Information Systems Security [electronic resource] : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti.
Material type: TextSeries: Security and Cryptology ; 10063 | Lecture Notes in Computer Science ; 10063Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Edition: 1st ed. 2016Description: XV, 544 p. 134 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783319498065Subject(s): Computer security | Data protection | Data encryption (Computer science) | Computer communication systems | Algorithms | Management information systems | Computer science | Systems and Data Security | Security | Cryptology | Computer Communication Networks | Algorithm Analysis and Problem Complexity | Management of Computing and Information SystemsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access onlineCurrent library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK14295 |
Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security. .
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. .
There are no comments on this title.