Skip to main content

Information Security

6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings

  • Conference proceedings
  • © 2003

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2851)

Included in the following conference series:

Conference proceedings info: ISC 2003.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (33 papers)

  1. Invited Talk

  2. Network Security

  3. Public-Key Algorithms

  4. Cryptographic Protocols

  5. Protocol Attacks

  6. Attacks on Public Key Algorithms

Other volumes

  1. Information Security

Keywords

About this book

The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year’s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¨ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.

Editors and Affiliations

  • Information Security Institute, Queensland University of Technology, Brisbane, Australia

    Colin Boyd

  • Hewlett-Packard Laboratories, Bristol, UK

    Wenbo Mao

Bibliographic Information

Publish with us