Get Free Shipping on orders over $79
Information Security and Cryptology : Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings - Helger Lipmaa
eTextbook alternate format product

Instant online reading.
Don't wait for delivery!

Information Security and Cryptology

Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings

By: Helger Lipmaa (Editor), Moti Yung (Editor), Donghai Lin (Editor)

Paperback | 13 November 2006

At a Glance

Paperback


$84.99

or 4 interest-free payments of $21.25 with

 or 

Ships in 5 to 7 business days

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of Chinese Academy of Sciences and the National Natural Science Foundations of China. The c- ference proceedings, with contributed papers, are published by Springer in this volume of Lecture Notes in Computer Science (LNCS). The research areas covered by Inscrypt have been gaining increased visibility recently since modern computing and communication infrastructures and app- cations require increased security, trust and safety. Indeed important fundam- tal, experimental and applied work has been done in wide areasof cryptography and information security research in recent years. Accordingly, the program of Inscrypt 2006 covered numerous ?elds of research within these areas. The International Program Committee of the conference received a total of 225 submissions, from which only 23 submissions were selected for presentation at the regular papers track and are part of this volume. In addition to this track, the conference also hosted a short paper track of 13 presentations that were carefully selected as well. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, technical remarks and strict selection criteria the papers were selected to the various tracks.

More in Network Security

Grey Area : Dark Web Data Collection and the Future of OSINT - Vinny Troia
Transforming Cybersecurity with Machine Learning - Al-Sakib Khan Pathan

RRP $252.00

$219.75

13%
OFF
Transforming Cybersecurity with Machine Learning - Al-Sakib Khan Pathan
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Hacking For Dummies : For Dummies (Computer/Tech) - Kevin Beaver

RRP $49.95

$38.75

22%
OFF
Tech-Smart Parenting : How to keep your kids happy and safe online - Catherine Knibbs
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Threat Modeling : A Practical Guide for Development Teams - Izar Tarandach
Digital Wisdom : Searching for Agency in the Age of AI - Richard Lachman