Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9241)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: IWSEC 2015.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (21 papers)
-
Identity-Based Encryption
-
Elliptic Curve Cryptography
-
Factoring
-
Symmetric Cryptanalysis
-
LWE-Based Encryption
Other volumes
-
Advances in Information and Computer Security
Keywords
- cryptographic protocols
- digital forensics
- formal methods
- privacy preserving data mining
- real world cryptography
- authenticated encryption
- cryptanalysis
- electronic voting
- elliptic curve cryptography
- hash function
- information security
- pairings
- performance
- public key encryption
- secure multiparty computation
- security visualization
- software and system security for big data
- spoofing
- tag-based encryption
- the meet-in-the-middle preimage attack
About this book
Editors and Affiliations
Bibliographic Information
Book Title: Advances in Information and Computer Security
Book Subtitle: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings
Editors: Keisuke Tanaka, Yuji Suga
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-22425-1
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-22424-4Published: 04 August 2015
eBook ISBN: 978-3-319-22425-1Published: 20 August 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 357
Number of Illustrations: 51 b/w illustrations
Topics: Systems and Data Security, Cryptology, Discrete Mathematics in Computer Science, Algorithm Analysis and Problem Complexity, Computer Communication Networks