Normal view MARC view ISBD view

Information Security Theory and Practice [electronic resource] : 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings / edited by Gerhard P. Hancke, Ernesto Damiani.

Contributor(s): Hancke, Gerhard P [editor.] | Damiani, Ernesto [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 10741Publisher: Cham : Springer International Publishing : Imprint: Springer, 2018Edition: 1st ed. 2018.Description: XII, 189 p. 56 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319935249.Subject(s): Data protection | Application software | Computers, Special purpose | Computer networks  | Cryptography | Data encryption (Computer science) | Data and Information Security | Computer and Information Systems Applications | Special Purpose and Application-Based Systems | Computer Communication Networks | CryptologyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.
    average rating: 0.0 (0 votes)
No physical items for this record

This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.

There are no comments for this item.

Log in to your account to post a comment.