Editors:
- Up-to-date results
- Fast track conference proceedings
- State-of-the-art report
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8958)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ICICS: International Conference on Information and Communications Security
Conference proceedings info: ICICS 2014.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (22 papers)
-
Front Matter
About this book
Keywords
- Access control
- Applied cryptography
- Authentication
- Cryptography
- Digital signature
- Dual encryption system
- E-coin
- Elliptic curve cryptography
- Information security
- Network security
- Oblivious transfer
- One-time password
- Privacy protection
- Provably secure
- Secure applications
- Secure protocols
- Secure systems
- Security
- Security proofs
- Side-channel analysis
Editors and Affiliations
-
The University of Hong Kong, Hong Kong, China
Lucas C. K. Hui, S. M. Yiu
-
Peking University, Beijing, China
S. H. Qing
-
University of Maryland, College Park, USA
Elaine Shi
Bibliographic Information
Book Title: Information and Communications Security
Book Subtitle: 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
Editors: Lucas C. K. Hui, S. H. Qing, Elaine Shi, S. M. Yiu
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-21966-0
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-21965-3Published: 11 August 2015
eBook ISBN: 978-3-319-21966-0Published: 01 August 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 321
Number of Illustrations: 52 b/w illustrations
Topics: Cryptology, Systems and Data Security, Algorithm Analysis and Problem Complexity, Computer Communication Networks, Management of Computing and Information Systems, Computers and Society