5. ICISC 2002:
Seoul,
Korea
Pil Joong Lee, Chae Hoon Lim (Eds.):
Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers.
Lecture Notes in Computer Science 2587 Springer 2003, ISBN 3-540-00716-4 BibTeX
@proceedings{DBLP:conf/icisc/2002,
editor = {Pil Joong Lee and
Chae Hoon Lim},
title = {Information Security and Cryptology - ICISC 2002, 5th International
Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
booktitle = {ICISC},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2587},
year = {2003},
isbn = {3-540-00716-4},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Invited Talk
Digital Signatures
Internet Security
Block/Stream Ciphers
Stream Ciphers & Other Primitives
Efficient Implementations
Side-Channel Attacks
Cryptographic Protocols I
Cryptographic Protocols II
- Olivier Markowitch, Dieter Gollmann, Steve Kremer:
On Fairness in Exchange Protocols.
451-464
Electronic Edition (Springer LINK) BibTeX
- Jaeil Lee, Taekyoung Kwon, Sanghoon Song, JooSeok Song:
A Model for Embedding and Authorizing Digital Signatures in Printed Documents.
465-477
Electronic Edition (Springer LINK) BibTeX
- Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang:
A Dynamic Group Key Distribution Scheme with Flexible User Join.
478-496
Electronic Edition (Springer LINK) BibTeX
- Ju Hee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park:
Efficient Multicast Key Management for Stateless Receivers.
497-509
Electronic Edition (Springer LINK) BibTeX
Biometrics
Copyright © Sat May 16 23:20:18 2009
by Michael Ley (ley@uni-trier.de)