Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9065)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ISPEC 2015.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (39 papers)
-
Stream cipher I
-
Key Exchange Protocol
-
Elliptic Curve Cryptography
Other volumes
-
Information Security Practice and Experience
Keywords
- Authentication
- Authorization
- Cloud computing
- Database and storage security
- Digital signature
- Distributed computation
- Encryption
- Information security
- Key management
- Mathematical foundations of cryptography
- Network security
- Public key encryption
- Reverse engineering
- Security and privacy
- Security in hardware
- Security services
- Side-channel analysis
- Stream cyphers
- Symmetric cryptography and hash functions
- Systems security
About this book
The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.
Editors and Affiliations
Bibliographic Information
Book Title: Information Security Practice and Experience
Book Subtitle: 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings
Editors: Javier Lopez, Yongdong Wu
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-17533-1
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-17532-4Published: 20 April 2015
eBook ISBN: 978-3-319-17533-1Published: 08 April 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 576
Number of Illustrations: 76 b/w illustrations
Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems