Information security and cryptology -- ICISC 2015 [electronic resource] : 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised selected papers / Soonhak Kwon, Aaram Yun (eds.).
2016
QA76.9.A25
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Information security and cryptology -- ICISC 2015 [electronic resource] : 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised selected papers / Soonhak Kwon, Aaram Yun (eds.).
Meeting Name
ISBN
9783319308401 (electronic book)
3319308408 (electronic book)
9783319308395
3319308408 (electronic book)
9783319308395
Published
Cham : Springer, 2016.
Language
English
Description
1 online resource (xiii, 374 pages) : color illustrations.
Item Number
10.1007/978-3-319-30840-1 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security and Cryptology, ICISC 2015, held in Seoul, South Korea, in November 2015. The 23 revised full papers presented were carefully selected from 84 submissions during two rounds of reviewing and improvement. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are grouped around the following topics: digital signatures; public-key cryptography; block cipher cryptanalysis; elliptic curve cryptography; protocols; security; side-channel attacks.
Note
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed March 15, 2016).
Added Author
Series
Lecture notes in computer science ; 9558.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Linked Resources
Record Appears in
Table of Contents
Digital signatures
Public-key cryptography
Block cipher cryptanalysis.-Elliptic curve cryptography
Protocols
Security
Side-channel attacks.
Public-key cryptography
Block cipher cryptanalysis.-Elliptic curve cryptography
Protocols
Security
Side-channel attacks.