Article thumbnail

Information Security. Proceedings 10th International Conference, ISC 2007

By 

Abstract

The following topics were dealt with: intrusion detection; digital rights management; symmetric-key cryptography; cryptographic protocols; identify-based cryptography; cryptanalysis; network security; software obfuscation; public-key cryptosystems; elliptic curves; database security and privacy

Publisher: 'Springer Fachmedien Wiesbaden GmbH'
Year: 2010
OAI identifier: oai:infoscience.tind.io:149732
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://infoscience.epfl.ch/rec... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.