Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10144)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: WISA 2016.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (33 papers)
Other volumes
-
Information Security Applications
Keywords
- biometrics
- cyber security
- embedded system
- security and privacy
- Web security
- artificial neural networ
- authentication
- cellular networks
- cryptolotgy
- data encryption
- database and storage security
- evolutionary computation
- machine learning
- network security
- public key cryptography
- soft computing
- software and application security
- systems and data security
- systems security
About this book
The 31 revised full papers including two invited talks presented in this volume were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections such as network security, threat analysis, application security, cryptographic. Protocols, cryptanalysis, cryptographic implementations, authentication using bio and ML, authentication, ICT Convergent security
Editors and Affiliations
Bibliographic Information
Book Title: Information Security Applications
Book Subtitle: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers
Editors: Dooho Choi, Sylvain Guilley
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-56549-1
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing AG 2017
Softcover ISBN: 978-3-319-56548-4Published: 30 March 2017
eBook ISBN: 978-3-319-56549-1Published: 29 March 2017
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XI, 398
Number of Illustrations: 157 b/w illustrations
Topics: Systems and Data Security, Cryptology, Computer Communication Networks, Management of Computing and Information Systems, Artificial Intelligence