This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008.
The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols.
Springer-Verlag Berlin Heidelberg
504 / 517
Lecture Notes in Computer Science 5222 Information Systems and Applications, incl. Internet/Web, and HCI
The file will be sent to your email address. It may take up to 1-5 minutes before you receive it.
The file will be sent to your Kindle account. It may takes up to 1-5 minutes before you received it.
Please note you need to add our email firstname.lastname@example.org to approved e-mail addresses.
You can write a book review and share your experiences. Other readers will always be interested in your opinion of the books you've read. Whether you've loved the book or not, if you give your honest and detailed thoughts then people will find new books that are right for them.