Information Security
17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings
(Sprache: Englisch)
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
The 20 revised full papers presented together with 16 short papers and two invited papers...
The 20 revised full papers presented together with 16 short papers and two invited papers...
Voraussichtlich lieferbar in 3 Tag(en)
versandkostenfrei
Buch (Kartoniert)
53.49 €
Produktdetails
Produktinformationen zu „Information Security “
Klappentext zu „Information Security “
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.
Inhaltsverzeichnis zu „Information Security “
Public-Key Encryption.- Authentication.- Symmetric Key Cryptography.- Zero-Knowledge Proofs and Arguments.- Outsourced and Multi-party Computations.- Implementation.- Information Leakage.- Firewall and Forensics.- Web Security.- Android Security.Bibliographische Angaben
- 2014, 2014, XVIII, 570 Seiten, Maße: 15,5 x 23,5 cm, Kartoniert (TB), Englisch
- Herausgegeben: Sherman S. M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
- Verlag: Springer, Berlin
- ISBN-10: 3319132563
- ISBN-13: 9783319132563
- Erscheinungsdatum: 20.11.2014
Sprache:
Englisch
Kommentar zu "Information Security"
0 Gebrauchte Artikel zu „Information Security“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Information Security".
Kommentar verfassen