Security, Privacy, and Applied Cryptography Engineering [electronic resource] : 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings / edited by Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth.
Contributor(s): Chakraborty, Rajat Subhra [editor.] | Schwabe, Peter [editor.] | Solworth, Jon [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 9354Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Edition: 1st ed. 2015.Description: XVIII, 373 p. 88 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319241265.Subject(s): Data protection | Computer networks | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Algorithms | Data and Information Security | Computer Communication Networks | Cryptology | IT Operations | AlgorithmsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, held in Jaipur, India, in October 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The book also contains 4 invited talks in full-paper length. The papers are devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering.No physical items for this record
This book constitutes the refereed proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, held in Jaipur, India, in October 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The book also contains 4 invited talks in full-paper length. The papers are devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering.
There are no comments for this item.