Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers / [electronic resource] :
edited by Joaquin Garcia-Alfaro, Evangelos Kranakis, Guillaume Bonfante.
- 1st ed. 2016.
- XII, 323 p. 51 illus. in color. online resource.
- Security and Cryptology, 9482 2946-1863 ; .
- Security and Cryptology, 9482 .
RFID, sensors and secure computation -- Security policies and biometrics -- Evaluation of protocols and obfuscation security -- Spam emails, botnets and malware.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Foundations and Practice of Security, FPS 2015, held in Clermont-Ferrand, France, in October 2015. The 12 revised full papers presented together with 8 short papers and 2 keynote talks were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on RFID, sensors and secure computation; security policies and biometrics; evaluation of protocols and obfuscation security; spam emails, botnets and malware.
9783319303031
10.1007/978-3-319-30303-1 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Coding theory.
Information theory.
Computer networks .
Biometric identification.
Cryptology.
Data and Information Security.
Coding and Information Theory.
Computer Communication Networks.
Biometrics.
QA268
005.824
RFID, sensors and secure computation -- Security policies and biometrics -- Evaluation of protocols and obfuscation security -- Spam emails, botnets and malware.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Foundations and Practice of Security, FPS 2015, held in Clermont-Ferrand, France, in October 2015. The 12 revised full papers presented together with 8 short papers and 2 keynote talks were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on RFID, sensors and secure computation; security policies and biometrics; evaluation of protocols and obfuscation security; spam emails, botnets and malware.
9783319303031
10.1007/978-3-319-30303-1 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Coding theory.
Information theory.
Computer networks .
Biometric identification.
Cryptology.
Data and Information Security.
Coding and Information Theory.
Computer Communication Networks.
Biometrics.
QA268
005.824