Information Security Practice and Experience

14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Practice and Experience by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319998077
Publisher: Springer International Publishing Publication: September 17, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783319998077
Publisher: Springer International Publishing
Publication: September 17, 2018
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018.
The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols. 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018.
The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols. 

More books from Springer International Publishing

Cover of the book The Path to a Modern Economics by
Cover of the book Quantitative Parameterization and 3D‐run‐out Modelling of Rockfalls at Steep Limestone Cliffs in the Bavarian Alps by
Cover of the book PET/CT in Hepatobiliary and Pancreatic Malignancies by
Cover of the book The Search for Better Educational Standards by
Cover of the book Coordination, Organizations, Institutions, and Norms in Agent Systems IX by
Cover of the book Globular Cluster Binaries and Gravitational Wave Parameter Estimation by
Cover of the book Information Security and Cryptology -- ICISC 2013 by
Cover of the book Cognitive Wireless Networks Using the CSS Technology by
Cover of the book Key Factors of Combustion by
Cover of the book Social-Emotional Prevention Programs for Preschool Children's Behavior Problems by
Cover of the book Guide to Computer Network Security by
Cover of the book Civil Society, Rhetoric of Resistance, and Transatlantic Trade by
Cover of the book INCREaSE by
Cover of the book Stress Concentration at Notches by
Cover of the book The 1772–73 British Credit Crisis by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy