Information security [electronic resource] : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings / Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu (eds.).
2014
QA76.9.A25
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Linked e-resources
Linked Resource
Details
Title
Information security [electronic resource] : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings / Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu (eds.).
ISBN
9783319132570 electronic book
3319132571 electronic book
9783319132563
3319132563
3319132571 electronic book
9783319132563
3319132563
Published
Cham ; Heidelberg : Springer, 2014.
Language
English
Description
1 online resource (PDF, XVIII, 569 pages) : illustrations.
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.
Bibliography, etc. Note
Includes bibliographical references and index.
Access Note
Access limited to authorized users.
Added Author
Series
Lecture notes in computer science ; 8783.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Linked Resources
Record Appears in
Table of Contents
Public-Key Encryption
Authentication
Symmetric Key Cryptography
Zero-Knowledge Proofs and Arguments
Outsourced and Multi-party Computations
Implementation
Information Leakage
Firewall and Forensics
Web Security
Android Security.
Authentication
Symmetric Key Cryptography
Zero-Knowledge Proofs and Arguments
Outsourced and Multi-party Computations
Implementation
Information Leakage
Firewall and Forensics
Web Security
Android Security.