Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings / [electronic resource] :
edited by Kazuto Ogawa, Katsunari Yoshioka.
- 1st ed. 2016.
- XII, 335 p. 64 illus. online resource.
- Security and Cryptology, 9836 2946-1863 ; .
- Security and Cryptology, 9836 .
System security -- Searchable encryption -- Cryptanalysis -- Permutation and symmetric encryption -- Privacy preserving -- Hardware security -- Post-quantum cryptography -- Paring computation.
This book constitutes the refereed proceedings of the 11th International Workshop on Security, IWSEC 2016, held in Tokyo, Japan, in September 2016. The 15 regular papers and 4 short papers presented in this volume were carefully reviewed and selected from 53 submissions. They were organized in topical sections named: system security; searchable encryption; cryptanalysis; permutation and symmetric encryption; privacy preserving; hardware security; post-quantum cryptography; and paring computation.
9783319445243
10.1007/978-3-319-44524-3 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Application software.
Artificial intelligence.
Computer networks .
Electronic data processing--Management.
Data and Information Security.
Cryptology.
Computer and Information Systems Applications.
Artificial Intelligence.
Computer Communication Networks.
IT Operations.
QA76.9.A25
005.8
System security -- Searchable encryption -- Cryptanalysis -- Permutation and symmetric encryption -- Privacy preserving -- Hardware security -- Post-quantum cryptography -- Paring computation.
This book constitutes the refereed proceedings of the 11th International Workshop on Security, IWSEC 2016, held in Tokyo, Japan, in September 2016. The 15 regular papers and 4 short papers presented in this volume were carefully reviewed and selected from 53 submissions. They were organized in topical sections named: system security; searchable encryption; cryptanalysis; permutation and symmetric encryption; privacy preserving; hardware security; post-quantum cryptography; and paring computation.
9783319445243
10.1007/978-3-319-44524-3 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Application software.
Artificial intelligence.
Computer networks .
Electronic data processing--Management.
Data and Information Security.
Cryptology.
Computer and Information Systems Applications.
Artificial Intelligence.
Computer Communication Networks.
IT Operations.
QA76.9.A25
005.8