Get Free Shipping on orders over $89
Computer Security -- ESORICS 2002 : 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings - Dieter Gollmann

Computer Security -- ESORICS 2002

7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings

By: Dieter Gollmann (Editor), Günter Karjoth (Editor), Michael Waidner (Editor)

Paperback | 30 September 2002

Sorry, we are not able to source the book you are looking for right now.

We did a search for other books with a similar title, however there were no matches. You can try selecting from a similar category, click on the author's name, or use the search box above to find your book.

ESORICS, the European Symposium on Research in Computer Security, is the leading research-oriented conference on the theory and practice of computer security in Europe. It takes place every two years, at various locations throughout Europe, and is coordinated by an independent Steering Committee. ESORICS 2002 was jointly organized by the Swiss Federal Institute of Te- nology (ETH) and the IBM Zurich Research Laboratory, and took place in Zurich, Switzerland, October 14-16, 2002. The program committee received 83 submissions, originating from 22 co- tries. For fans of statistics: 55 submissions came from countries in Europe, the Middle East, or Africa, 16 came from Asia, and 12from North America. The leading countries were USA (11 submissions), Germany (9), France (7), Italy (7), Japan (6), and UK (6). Each submission was reviewed by at least three p- gram committee members or other experts. Each submission coauthored by a program committee member received two additional reviews. The program c- mittee chair and cochair were not allowed to submit papers. The ?nal selection of papers was made at a program committee meeting and resulted in 16 accepted papers. In comparison, ESORICS 2000 received 75 submissions and accepted 19 of them. The program re?ects the full range of security research: we accepted papers on access control, authentication, cryptography, database security, formal methods, intrusion detection, mobile code security, privacy, secure hardware, and secure protocols. We gratefully acknowledge all authors who submitted papers for their e?orts in maintaining the standards of this conference.

More in Data Encryption

Blockchain : Blueprint for a New Economy - Melanie Swa

RRP $66.75

$53.40

20%
OFF
CompTIA PenTest+ Study Guide : Exam PT0-003 - David Seidl

RRP $112.95

$75.75

33%
OFF
Principles of Information Security : 7th edition - Herbert  Mattord

RRP $167.95

$129.99

23%
OFF
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Supremacy : AI, ChatGPT and the Race that Will Change the World - Parmy Olson
Mastering FreeBSD and OpenBSD Security : O'Reilly Ser. - Bruce Potter
Linux Security Cookbook : Cookbooks Ser. - Daniel J Barrett

RRP $76.00

$39.75

48%
OFF
Ssh, the Secure Shell : The Definitive Guide - Daniel J Barrett

RRP $85.75

$68.60

20%
OFF