Advances in Information and Computer Security [electronic resource] : 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings / edited by Keisuke Tanaka, Yuji Suga.
Material type: TextSeries: Security and Cryptology ; 9241 | Lecture Notes in Computer Science ; 9241Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Edition: 1st ed. 2015Description: XIII, 357 p. 51 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783319224251Subject(s): Computer security | Data encryption (Computer science) | Computer science—Mathematics | Algorithms | Computer communication systems | Systems and Data Security | Cryptology | Discrete Mathematics in Computer Science | Algorithm Analysis and Problem Complexity | Computer Communication NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable security; LWE-based encryption; privacy-preserving and anonymity; secure protocol; systems security; and security in hardware.Current library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK13962 |
This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable security; LWE-based encryption; privacy-preserving and anonymity; secure protocol; systems security; and security in hardware.
There are no comments on this title.