Editors:
Up-to-date results
Fast track conference proceedings
State-of-the-art report
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5984)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ICISC: International Conference on Information Security and Cryptology
Conference proceedings info: ICISC 2009.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (25 papers)
-
Front Matter
-
Security Management and Efficient Implementation
About this book
Keywords
- ARIRANG
- access control
- algorithms
- calculus
- cryptanalysis
- cryptographic protocols
- cryptography
- cryptosystems
- hash function
- repair
- algorithm analysis and problem complexity
Editors and Affiliations
-
CIST (Center for Information Security Technologies), Korea University Anam Dong, Sungbuk Gu, Seoul, Korea
Donghoon Lee
-
Center for Information Security Technologies(CIST), Korea University, Seoul, Korea
Seokhie Hong
Bibliographic Information
Book Title: Information Security and Cryptology - ICISC 2009
Book Subtitle: 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers
Editors: Donghoon Lee, Seokhie Hong
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-14423-3
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2010
Softcover ISBN: 978-3-642-14422-6Published: 12 July 2010
eBook ISBN: 978-3-642-14423-3Published: 20 June 2010
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 387
Number of Illustrations: 70 b/w illustrations
Topics: Computer Communication Networks, Data and Information Security, Theory of Computation, Cryptology, IT Operations, Algorithms