Information Security Theory and Practice

10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Theory and Practice by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319459318
Publisher: Springer International Publishing Publication: September 19, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319459318
Publisher: Springer International Publishing
Publication: September 19, 2016
Imprint: Springer
Language: English

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions.

WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions.

WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.

More books from Springer International Publishing

Cover of the book Raw Data by
Cover of the book Proteomic Methods in Neuropsychiatric Research by
Cover of the book Natural Language Processing and Information Systems by
Cover of the book Encyclopaedia of Historical Metrology, Weights, and Measures by
Cover of the book Simulating Nonlinear Circuits with Python Power Electronics by
Cover of the book The Semantic Web: ESWC 2017 Satellite Events by
Cover of the book G.A.T.C.A. by
Cover of the book Learning and Collaboration Technologies. Designing Learning Experiences by
Cover of the book Robotic Fabrication in Architecture, Art and Design 2016 by
Cover of the book Optimization and Optimal Control in Automotive Systems by
Cover of the book Integration of Reusable Systems by
Cover of the book Mechanics of Composite and Multi-functional Materials, Volume 7 by
Cover of the book Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part I by
Cover of the book White Coat Tales by
Cover of the book Common Eye Diseases and their Management by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy