Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9311)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: WISTP 2015.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (18 papers)
-
Security and Privacy Services
-
Secure Resource Sharing and Access Control
-
Secure Devices and Execution Environment
Other volumes
-
Information Security Theory and Practice
Keywords
- Cryptography
- Security Services
- Security in Hardware
- Systems Security
- Mobile and Wireless Security
- access control
- anonymity
- countermeasures
- internet of things
- lightweight cryptography
- natural language processing
- network security
- password hashing
- security protocols
- side-channel analysis
- smart home
- trusted computing
- ubiquitous computing
- vulnerability
- Web services
About this book
Editors and Affiliations
Bibliographic Information
Book Title: Information Security Theory and Practice
Book Subtitle: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings
Editors: Raja Naeem Akram, Sushil Jajodia
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-24018-3
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: IFIP International Federation for Information Processing 2015
Softcover ISBN: 978-3-319-24017-6Published: 02 November 2015
eBook ISBN: 978-3-319-24018-3Published: 21 August 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XII, 281
Number of Illustrations: 65 illustrations in colour
Topics: Management of Computing and Information Systems, Cryptology, Computer Systems Organization and Communication Networks, Information Systems Applications (incl. Internet)