Fr. 70.00

Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.

List of contents

Public-Key Encryption.- Authentication.- Symmetric Key Cryptography.- Zero-Knowledge Proofs and Arguments.- Outsourced and Multi-party Computations.- Implementation.- Information Leakage.- Firewall and Forensics.- Web Security.- Android Security.

Summary

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.

Product details

Assisted by Lucas C K Hui et al (Editor), Ja Camenisch (Editor), Jan Camenisch (Editor), Sherman S. M. Chow (Editor), Sherman S.M. Chow (Editor), Lucas C. K. Hui (Editor), Lucas C.K. Hui (Editor), Siu Ming Yiu (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.01.2014
 
EAN 9783319132563
ISBN 978-3-31-913256-3
No. of pages 570
Dimensions 160 mm x 230 mm x 31 mm
Weight 879 g
Illustrations XVIII, 570 p. 95 illus.
Series Lecture Notes in Computer Science
Lecture Notes in Artificial Intelligence
Security and Cryptology
Lecture Notes in Computer Science / Security and Cryptology
Lecture Notes in Computer Science
Lecture Notes in Artificial Intelligence
Security and Cryptology
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

C, Algorithmen und Datenstrukturen, Netzwerksicherheit, Algorithms, Kodierungstheorie und Verschlüsselung (Kryptologie), Kryptografie, Verschlüsselungstechnologie, Theoretische Informatik, Wissensbasierte Systeme, Expertensysteme, computer science, Systems and Data Security, Data and Information Security, Computers and Society, Mathematical Applications in Computer Science, Algorithms & data structures, Network Security, Ethical & social aspects of IT, Computer security, Computers and civilization, Mathematical & statistical software, Coding theory & cryptology, Computer science—Mathematics, Maths for computer scientists, Math Applications in Computer Science, Algorithm Analysis and Problem Complexity, Expert systems / knowledge-based systems, Data encryption, Data encryption (Computer science), Cryptology, Special purpose computers, Special Purpose and Application-Based Systems

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.