Security in Communication Networks: Third International Conference, Scn 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers 2003 Edition Contributor(s): Cimato, Stelvio (Editor), Galdi, Clemente (Editor), Persiano, Giuseppe (Editor) |
|
ISBN: 3540004203 ISBN-13: 9783540004202 Publisher: Springer OUR PRICE: $52.24 Product Type: Paperback Published: January 2003 Annotation: This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Security in Communication Networks, SCN 2002, held in Amalfi, Italy in September 2002. The 24 revised full papers presented together with two invited papers were carefully selected from 90 submissions during two rounds of reviewing and revision. The papers are organized in topical sections on forward security, foundations of cryptography, key management, cryptanalysis, systems security, digital signature schemes, zero knowledge, and information theory and secret sharing. |
Additional Information |
BISAC Categories: - Computers | Security - Cryptography - Computers | Computer Science - Computers | Operating Systems - General |
Dewey: 005.8 |
LCCN: 2003041532 |
Series: Lecture Notes in Computer Science |
Physical Information: 0.78" H x 6.14" W x 9.21" (1.17 lbs) 263 pages |
Descriptions, Reviews, Etc. |
Publisher Description: The Third International Conference on Security in Communication Networks 2002 (SCN 2002) was held in the Salone Morelli of the Civic Museum of Amal?, Italy, September 11-13, 2002. The conference takes place every three years (p- vious ones were held in 1996 and 1999 in Amal? too) and aims to bring together researchers in the ?eld of security in communication networks to foster coop- ation and the exchange of ideas. The main topics included all technical aspects of data security including: anonymity implementation, authentication, key distribution, block ciphers, - erating systems security, complexity-based cryptography, privacy, cryptanalysis, protocols, digital signatures, public key encryption, electronic money, public key infrastructure, hash functions, secret sharing, identi?cation, surveys, and the state of the art. The program committee received 90 submissions in electronic format from 5 continents of which 24 were selected for presentation in 8 sessions. We had two invited talks, one by Eyal Kushilevitz from the Technion, Israel on "Some ApplicationsofPolynomialsfortheDesignofCryptographicProtocols,"andthe other by Ueli Maurer from ETH, Zurich, on "Secure Multi-Party Computation Made Simple." Due to the high number of submissions, the reviewing phase was a very challenging process, and many good submissions had to be rejected. We are very grateful to all the program committee members, assisted by their colleagues, who devoted much e?ort and valuable time to read and select the papers. |