Information Security Theory and Practice

10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Theory and Practice by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319459318
Publisher: Springer International Publishing Publication: September 19, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319459318
Publisher: Springer International Publishing
Publication: September 19, 2016
Imprint: Springer
Language: English

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions.

WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions.

WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.

More books from Springer International Publishing

Cover of the book Advances in Swarm Intelligence by
Cover of the book The Mathematical Theory of Time-Harmonic Maxwell's Equations by
Cover of the book Aggregation Functions in Theory and in Practice by
Cover of the book Capturing Connectivity and Causality in Complex Industrial Processes by
Cover of the book Advanced Treatment Technologies for Urban Wastewater Reuse by
Cover of the book Biofertilizers for Sustainable Agriculture and Environment by
Cover of the book Engineering Graphics by
Cover of the book Controllability and Minimum Energy Control by
Cover of the book Complex Networks IX by
Cover of the book Gender Justice, Education and Equality by
Cover of the book The Non-Reificatory Approach to Belief by
Cover of the book Coastal Change, Ocean Conservation and Resilient Communities by
Cover of the book Cardiac Cytoarchitecture by
Cover of the book International Money Laundering Through Real Estate and Agribusiness by
Cover of the book Dynamical Systems: Theoretical and Experimental Analysis by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy