Publisher's Synopsis
This book constitutes the refereed proceedings of the Third International Information Security Practice and Experience Conference. The 24 revised full papers presented with two invited papers cover cryptanalysis, signatures, network security and security management, privacy and applications, cryptographic algorithms and implementations, authentication and key management, as well as cryptosystems.