Information Security [electronic resource] : 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings / edited by Yvo Desmedt.
Contributor(s): Desmedt, Yvo [editor.] | SpringerLink (Online service).
Material type: BookSeries: Lecture Notes in Computer Science: 7807Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Edition: 1st ed. 2015.Description: XIV, 418 p. 52 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319276595.Subject(s): Computer science | Computer communication systems | Software engineering | Programming languages (Electronic computers) | Computer logic | Mathematical logic | Artificial intelligence | Computer Science | Software Engineering | Logics and Meanings of Programs | Programming Languages, Compilers, Interpreters | Mathematical Logic and Formal Languages | Artificial Intelligence (incl. Robotics) | Computer Communication NetworksAdditional physical formats: Printed edition:: No titleDDC classification: 005.1 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security, ISC 2013, held in Dallas, Texas, in November 2013. The 16 revised full papers presented together with 14 short papers were carefully reviewed and selected from 70 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: security of operating systems; secret sharing; encryption; malware and Critical infrastructures; cryptanalysis; block ciphers and stream ciphers; entity authentication; usability & risk perception; access control; computer security; privacy attacks; cryptography.This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security, ISC 2013, held in Dallas, Texas, in November 2013. The 16 revised full papers presented together with 14 short papers were carefully reviewed and selected from 70 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: security of operating systems; secret sharing; encryption; malware and Critical infrastructures; cryptanalysis; block ciphers and stream ciphers; entity authentication; usability & risk perception; access control; computer security; privacy attacks; cryptography.
There are no comments for this item.