1 option
Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 10063.
- Security and Cryptology ; 10063
- Language:
- English
- Subjects (All):
- Computer security.
- Data protection.
- Data encryption (Computer science).
- Computer networks.
- Algorithms.
- Management information systems.
- Computer science.
- Systems and Data Security.
- Security.
- Cryptology.
- Computer Communication Networks.
- Algorithm Analysis and Problem Complexity.
- Management of Computing and Information Systems.
- Local Subjects:
- Systems and Data Security.
- Security.
- Cryptology.
- Computer Communication Networks.
- Algorithm Analysis and Problem Complexity.
- Management of Computing and Information Systems.
- Physical Description:
- 1 online resource (XV, 544 pages) : 134 illustrations.
- Edition:
- First edition 2016.
- Contained In:
- Springer eBooks
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2016.
- System Details:
- text file PDF
- Summary:
- This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. .
- Contents:
- Attacks and mitigation
- Authentication
- Authorization and information flow control
- Crypto systems and protocols
- Network security and intrusion detection
- Privacy
- Software security
- Wireless, mobile and IoT security. .
- Other Format:
- Printed edition:
- ISBN:
- 978-3-319-49806-5
- 9783319498065
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.