Information Security

16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings

Nonfiction, Computers, Programming, Software Development, General Computing
Cover of the book Information Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319276595
Publisher: Springer International Publishing Publication: December 29, 2015
Imprint: Springer Language: English
Author:
ISBN: 9783319276595
Publisher: Springer International Publishing
Publication: December 29, 2015
Imprint: Springer
Language: English

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security, ISC 2013, held in Dallas, Texas, in November 2013.

The 16 revised full papers presented together with 14 short papers were carefully reviewed and selected from 70 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: security of operating systems; secret sharing; encryption; malware and Critical infrastructures; cryptanalysis; block ciphers and stream ciphers; entity authentication; usability & risk perception; access control; computer security; privacy attacks; cryptography.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security, ISC 2013, held in Dallas, Texas, in November 2013.

The 16 revised full papers presented together with 14 short papers were carefully reviewed and selected from 70 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: security of operating systems; secret sharing; encryption; malware and Critical infrastructures; cryptanalysis; block ciphers and stream ciphers; entity authentication; usability & risk perception; access control; computer security; privacy attacks; cryptography.

More books from Springer International Publishing

Cover of the book Radio Frequency Integrated Circuit Design for Cognitive Radio Systems by
Cover of the book The Well-Being of the Labor Force in Colonial Bombay by
Cover of the book Two-Fluid Model Stability, Simulation and Chaos by
Cover of the book Justiciability of Human Rights Law in Domestic Jurisdictions by
Cover of the book Advances in Human Aspects of Transportation by
Cover of the book Mobile and Ubiquitous Systems: Computing, Networking, and Services by
Cover of the book Schooling for Sustainable Development in Europe by
Cover of the book Computer Vision in Control Systems-4 by
Cover of the book FluSHELL – A Tool for Thermal Modelling and Simulation of Windings for Large Shell-Type Power Transformers by
Cover of the book Passivity-Based Control and Estimation in Networked Robotics by
Cover of the book The Diagnosis and Treatment of Male Infertility by
Cover of the book Nonlinear Hamiltonian Mechanics Applied to Molecular Dynamics by
Cover of the book Recent Advances in Computational Optimization by
Cover of the book Visible and Invisible Whiteness by
Cover of the book Advances in Analysis and Design of Deep Foundations by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy