Information and Communications Security
18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings
Seiten
2016
|
1st ed. 2016
Springer International Publishing (Verlag)
978-3-319-50010-2 (ISBN)
Springer International Publishing (Verlag)
978-3-319-50010-2 (ISBN)
This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.
The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.
IoT security.- Cloud security.- Applied cryptography.- Attack behaviour analytics.- Authentication and authorization.- Engineering issues of cryptographic and security systems.- Privacy protection.- Risk evaluation and security.- Key management and language-based security.- Network security.
| Erscheinungsdatum | 22.12.2016 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XII, 478 p. 83 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Applications • Cloud Storage • Computer Science • conference proceedings • cryptography • cybersecurity • data encryption • data structures • Embedded Security • Formal Method • hardware-based security protocols • Informatics • Informatik • Information Hiding • machine learning • Network Security • privacy protections • public-key encryption • Recommender System • Research • Security analytics • security requirements • security services • social aspects of security and privacy • social engineering attacks • software and application security • trust frameworks • usability in security and privacy |
| ISBN-10 | 3-319-50010-4 / 3319500104 |
| ISBN-13 | 978-3-319-50010-2 / 9783319500102 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2025)
C.H.Beck (Verlag)
CHF 16,80