Constitutes the refereed proceedings of the First International Conference on Information Systems Security, ICISS 2005. This book discusses the state of the research and practice in information systems security. It covers such topics as: authentication and access control, mobile code security, key management and cryptographic protocols, and more.
Constitutes the refereed proceedings of the First International Conference on Information Systems Security, ICISS 2005. This book discusses the state ...