Sold by Mighty Ape
This book constitutes the refereed proceedings of the Second International Conference on Information and Communication Security, ICICS’99, held in Sydney, Australia in November 1999. The 24 revised full papers presented were carefully reviewed and selected from a total of 62 submissions. The book is divided in topical sections on cryptanalysis, language-based approaches to security, electronic commerce and secret sharing, digital signatures, security protocols, applications, cryptography, and complexity and security functions.
We are committed to protecting your rights under the Consumer Guarantees Act and working with our suppliers to assist with warranty claims. Products sold by Mighty Ape will be covered by a Manufacturer's Warranty for at least a one-year period from the date of purchase.
Your warranty will cover any manufacturing defects which, if existing, will present themselves within this warranty period.
Your warranty will not cover normal wear and tear, faults caused by misuse, and accidents which cause damage or theft caused after delivery. Using the product in a way it is not designed for will void your warranty.
Please refer to our Help Centre for more information.