Return to home page
Searching: Muskingum library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
Conference ISC (Conference : Information security) (17th : 2014 : Hong Kong, China)
Title Information security : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings / Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu (eds.).
Imprint Cham ; Heidelberg : Springer, 2014.

View online
View online
Conference ISC (Conference : Information security) (17th : 2014 : Hong Kong, China)
Series Lecture notes in computer science, 1611-3349 ; 8783. SL 4, Security and cryptology
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8783. 1611-3349
LNCS sublibrary. SL 4, Security and cryptology.
Subject Computer security -- Congresses.
Data protection -- Congresses.
Data encryption (Computer science) -- Congresses.
Computer science.
Software engineering.
Computer software.
Alt Name Chow, Sherman S. M.,
Camenisch, Jan,
Hui, Lucas Chi-Kwong, 1964-
Yiu, Siu Ming,
Add Title ISC 2014
Description 1 online resource (PDF, XVIII, 569 pages) : illustrations.
Bibliography Note Includes bibliographical references and index.
Contents Public-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs and Arguments -- Outsourced and Multi-party Computations -- Implementation -- Information Leakage -- Firewall and Forensics -- Web Security -- Android Security.
Summary This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.
ISBN 9783319132570 (electronic bk.)
3319132571 (electronic bk.)
ISBN/ISSN 10.1007/978-3-319-13257-0
OCLC # 894571058
Additional Format Printed edition: 9783319132563

If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team