Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Computer Security - ESORICS 2003 - 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings (Paperback, 2003 ed.)
Loot Price: R1,600
Discovery Miles 16 000
|
|
Computer Security - ESORICS 2003 - 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings (Paperback, 2003 ed.)
Series: Lecture Notes in Computer Science, 2808
Expected to ship within 10 - 15 working days
|
ESORICS, the European Symposium On Research In Computer Security,
is the leading research-oriented conference on the theory and
practice of computer - curity in Europe. The aim of ESORICS is to
further the progress of research in computer security by
establishing a European forum for bringing together -
searchersinthisarea,
bypromotingtheexchangeofideaswithsystemdevelopers and by
encouraging links with researchers in related areas. ESORICS is
coordinated by an independent steering committee. In the past it
took place every two years at various locations throughout Europe.
Starting this year, it will take place annually. ESORICS 2003 was
organized by Gjovik University College, and took place in Gjovik,
Norway, October 13-15, 2003. The program committee received 114
submissions, originating from 26 co- tries on all continents. Half
the papers originated in Europe (57). The most dominant countries
were: UK (16), USA (14), Germany (6), South Korea (6), Sweden (6),
Italy (5), France (4) and Poland (4). Each submission was reviewed
by at least three program committee members or other experts. The
program committee chair and co-chair were not allowed to submit
papers. The ?nal sel- tion of papers was made at a program
committee meeting followed by a week of e-mail discussions. Out of
the 114 papers received, only 19 got accepted (17%). In comparison,
ESORICS 2000and 2002received 75and 83papersand accepted 19% and
16%, respectively. The program re?ected the full range of security
research, including access control, cryptographic protocols,
privacy enhancing technologies, security m- els, authentication,
and intrusion detection."
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.