Information security : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings / Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 8783. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham ; Heidelberg : Springer, 2014Description: 1 online resource (PDF, XVIII, 569 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783319132570
- 3319132571
- ISC 2014
- Computer security -- Congresses
- Data protection -- Congresses
- Data encryption (Computer science) -- Congresses
- Computer science
- Software engineering
- Computer software
- Electronic Data Processing
- Software
- Sécurité informatique -- Congrès
- Protection de l'information (Informatique) -- Congrès
- Chiffrement (Informatique) -- Congrès
- Informatique
- Génie logiciel
- Logiciels
- software
- Computer science
- Computer security
- Computer software
- Data encryption (Computer science)
- Data protection
- Software engineering
- computerwetenschappen
- computer sciences
- wiskunde
- mathematics
- algoritmen
- algorithms
- computeranalyse
- computer analysis
- systemen
- systems
- computers
- samenleving
- society
- gegevensbeheer
- data management
- Information and Communication Technology (General)
- Informatie- en communicatietechnologie (algemeen)
- 005.8 23
- QA76.9.A25
- 54.62
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes bibliographical references and index.
Public-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs and Arguments -- Outsourced and Multi-party Computations -- Implementation -- Information Leakage -- Firewall and Forensics -- Web Security -- Android Security.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.