Normal view MARC view ISBD view

Information Systems Security [electronic resource] : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti.

Contributor(s): Ray, Indrajit [editor.] | Gaur, Manoj Singh [editor.] | Conti, Mauro [editor.] | Sanghi, Dheeraj [editor.] | Kamakoti, V [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 10063Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Description: XV, 544 p. 134 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319498065.Subject(s): Computer science | Computer communication systems | Computer security | Data encryption (Computer science) | Algorithms | Management information systems | Computer Science | Systems and Data Security | Security | Data Encryption | Computer Communication Networks | Algorithm Analysis and Problem Complexity | Management of Computing and Information SystemsAdditional physical formats: Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security. .
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. .
    average rating: 0.0 (0 votes)
No physical items for this record

Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security. .

This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. .

There are no comments for this item.

Log in to your account to post a comment.