|
Showing 1 - 7 of
7 matches in All Departments
The third Financial Cryptography conference was held in February
1999, once again at Anguilla in the British West Indies. The number
of attendees continues to increase from year to year, as do the
number and quality of the technical submissions. The Program
Committee did a great job selecting the technical program. I thank
them for all of their eo rt's. We were helped by a number of
outside reviewers, including Mart n Abadi, Gerrit Bleumer, Drew
Dean, Anand Desai, Mariusz Jakubowski, Andrew Odlyzko, David
Pointcheval, Guillaume Poupard, Zul kar Ramzan, Aleta Ricciardi,
Dan Simon, Jessica Staddon, Venkie Venka- san, Avishai Wool, and
Francis Zane. I apologize for any omissions. Adi Shamir gave an
excellent invited talk that forecast the future of crypt- raphy and
electronic commerce. On-line certic ate revocation was the subject
of a panel led by Michael Myers, following up on the success of his
panel on the same topic at last year's conference. Joan Feigenbaum
moderated a lively panel on fair use, intellectual property, and
the information economy, and I thank her for pulling together from
that discussion a paper for these proceedings. A s- cessful Rump
Session allowed participants to present new results in an informal
setting, superbly chaired by Avi Rubin.
TheseventhinternationalconferenceonCryptologyandNetworkSecurity(CANS
2008)washeld at HKU Town Center, Hong Kong, China, during December
2-4, 2008. The conference was organized by the Department of
Computer Science, theUniversityofHongKong,
andwasfullysupportedbytheCenterforInfor- tion Security and
Cryptography at the University of Hong Kong, the Cyberport
Institute of Hong Kong at the University of Hong Kong and the
Department of Computer Science at the City University of Hong Kong.
The goal of CANS is to promote research on all aspects of network
security, as well as to build a bridge between research on
cryptography and network security. Previous CANS conferences have
been held in Taipei, Taiwan (2001), SanFrancisco, USA (2002),
Miami, USA (2003), Xiamen, China (2005), Suzhou, China (2006), and
Singapore (2007). The conference proceedings of recent years were
published by Springer in the Lecture Notes in Computer Science
series. The Program Committee received 73 submissions, and accepted
27 papers for presentation. The ?nal versions of the accepted
papers, which the authors ?nalized on the basis of comments from
the reviewers, were included in the proceedings. The reviewing
process took nine weeks; each paper was carefully evaluated by at
least three members from the Program Committee. The in- vidual
reviewing phase was followed by a Web-based discussion. Based on
the comments and scores given by reviewers, the ?nal decisions on
acceptance were made. We appreciate the hard work of the members of
the Program Committee and the external referees who gave many hours
of their valuabl
|
You may like...
Fast X
Vin Diesel, Jason Momoa, …
DVD
R172
R132
Discovery Miles 1 320
Finding Dory
Ellen DeGeneres, Albert Brooks, …
Blu-ray disc
(1)
R38
Discovery Miles 380
|