2. ICISS 2006: Kolkata, India

Invited Papers

Data and Application Security

Access Control

Key Management and Security in Wireless Networks

Threat Analysis, Detection and Recovery

Cryptography and Encryption

Short Papers and Research Reports