Listing 1 - 1 of 1 |
Sort by
|
Choose an application
Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. It is published as Vol. 2442 of the Lecture Notes in Computer Science (LNCS) of Springer Verlag. Note that 2002, 22 and 2442 are all palindromes... (Don’t nod!) Theconferencereceived175submissions,ofwhich40wereaccepted;twos- missionsweremergedintoasinglepaper,yieldingthetotalof39papersaccepted for presentation in the technical program of the conference. In this proceedings volume you will ?nd the revised versions of the 39 papers that were presented at the conference. The submissions represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. In fact, many high-quality works (that surely will be published elsewhere) could not be accepted. This is due to the competitive nature of the conference and the challenging task of selecting a program. I wish to thank the authors of all submitted papers. Indeed, it is the authors of all papers who have made this conference possible, regardless of whether or not their papers were accepted. The conference program was also immensely bene?ted by two plenary talks.
Computer security --- Cryptography --- Computer science. --- Operating systems (Computers). --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Discrete Mathematics in Computer Science. --- Algorithm Analysis and Problem Complexity. --- Operating Systems. --- Management of Computing and Information Systems. --- Mathematics. --- Sécurité informatique --- Cryptographie --- Congresses --- Congrès --- Computational complexity. --- Computer software. --- Information Systems. --- Cryptology. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Software, Computer --- Computer systems --- Complexity, Computational --- Electronic data processing --- Machine theory --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Operating systems --- Protection --- Security measures --- Computer science—Mathematics. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Communication systems --- Foundations --- Cryptography. --- Data protection. --- Discrete mathematics. --- Electronic data processing—Management. --- Data and Information Security. --- IT Operations. --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Operating systems (Computers)
Listing 1 - 1 of 1 |
Sort by
|