Information and Communications Security
18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings
Seiten
2016
|
1st ed. 2016
Springer International Publishing (Verlag)
978-3-319-50010-2 (ISBN)
Springer International Publishing (Verlag)
978-3-319-50010-2 (ISBN)
This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.
The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.
IoT security.- Cloud security.- Applied cryptography.- Attack behaviour analytics.- Authentication and authorization.- Engineering issues of cryptographic and security systems.- Privacy protection.- Risk evaluation and security.- Key management and language-based security.- Network security.
Erscheinungsdatum | 22.12.2016 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 478 p. 83 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Applications • Cloud Storage • Computer Science • conference proceedings • cryptography • cybersecurity • data encryption • data structures • Embedded Security • Formal Method • hardware-based security protocols • Informatics • Informatik • Information Hiding • machine learning • Network Security • privacy protections • public-key encryption • Recommender System • Research • Security analytics • security requirements • security services • social aspects of security and privacy • social engineering attacks • software and application security • trust frameworks • usability in security and privacy |
ISBN-10 | 3-319-50010-4 / 3319500104 |
ISBN-13 | 978-3-319-50010-2 / 9783319500102 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €