The 16 revised full papers presented together with 14 short papers were carefully reviewed and selected from 70 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: security of operating systems; secret sharing; encryption; malware and Critical infrastructures; cryptanalysis; block ciphers and stream ciphers; entity authentication; usability & risk perception; access control; computer security; privacy attacks; cryptography.
The 16 revised full papers presented together with 14 short papers were carefully reviewed and selected from 70 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: security of operating systems; secret sharing; encryption; malware and Critical infrastructures; cryptanalysis; block ciphers and stream ciphers; entity authentication; usability & risk perception; access control; computer security; privacy attacks; cryptography.
Information Security: 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings
418
Information Security: 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings
418Paperback(1st ed. 2015)
Product Details
| ISBN-13: | 9783319276588 |
|---|---|
| Publisher: | Springer International Publishing |
| Publication date: | 02/06/2016 |
| Series: | Lecture Notes in Computer Science , #7807 |
| Edition description: | 1st ed. 2015 |
| Pages: | 418 |
| Product dimensions: | 6.10(w) x 9.25(h) x (d) |