Editors:
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8949)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ICISC: International Conference on Information Security and Cryptology
Conference proceedings info: ICISC 2014.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (26 papers)
-
Front Matter
-
Public Key Cryptography
-
Front Matter
-
About this book
Keywords
- AES
- Application Plagiarism
- Ciphers
- Cryptanalysis
- Cryptographic Protocols
- Data Hiding
- Digital Watermarking
- Embedded Systems
- Fault Analysis
- Fingerprint
- Formal Methods
- Hash Functions
- Oblivious Transfer
- Phishing
- Post-Quantum Cryptography
- Provable Security
- Public-Key Cryptography
- Security Model
- Side-Channel Analysis
- Social Network Security
Editors and Affiliations
-
Sejong University, Seoul, Korea, Republic of (South Korea)
Jooyoung Lee
-
Kookmin University, Seoul, Korea, Republic of (South Korea)
Jongsung Kim
Bibliographic Information
Book Title: Information Security and Cryptology - ICISC 2014
Book Subtitle: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers
Editors: Jooyoung Lee, Jongsung Kim
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-15943-0
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-15942-3Published: 27 March 2015
eBook ISBN: 978-3-319-15943-0Published: 16 March 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 448
Number of Illustrations: 83 b/w illustrations
Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems