Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings

Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings

ISBN-10:
3319723588
ISBN-13:
9783319723587
Pub. Date:
01/13/2018
Publisher:
Springer International Publishing
ISBN-10:
3319723588
ISBN-13:
9783319723587
Pub. Date:
01/13/2018
Publisher:
Springer International Publishing
Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings

Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings

$109.99
Current price is , Original price is $109.99. You
$109.99 
  • SHIP THIS ITEM
    Not Eligible for Free Shipping
  • PICK UP IN STORE

    Your local store may have stock of this item.


Overview

This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017.
The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track.


Product Details

ISBN-13: 9783319723587
Publisher: Springer International Publishing
Publication date: 01/13/2018
Series: Lecture Notes in Computer Science , #10701
Edition description: 1st ed. 2017
Pages: 907
Product dimensions: 6.10(w) x 9.25(h) x (d)

Table of Contents

Blockchain.- Asymmetric encryption.- Symmetric encryption.- Lattice-based cryptography.- Searchable encryption.- Signature.- Authentication.- Cloud security.- Network security.- Cyber-physical security.- Social network and QR code security.- Software security and trusted computing.- SocialSec track.

From the B&N Reads Blog

Customer Reviews