Information security and cryptology--ICISC'99 - Info and Reading Options
second international conference, Seoul, Korea, December 9-10, 1999 : proceedings
By ICISC'99 (1999 Seoul, Korea)

"Information security and cryptology--ICISC'99" was published by Springer in 2000 - New York, it has 277 pages and the language of the book is English.
“Information security and cryptology--ICISC'99” Metadata:
- Title: ➤ Information security and cryptology--ICISC'99
- Author: ICISC'99 (1999 Seoul, Korea)
- Language: English
- Number of Pages: 277
- Publisher: Springer
- Publish Date: 2000
- Publish Location: New York
“Information security and cryptology--ICISC'99” Subjects and Themes:
- Subjects: ➤ Congresses - Computer security - Cryptography - Schlüsselverwaltung - Computational complexity - Algorithm Analysis and Problem Complexity - Kryptosystem - Computer science - Management of Computing and Information Systems - Kryptoanalyse - Computer software - Information Systems - Discrete Mathematics in Computer Science - Rechnernetz - Elektronische Unterschrift - Computer Communication Networks - Data Encryption - Data encryption (Computer science) - Kryptologie - Authentifikation - Computer networks
Edition Specifications:
- Pagination: xi, 277 p. :
Edition Identifiers:
- The Open Library ID: OL18139823M - OL12332183W
- Online Computer Library Center (OCLC) ID: 43810673
- Library of Congress Control Number (LCCN): 00038822
- ISBN-10: 3540673806
- All ISBNs: 3540673806
AI-generated Review of “Information security and cryptology--ICISC'99”:
"Information security and cryptology--ICISC'99" Description:
The Open Library:
The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a?liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who wasreviewing which paper. The 23 TPC members ?nallyselected 20 top-quality papers for presentation at ICISC 1999 together with one invited talk. Serge Vaudenay gave an invited talk on “Provable Security for Conventional Crypt- raphy”. Many people contributed to ICISC’99. First of all I would like to thank all the authorswho submitted papers. I amgrateful to the TPC members fortheirhard workreviewing the papers andthe OrganizationCommittee members for all the supporting activities which made ICISC’99 a success. I would like to thank the Ministry of Information and Communication of Korea (MIC) which ?nancially sponsored ICISC’99. Special thanks go to Pil Joong Lee and Heung Youl Youm who helped me during the wholeprocess of preparation for the conference. Last, but notleast, I thank my students, KyuMan Ko, SungkyuChie, andChan Yoon Jung.
Read “Information security and cryptology--ICISC'99”:
Read “Information security and cryptology--ICISC'99” by choosing from the options below.
Search for “Information security and cryptology--ICISC'99” downloads:
Visit our Downloads Search page to see if downloads are available.
Find “Information security and cryptology--ICISC'99” in Libraries Near You:
Read or borrow “Information security and cryptology--ICISC'99” from your local library.
- The WorldCat Libraries Catalog: Find a copy of “Information security and cryptology--ICISC'99” at a library near you.
Buy “Information security and cryptology--ICISC'99” online:
Shop for “Information security and cryptology--ICISC'99” on popular online marketplaces.
- Ebay: New and used books.