Normal view MARC view ISBD view

Computer Security -- ESORICS 2015 [electronic resource] : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I / edited by G�unther Pernul, Peter Y A Ryan, Edgar Weippl.

Contributor(s): Pernul, G�unther [editor.] | Y A Ryan, Peter [editor.] | Weippl, Edgar [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 9326Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Description: XVIII, 543 p. 114 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319241746.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Algorithms | Computers and civilization | Management information systems | Computer Science | Systems and Data Security | Data Encryption | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Computers and SocietyAdditional physical formats: Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer eBooksSummary: The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.    .
    average rating: 0.0 (0 votes)
No physical items for this record

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.    .

There are no comments for this item.

Log in to your account to post a comment.