| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465525403316 |
|
|
Titolo |
Information Systems Security [[electronic resource] ] : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / / edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2016.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XV, 544 p. 134 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 10063 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Data protection |
Data encryption (Computer science) |
Computer communication systems |
Algorithms |
Management information systems |
Computer science |
Systems and Data Security |
Security |
Cryptology |
Computer Communication Networks |
Algorithm Analysis and Problem Complexity |
Management of Computing and Information Systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security. . |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and |
|
|
|
|
|
|
|
|
|
|
8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. . |
|
|
|
|
|
| |