Sold by Mighty Ape
This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS ’97, held in Beijing, China in November 1997.
The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.
We are committed to protecting your rights under the Consumer Guarantees Act and working with our suppliers to assist with warranty claims. Products sold by Mighty Ape will be covered by a Manufacturer's Warranty for at least a one-year period from the date of purchase.
Your warranty will cover any manufacturing defects which, if existing, will present themselves within this warranty period.
Your warranty will not cover normal wear and tear, faults caused by misuse, and accidents which cause damage or theft caused after delivery. Using the product in a way it is not designed for will void your warranty.
Please refer to our Help Centre for more information.
Save with Primate
Earn $1.61 Points Credit*
Exclusive Deals
Mighty Ape Travel discount
^FREE 14 day trial. Primate will be charged $89 / 365 days after free trial, cancel anytime. Delivery benefits available in selected postcodes only. †*T&Cs apply, click for details.