Matches in Harvard for { <http://id.lib.harvard.edu/aleph/009266152/catalog> ?p ?o. }
Showing items 1 to 34 of
34
with 100 items per page.
- catalog abstract "The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year’s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¨ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.".
- catalog contributor b13072066.
- catalog contributor b13072067.
- catalog contributor b13072068.
- catalog created "2003.".
- catalog date "2003".
- catalog date "2003.".
- catalog dateCopyrighted "2003.".
- catalog description "Includes bibliographical references and index.".
- catalog description "Revisiting Software Protection / Paul C. van Oorschot -- Enabling Shared Audit Data / Adrian Baldwin and Simon Shiu -- Cryptographically Generated Addresses (CGA) / Tuomas Aura -- Validating and Securing Spontaneous Associations between Wireless Devices / Tim Kindberg and Kan Zhang -- Single Sign-On Using Trusted Platforms / Andreas Pashalidis and Chris J. Mitchell -- Easy Verifiable Primitives and Practical Public Key Cryptosystems / David Galindo, Sebastia Martin, Paz Morillo and Jorge L. Villar -- Reactively Secure Signature Schemes / Michael Backes, Birgit Pfitzmann and Michael Waidner -- Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation / Jianying Zhou, Feng Bao and Robert Deng.".
- catalog description "The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year’s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¨ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.".
- catalog extent "xi, 441p. :".
- catalog identifier "3540201769 (alk. paper)".
- catalog isPartOf "Lecture notes in computer science ; 2851".
- catalog issued "2003".
- catalog issued "2003.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer-Verlag,".
- catalog subject "005.8 22".
- catalog subject "Computer Communication Networks.".
- catalog subject "Computer science.".
- catalog subject "Computer security Congresses.".
- catalog subject "Computer software.".
- catalog subject "Computers Access control Congresses.".
- catalog subject "Data encryption (Computer science).".
- catalog subject "Information Systems.".
- catalog subject "Operating systems (Computers).".
- catalog subject "QA76.9.A25 I85 2003".
- catalog subject "Software engineering.".
- catalog tableOfContents "Revisiting Software Protection / Paul C. van Oorschot -- Enabling Shared Audit Data / Adrian Baldwin and Simon Shiu -- Cryptographically Generated Addresses (CGA) / Tuomas Aura -- Validating and Securing Spontaneous Associations between Wireless Devices / Tim Kindberg and Kan Zhang -- Single Sign-On Using Trusted Platforms / Andreas Pashalidis and Chris J. Mitchell -- Easy Verifiable Primitives and Practical Public Key Cryptosystems / David Galindo, Sebastia Martin, Paz Morillo and Jorge L. Villar -- Reactively Secure Signature Schemes / Michael Backes, Birgit Pfitzmann and Michael Waidner -- Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation / Jianying Zhou, Feng Bao and Robert Deng.".
- catalog title "Information security : 6th international conference, ISC 2003, Bristol, UK, October 1-3, 2003 : proceedings / Colin Boyd, Wenbo Mao (eds.)".
- catalog type "Bristol (2003) swd".
- catalog type "Conference proceedings. fast".
- catalog type "text".