"Information security and cryptology--ICISC'99" - Information and Links:

Information security and cryptology--ICISC'99 - Info and Reading Options

second international conference, Seoul, Korea, December 9-10, 1999 : proceedings

Book's cover
The cover of “Information security and cryptology--ICISC'99” - Open Library.

"Information security and cryptology--ICISC'99" was published by Springer in 2000 - New York, it has 277 pages and the language of the book is English.


“Information security and cryptology--ICISC'99” Metadata:

  • Title: ➤  Information security and cryptology--ICISC'99
  • Author:
  • Language: English
  • Number of Pages: 277
  • Publisher: Springer
  • Publish Date:
  • Publish Location: New York

“Information security and cryptology--ICISC'99” Subjects and Themes:

Edition Specifications:

  • Pagination: xi, 277 p. :

Edition Identifiers:

AI-generated Review of “Information security and cryptology--ICISC'99”:


"Information security and cryptology--ICISC'99" Description:

The Open Library:

The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a?liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who wasreviewing which paper. The 23 TPC members ?nallyselected 20 top-quality papers for presentation at ICISC 1999 together with one invited talk. Serge Vaudenay gave an invited talk on “Provable Security for Conventional Crypt- raphy”. Many people contributed to ICISC’99. First of all I would like to thank all the authorswho submitted papers. I amgrateful to the TPC members fortheirhard workreviewing the papers andthe OrganizationCommittee members for all the supporting activities which made ICISC’99 a success. I would like to thank the Ministry of Information and Communication of Korea (MIC) which ?nancially sponsored ICISC’99. Special thanks go to Pil Joong Lee and Heung Youl Youm who helped me during the wholeprocess of preparation for the conference. Last, but notleast, I thank my students, KyuMan Ko, SungkyuChie, andChan Yoon Jung.

Read “Information security and cryptology--ICISC'99”:

Read “Information security and cryptology--ICISC'99” by choosing from the options below.

Search for “Information security and cryptology--ICISC'99” downloads:

Visit our Downloads Search page to see if downloads are available.

Find “Information security and cryptology--ICISC'99” in Libraries Near You:

Read or borrow “Information security and cryptology--ICISC'99” from your local library.

Buy “Information security and cryptology--ICISC'99” online:

Shop for “Information security and cryptology--ICISC'99” on popular online marketplaces.


Related Books

Related Ebooks

Source: The Open Library

E-Books

Related Ebooks from the Open Library and The Internet Archive.

1Information security and cryptology--ICISC'99 - Ebook

Please note that the files availability may be limited due to copyright restrictions.
Check the files availability here, with more info and coverage.

“Information security and cryptology--ICISC'99 - Ebook” Metadata:

  • Title: ➤  Information security and cryptology--ICISC'99 - Ebook

Find "Information Security And Cryptology--ICISC'99" in Wikipdedia