Article thumbnail

Information Security. Proceedings 10th International Conference, ISC 2007



The following topics were dealt with: intrusion detection; digital rights management; symmetric-key cryptography; cryptographic protocols; identify-based cryptography; cryptanalysis; network security; software obfuscation; public-key cryptosystems; elliptic curves; database security and privacy

Publisher: 'Springer Fachmedien Wiesbaden GmbH'
Year: 2010
OAI identifier:
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.