𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Lecture Notes in Computer Science] Information and Communications Security Volume 2513 || Password-Authenticated Key Exchange between Clients with Different Passwords

✍ Scribed by Deng, Robert; Bao, Feng; Zhou, Jianying; Qing, Sihan


Book ID
125549817
Publisher
Springer Berlin Heidelberg
Year
2002
Tongue
English
Weight
219 KB
Edition
1
Category
Article
ISBN
3540361596

No coin nor oath required. For personal study only.

✦ Synopsis


This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by o?ering you yet another successful meeting with a rich and interesting program. The response to the Call For Papers was overwhelming, 161 paper submissions were received. Therefore, the paper selection process was very competitive and di?cult–only41paperswereacceptedandmanygoodpapershadtoberejected. The success of the conference depends on the quality of the program. We are indebted to our program committee members and the external referees for the wonderful job they did.


πŸ“œ SIMILAR VOLUMES


[Lecture Notes in Computer Science] Info
✍ Deng, Robert; Bao, Feng; Zhou, Jianying; Qing, Sihan πŸ“‚ Article πŸ“… 2002 πŸ› Springer Berlin Heidelberg 🌐 English βš– 226 KB

This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97),Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and

[Lecture Notes in Computer Science] Info
✍ Liu, Baoxiang; Ma, Maode; Chang, Jincai πŸ“‚ Article πŸ“… 2012 πŸ› Springer Berlin Heidelberg 🌐 English βš– 262 KB

This book constitutes the refereed proceedings of the Third International Conference on Information Computing and Applications, ICICA 2012, held in Chengde, China, in September 2012. The 100 revised full papers were carefully reviewed and selected from 1089 submissions. The papers are organized in t