Abstract

The following topics were dealt with: intrusion detection; digital rights management; symmetric-key cryptography; cryptographic protocols; identify-based cryptography; cryptanalysis; network security; software obfuscation; public-key cryptosystems; elliptic curves; database security and privacy.

Details

Actions