Fr. 69.00

Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.
The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.

List of contents

System Security.- Stream Cipher.- Analysis.- Key Exchange Protocol.- Elliptic Curve Cryptography.- Authentication.- Attribute-Based Encryption.- Mobile Security.- Theory.- Implementation.- Privacy and Indistinguishability.

Summary

This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.
The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.

Product details

Assisted by Javie Lopez (Editor), Javier Lopez (Editor), WU (Editor), Wu (Editor), Yongdong Wu (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.01.2015
 
EAN 9783319175324
ISBN 978-3-31-917532-4
No. of pages 576
Dimensions 158 mm x 233 mm x 32 mm
Weight 885 g
Illustrations XIV, 576 p. 76 illus.
Series Lecture Notes in Computer Science
Information Systems and Applications, incl. Internet/Web, and HCI
Security and Cryptology
Lecture Notes in Computer Science / Security and Cryptology
Lecture Notes in Computer Science
Security and Cryptology
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.