Foundations and Practice of Security: 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers

Author:   Joaquin Garcia-Alfaro ,  Evangelos Kranakis ,  Guillaume Bonfante
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2016
Volume:   9482
ISBN:  

9783319303024


Pages:   323
Publication Date:   25 February 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Foundations and Practice of Security: 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers


Add your own review!

Overview

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Foundations and Practice of Security, FPS 2015, held in Clermont-Ferrand, France, in October 2015. The 12 revised full papers presented together with 8 short papers and 2 keynote talks were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on RFID, sensors and secure computation; security policies and biometrics; evaluation of protocols and obfuscation security; spam emails, botnets and malware.

Full Product Details

Author:   Joaquin Garcia-Alfaro ,  Evangelos Kranakis ,  Guillaume Bonfante
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2016
Volume:   9482
Dimensions:   Width: 15.50cm , Height: 1.80cm , Length: 23.50cm
Weight:   5.095kg
ISBN:  

9783319303024


ISBN 10:   3319303023
Pages:   323
Publication Date:   25 February 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

RFID, sensors and secure computation.- Security policies and biometrics.- Evaluation of protocols and obfuscation security.- Spam emails, botnets and malware.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List