contributions of the second part. The program committee considered 46 papers and selected only 15 for full presentation. For the participants’ convenience we have also included the notes of the invited lectures and short workshop talks in this volume.

Authors and Affiliations

  • Security Networks GmbH, Siegen, Germany

    Rainer Baumgart

Bibliographic Information

Publish with us