Skip to main content

Information Security

5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 – October 2, 2002, Proceedings

  • Conference proceedings
  • © 2002

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2433)

Included in the following conference series:

Conference proceedings info: ISC 2002.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (38 papers)

  1. Intrusion Detection and Tamper Resistance

  2. Cryptographic Algorithm and Attack Implementation

  3. Access Control and Trust Management (I)

  4. Authentication and Privacy

  5. E-commerce Protocols (I)

  6. Signature Schemes

Other volumes

  1. Information Security

Keywords

About this book

As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas. The conference is an outgrowth of the Information Security Workshop, first held in Ishikawa, Japan 1997. ISC 2002 was held in Sao Paulo, Brazil, on September 30– October 2, 2002. The Program Committee considered 81 submissions of which 38 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. The papers provide a representative sample of both the variety and the truly international scope of information security research conducted currently. The topics addressed range from e-commerce protocols to access control and trust management, and to cryptography and cryptographic algorithms. Many people deserve our gratitude for their contribution to the success of the conference. We would like to thank the General Chair, Routo Terada, for overseeing the local arrangements, including registration and maintaining the conference website, and for the smooth running of the conference. We are grateful to Robbie Ye for his expert help in processing the electronic submissions, reviews and acceptance notifications. Robbie’s enthusiasm and energy greatly simplified the Program Committee’s task of conducting the on-line evaluation of the submitted papers under tight time constraints.

Editors and Affiliations

  • College of Computer Science, Northeastern University, Boston, USA

    Agnes Hui Chan

  • Department of Electrical and Computer Engineering, University of Maryland, College Park, USA

    Virgil Gligor

Bibliographic Information

Publish with us