Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9290)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ISC 2015.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (30 papers)
-
Cryptography I: Signatures
-
System and Software Security
Other volumes
-
Information Security
Keywords
- Applied cryptography
- Biometrics
- Hash function
- Intrusion detection
- Network security
- Access control
- Anonymity
- Authentication
- Cryptanalysis
- Cryptographic protocols
- Distributed key generation
- Formal methods
- Privacy
- secure software
- security
- side channels
- stream cipher
- symmetric encryption
- watermarking
- Web security
About this book
Reviews
Editors and Affiliations
About the editors
Bibliographic Information
Book Title: Information Security
Book Subtitle: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings
Editors: Javier Lopez, Chris J. Mitchell
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-23318-5
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-23317-8Published: 25 August 2015
eBook ISBN: 978-3-319-23318-5Published: 27 August 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 570
Number of Illustrations: 110 b/w illustrations
Topics: Systems and Data Security, Cryptology, Algorithm Analysis and Problem Complexity, Math Applications in Computer Science, Special Purpose and Application-Based Systems, Computers and Society