Limit this search to....

Security in Communication Networks: Third International Conference, Scn 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers 2003 Edition
Contributor(s): Cimato, Stelvio (Editor), Galdi, Clemente (Editor), Persiano, Giuseppe (Editor)
ISBN: 3540004203     ISBN-13: 9783540004202
Publisher: Springer
OUR PRICE:   $52.24  
Product Type: Paperback
Published: January 2003
Qty:
Annotation: This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Security in Communication Networks, SCN 2002, held in Amalfi, Italy in September 2002.

The 24 revised full papers presented together with two invited papers were carefully selected from 90 submissions during two rounds of reviewing and revision. The papers are organized in topical sections on forward security, foundations of cryptography, key management, cryptanalysis, systems security, digital signature schemes, zero knowledge, and information theory and secret sharing.

Additional Information
BISAC Categories:
- Computers | Security - Cryptography
- Computers | Computer Science
- Computers | Operating Systems - General
Dewey: 005.8
LCCN: 2003041532
Series: Lecture Notes in Computer Science
Physical Information: 0.78" H x 6.14" W x 9.21" (1.17 lbs) 263 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
The Third International Conference on Security in Communication Networks 2002 (SCN 2002) was held in the Salone Morelli of the Civic Museum of Amal?, Italy, September 11-13, 2002. The conference takes place every three years (p- vious ones were held in 1996 and 1999 in Amal? too) and aims to bring together researchers in the ?eld of security in communication networks to foster coop- ation and the exchange of ideas. The main topics included all technical aspects of data security including: anonymity implementation, authentication, key distribution, block ciphers, - erating systems security, complexity-based cryptography, privacy, cryptanalysis, protocols, digital signatures, public key encryption, electronic money, public key infrastructure, hash functions, secret sharing, identi?cation, surveys, and the state of the art. The program committee received 90 submissions in electronic format from 5 continents of which 24 were selected for presentation in 8 sessions. We had two invited talks, one by Eyal Kushilevitz from the Technion, Israel on "Some ApplicationsofPolynomialsfortheDesignofCryptographicProtocols,"andthe other by Ueli Maurer from ETH, Zurich, on "Secure Multi-Party Computation Made Simple." Due to the high number of submissions, the reviewing phase was a very challenging process, and many good submissions had to be rejected. We are very grateful to all the program committee members, assisted by their colleagues, who devoted much e?ort and valuable time to read and select the papers.