1 option
Information Security : 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings / edited by Yvo Desmedt.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 7807.
- Security and Cryptology ; 7807
- Language:
- English
- Subjects (All):
- Software engineering.
- Computer logic.
- Programming languages (Electronic computers).
- Logic, Symbolic and mathematical.
- Artificial intelligence.
- Computer networks.
- Software Engineering.
- Logics and Meanings of Programs.
- Programming Languages, Compilers, Interpreters.
- Mathematical Logic and Formal Languages.
- Artificial Intelligence.
- Computer Communication Networks.
- Local Subjects:
- Software Engineering.
- Logics and Meanings of Programs.
- Programming Languages, Compilers, Interpreters.
- Mathematical Logic and Formal Languages.
- Artificial Intelligence.
- Computer Communication Networks.
- Physical Description:
- 1 online resource (XIV, 418 pages) : 52 illustrations in color.
- Edition:
- First edition 2015.
- Contained In:
- Springer eBooks
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2015.
- System Details:
- text file PDF
- Summary:
- This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security, ISC 2013, held in Dallas, Texas, in November 2013. The 16 revised full papers presented together with 14 short papers were carefully reviewed and selected from 70 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: security of operating systems; secret sharing; encryption; malware and Critical infrastructures; cryptanalysis; block ciphers and stream ciphers; entity authentication; usability and risk perception; access control; computer security; privacy attacks; cryptography.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-319-27659-5
- 9783319276595
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.