24小时热门版块排行榜    

CyRhmU.jpeg
查看: 587  |  回复: 0

[资源] [IS]Information Security and Cryptology.Springer.2010

Information Security and Cryptology_5th International Conference, Inscrypt 2009
免责声明
本资源来自于互联网,仅供网络测试之用,请务必在下载后24小时内删除!所有资源不涉及任何商业用途。发帖人不承担由下载使用者引发的一切法律责任及连带责任!
著作权归原作者或出版社所有。未经发贴人许可,严禁任何人以任何形式转贴本文,违者必究!
如果本帖侵犯您的著作权,请与发贴人联系,收到通知后我们将立即删除此帖!

Authors(Editors):
        Feng Bao
        MotiYung
        Dongdai Lin
        Jiwu Jing (Eds.)
Publisher: Springer
Pub Date: 2009
Pages: 474
ISBN:
ISSN 0302-9743
ISBN-10 3-642-16341-6 Springer Berlin Heidelberg NewYork
ISBN-13 978-3-642-16341-8 Springer Berlin Heidelberg NewYork

Preface
The 5th China International Conference on Information Security and Cryptology
(Inscrypt 2009) was co-organized by the State Key Laboratory of Information
Security and by the Chinese Association for Cryptologic Research in cooperation
with the International Association for Cryptologic Research (IACR). The conference
was held in Beijing, China, in the middle of December, and was further
sponsored by the Institute of Software, the Graduate University of the Chinese
Academy of Sciences and the National Natural Science Foundations of China.
The conference is a leading annual international event in the area of cryptography
and information security taking place in China. The scientific program of
the conference covered all areas of current research in the field, with sessions
on central areas of cryptographic research and on many important areas of information
security. The conference continues to get the support of the entire
international community, reflecting on the fact that the research areas covered
by Inscrypt are important to modern computing, where increased security, trust,
safety and reliability are required.
The international Program Committee of Inscrypt 2009 received a total of
147 submissions from more than 20 countries and regions, from which only 32
submissions were selected for presentation, 22 of which in the regular papers
track and 10 submissions in the short papers track. All anonymous submissions
were reviewed by experts in the relevant areas and based on their ranking, technical
remarks and strict selection criteria the papers were chosen for the various
tracks. The selection to both tracks was a highly competitive process. We further
note that due to the conference format, many good papers were regrettably
not accepted. Besides the contributed papers, the program also included three
invited presentations by Xiaoyun Wang, Roberts Deng and Moti Yung. The program
also hosted two additional special tracks with presentations that are not
included in these proceedings: one on White-Box Cryptography and Software
Protection, and one on Post-Quantum Cryptography.
Inscrypt 2009 was made possible by the joint efforts of numerous people
and organizations worldwide. We take this opportunity to thank the Program
Committee members and the external experts they employed for their invaluable
help in producing the conference program. We further thank the conference
Organizing Committee, the various sponsors and the conference attendees. Last
but not least, we express our great gratitude to all the authors who submitted
papers to the conference, the invited speakers, the contributors to the special
tracks and the Session Chairs.
December 2009 Feng Bao
Moti Yung

本资源共5个可选网络硬盘链接,5.24 MB。
--------------------------------------------------------------------------------------------------------
回复此楼
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

智能机器人

Robot (super robot)

我们都爱小木虫

相关版块跳转 我要订阅楼主 conanwj 的主题更新
☆ 无星级 ★ 一星级 ★★★ 三星级 ★★★★★ 五星级
普通表情 高级回复(可上传附件)
信息提示
请填处理意见