Information Security and Cryptology - ICISC 2014

17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security and Cryptology - ICISC 2014 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319159430
Publisher: Springer International Publishing Publication: March 16, 2015
Imprint: Springer Language: English
Author:
ISBN: 9783319159430
Publisher: Springer International Publishing
Publication: March 16, 2015
Imprint: Springer
Language: English

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.

More books from Springer International Publishing

Cover of the book Cryptography and Information Security in the Balkans by
Cover of the book Principles and Practice of Constraint Programming by
Cover of the book Syngas Production: Status and Potential for Implementation in Russian Industry by
Cover of the book Advances in Cryptology – EUROCRYPT 2019 by
Cover of the book Estuaries: A Lifeline of Ecosystem Services in the Western Indian Ocean by
Cover of the book Heidegger and the Lived Experience of Being a University Educator by
Cover of the book Mathematical and Numerical Methods for Partial Differential Equations by
Cover of the book Biology of Microorganisms on Grapes, in Must and in Wine by
Cover of the book Advances in Databases and Information Systems by
Cover of the book Complicated War Trauma and Care of the Wounded by
Cover of the book The Palgrave Handbook of Shakespeare's Queens by
Cover of the book External Thermal Insulation Composite Systems (ETICS) by
Cover of the book Leadership Today by
Cover of the book Bacteriophages: Practical Applications for Nature's Biocontrol by
Cover of the book Star Trek and the Politics of Globalism by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy