TY - GEN N2 - This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. . DO - 10.1007/978-3-319-49806-5 DO - doi AB - This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. . T1 - Information Systems Security12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / AU - Ray, Indrajit. AU - Gaur, Manoj Singh. AU - Conti, Mauro. AU - Sanghi, Dheeraj. AU - Kamakoti, V. VL - 10063 CN - QA76.9.A25 ID - 771405 KW - Computer science. KW - Computer networks. KW - Computer security. KW - Data encryption (Computer science) KW - Algorithms. KW - Management information systems. SN - 9783319498065 SN - 3319498061 TI - Information Systems Security12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / LK - https://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-49806-5 UR - https://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-49806-5 ER -