Information Security: 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings | SpringerLink
Skip to main content

Information Security

4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings

  • Conference proceedings
  • © 2001

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2200)

This is a preview of subscription content, log in via an institution to check access.

Access this book

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas. The conference, an outgrowth of the Information Security Workshop (ISW) series, was held in Málaga, Spain, on October 1–3, 2001. Previous workshops were ISW '97 at Ishikawa, Japan; ISW '99 at Kuala Lumpur, Malaysia; and ISW 2000 at Wollongong, Australia. The General Co chairs, Javier López and Eiji Okamoto, oversaw the local organization, registration, and performed many other tasks. Many individuals deserve thanks for their contribution to the success of the conference. José M. Troya was the Conference Chair. The General Co chairs were assisted with local arrangements by Antonio Maña, Carlos Maraval, Juan J. Ortega, José M. Sierra, and Miguel Soriano. This was the first year that the conference accepted electronic submissions. Many thanks to Dawn Gibson for assisting in developing and maintaining the electronic submission servers. The conference received 98 submissions of which 37 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. Revisions were not checked and the authors bear full responsibility for the contents of their papers. The Program Committee consisted of Elisa Bertino, Università di Milano; G. R.

Keywords

Table of contents (37 papers)

  1. Key Distribution

  2. Protocols

  3. Enhancing Technologies

  4. Privacy

  5. Software Protection

  6. Message Hiding I

  7. PKI Issues and Protocols

  8. Hardware Implementations

  9. Cryptanalysis and Prevention

Editors and Affiliations

  • Department of EECS, University of Wisconsin-Milwaukee, Milwaukee, USA

    George I. Davida

  • Techtegrity, LLC, Westfield, USA

    Yair Frankel

Bibliographic Information

Publish with us