Information Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings by Javier LopezInformation Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings by Javier Lopez

Information Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11…

byJavier LopezEditorChris J. Mitchell

Paperback | August 25, 2015

Pricing and Purchase Info

$104.20 online 
$124.50 list price save 16%
Earn 521 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.
Title:Information Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11…Format:PaperbackDimensions:570 pagesPublished:August 25, 2015Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3319233173

ISBN - 13:9783319233178

Reviews

Table of Contents

    

Editorial Reviews

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.