Skip to main content
Book cover

Information Security and Cryptology -- ICISC 2012

15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

  • Conference proceedings
  • © 2013

Overview

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7839)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ICISC 2012.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (36 papers)

  1. Invited Papers

  2. Attack and Defense

  3. Software and Web Security

  4. Cryptanalysis I

  5. Cryptographic Protocol

  6. Identity-Based Encryption

  7. Efficient Implementation

Other volumes

  1. Information Security and Cryptology – ICISC 2012

Keywords

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.

Editors and Affiliations

  • Department of Computer Engineering, Sejong University, Seoul, Korea

    Taekyoung Kwon

  • School of Computer Science and Engineering, Inha University, Incheon, Korea

    Mun-Kyu Lee

  • National Security Research Institute, Daejeon, Korea

    Daesung Kwon

Bibliographic Information

  • Book Title: Information Security and Cryptology -- ICISC 2012

  • Book Subtitle: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

  • Editors: Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-37682-5

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2013

  • Softcover ISBN: 978-3-642-37681-8Published: 17 April 2013

  • eBook ISBN: 978-3-642-37682-5Published: 03 April 2013

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 512

  • Number of Illustrations: 108 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems

Publish with us