Information Security and Cryptology -- ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

Author:   Taekyoung Kwon ,  Mun-Kyu Lee ,  Daesung Kwon
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2013 ed.
Volume:   7839
ISBN:  

9783642376818


Pages:   512
Publication Date:   17 April 2013
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $155.22 Quantity:  
Add to Cart

Share |

Information Security and Cryptology -- ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers


Add your own review!

Overview

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.

Full Product Details

Author:   Taekyoung Kwon ,  Mun-Kyu Lee ,  Daesung Kwon
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2013 ed.
Volume:   7839
Dimensions:   Width: 15.50cm , Height: 2.70cm , Length: 23.50cm
Weight:   7.898kg
ISBN:  

9783642376818


ISBN 10:   3642376819
Pages:   512
Publication Date:   17 April 2013
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Attack and defense.- Software and Web security.- Cryptanalysis.- Cryptographic protocol.- Identity-based encryption.- Efficient implementation.- Cloud computing security.- Side channel analysis.- Digital signature.- Privacy enhancement.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List