Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I / [electronic resource] :
edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl.
- 1st ed. 2015.
- XVIII, 543 p. 114 illus. in color. online resource.
- Security and Cryptology, 9326 2946-1863 ; .
- Security and Cryptology, 9326 .
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security. .
9783319241746
10.1007/978-3-319-24174-6 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Algorithms.
Computers and civilization.
Data and Information Security.
Cryptology.
IT Operations.
Algorithms.
Computers and Society.
QA76.9.A25
005.8
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security. .
9783319241746
10.1007/978-3-319-24174-6 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Algorithms.
Computers and civilization.
Data and Information Security.
Cryptology.
IT Operations.
Algorithms.
Computers and Society.
QA76.9.A25
005.8