9783540201502-3540201505-Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings (Lecture Notes in Computer Science, 2836)

Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings (Lecture Notes in Computer Science, 2836)

ISBN-13: 9783540201502
ISBN-10: 3540201505
Edition: 2003
Author: Jianying Zhou, Petra Perner, Dieter Gollmann
Publication date: 2003
Publisher: Springer
Format: Paperback 428 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9783540201502
ISBN-10: 3540201505
Edition: 2003
Author: Jianying Zhou, Petra Perner, Dieter Gollmann
Publication date: 2003
Publisher: Springer
Format: Paperback 428 pages

Summary

Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings (Lecture Notes in Computer Science, 2836) (ISBN-13: 9783540201502 and ISBN-10: 3540201505), written by authors Jianying Zhou, Petra Perner, Dieter Gollmann, was published by Springer in 2003. With an overall rating of 3.7 stars, it's a notable title among other books. You can easily purchase or rent Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings (Lecture Notes in Computer Science, 2836) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10–13 October 2003. Among the preceding conferences, ICICS’97 was held in B- jing, China, ICICS’99 in Sydney, Australia, ICICS 2001 in Xi’an, China, and ICICS 2002,in Singapore.TheproceedingswerereleasedasVolumes1334,1726, 2229, and 2513 of the LNCS series of Springer-Verlag, respectively. ICICS 2003 was sponsored by the Chinese Academy of Sciences (CAS), the National Natural Science Foundation of China, and the China Computer F- eration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conferences has been to o?er the attendees the - portunity to discuss the state-of-the-art technology in theoretical and practical aspects of information and communications security. The response to the Call forPaperswassurprising.WhenwewerepreparingtheconferencebetweenApril and May, China, including the conference venue, Huhehaote City, was ?ghting against SARS. Despite this 176 papers were submitted to the conference from 22 countries and regions, and after a competitive selection process, 37 papers from 14 countries and regions were accepted to appear in the proceedings and be presented at ICICS 2003. We would like to take this opportunity to thank all those who submitted papers to ICICS 2003 for their valued contribution to the conference.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book