Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9354)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: SPACE 2015.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (21 papers)
Other volumes
-
Security, Privacy, and Applied Cryptography Engineering
Keywords
- access control
- authentication
- cryptography
- digital rights management
- security and privacy
- algorithms
- cryptanalysis and other attacks
- denial-of-service attacks
- elliptic curves
- embedded systems security
- encryption
- fault attack
- hardware security implementations
- hardware-based security protocols
- infection countermeasure
- malicious design modifications
- profiling attacks
- side-channel analysis and countermeasures
- software security engineering
- stream cipher
About this book
This book constitutes the refereed proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, held in Jaipur, India, in October 2015.
The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The book also contains 4 invited talks in full-paper length. The papers are devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering.
Editors and Affiliations
Bibliographic Information
Book Title: Security, Privacy, and Applied Cryptography Engineering
Book Subtitle: 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings
Editors: Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-24126-5
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-24125-8Published: 13 November 2015
eBook ISBN: 978-3-319-24126-5Published: 24 September 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVIII, 373
Number of Illustrations: 88 illustrations in colour
Topics: Systems and Data Security, Computer Communication Networks, Cryptology, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity