Editors:
- Up-to-date results
- Fast track conference proceedings
- State-of-the-art report
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5984)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ICISC: International Conference on Information Security and Cryptology
Conference proceedings info: ICISC 2009.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (25 papers)
-
Front Matter
-
Security Management and Efficient Implementation
About this book
Editors and Affiliations
-
CIST (Center for Information Security Technologies), Korea University Anam Dong, Sungbuk Gu, Seoul, Korea
Donghoon Lee
-
Center for Information Security Technologies(CIST), Korea University, Seoul, Korea
Seokhie Hong
Bibliographic Information
Book Title: Information Security and Cryptology - ICISC 2009
Book Subtitle: 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers
Editors: Donghoon Lee, Seokhie Hong
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-14423-3
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2010
Softcover ISBN: 978-3-642-14422-6Published: 12 July 2010
eBook ISBN: 978-3-642-14423-3Published: 20 June 2010
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 387
Number of Illustrations: 70 b/w illustrations
Topics: Computer Communication Networks, Systems and Data Security, Theory of Computation, Cryptology, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity