0
Your cart

Your cart is empty

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Buy Now

Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings (Paperback, 2005 ed.) Loot Price: R1,698
Discovery Miles 16 980
Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings...

Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings (Paperback, 2005 ed.)

Dengguo Feng, Dongdai Lin, Moti Yung

Series: Security and Cryptology, 3822

 (sign in to rate)
Loot Price R1,698 Discovery Miles 16 980 | Repayment Terms: R159 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware, theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions."

General

Imprint: Springer-Verlag
Country of origin: Germany
Series: Security and Cryptology, 3822
Release date: December 2005
First published: 2005
Editors: Dengguo Feng • Dongdai Lin • Moti Yung
Dimensions: 235 x 155 x 22mm (L x W x T)
Format: Paperback
Pages: 428
Edition: 2005 ed.
ISBN-13: 978-3-540-30855-3
Categories: Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Promotions
LSN: 3-540-30855-5
Barcode: 9783540308553

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners