Editors:
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8565)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ICISC: International Conference on Information Security and Cryptology
Conference proceedings info: ICISC 2013.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (31 papers)
-
Front Matter
-
Proxy Re-encryption
-
Front Matter
-
-
Side Channel Analysis and Its Countermeasures
-
Front Matter
-
-
Embedded System Security and Its Implementation
-
Front Matter
-
About this book
Editors and Affiliations
-
EWHA Womans University, Seoul, Korea, Republic of (South Korea)
Hyang-Sook Lee
-
Kookmin University, Seoul, Korea, Republic of (South Korea)
Dong-Guk Han
Bibliographic Information
Book Title: Information Security and Cryptology -- ICISC 2013
Book Subtitle: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers
Editors: Hyang-Sook Lee, Dong-Guk Han
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-12160-4
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2014
Softcover ISBN: 978-3-319-12159-8Published: 31 October 2014
eBook ISBN: 978-3-319-12160-4Published: 18 October 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 538
Number of Illustrations: 94 b/w illustrations
Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems