Editors:
Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2776)
Conference series link(s): MMM-ACNS: International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Conference proceedings info: MMM-ACNS 2003.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (47 papers)
-
Front Matter
-
Invited Papers
-
Mathematical Models and Architectures for Computer Network Security
-
Intrusion Detection
-
Public Key Distribution, Authentication, Access Control
Keywords
- access control
- authentication
- computer network security
- computer security
- cryptography
- data security
- information security
- intrusion detection
- network security
- privacy
- secure communications
- secure networking
- security
- systems security
Editors and Affiliations
-
St. Petersburg Intitute for Informaticsand Automation, St. Petersburg, Russia
Vladimir Gorodetsky
-
AFRL/IF, Rome, USA
Leonard Popyack
-
US Air Force, Binghamton University (SUNYI), Binghamton, USA
Victor Skormin
Bibliographic Information
Book Title: Computer Network Security
Book Subtitle: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings
Editors: Vladimir Gorodetsky, Leonard Popyack, Victor Skormin
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/b12005
Publisher: Springer Berlin, Heidelberg
-
eBook Packages: Springer Book Archive
Copyright Information: Springer-Verlag Berlin Heidelberg 2003
Softcover ISBN: 978-3-540-40797-3Published: 09 September 2003
eBook ISBN: 978-3-540-45215-7Published: 01 December 2003
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 478
Topics: Computer Communication Networks, Cryptology, Operating Systems, Computer Application in Administrative Data Processing, Computers and Society, IT Operations