Description
Information Security, 2014
17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings
Security and Cryptology Series
Coordinators: Chow Sherman S.M., Camenisch Jan, Hui Lucas C.K., Yiu Siu Ming
Language: EnglishSubjects for Information Security:
Keywords
access control; accountability; anonymity and pseudonymity; applied cryptography; authentication; biometrics; computer forensics; cryptographic protocols; data protection; data/system integrity; database security; digital right management; economics of security and privacy; electronic frauds; formal methods in security; identity management; information dissemination control; information hiding and watermarking; intrusion detection; network security
570 p. · 15.5x23.5 cm · Paperback
Description
/li>Contents
/li>
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.
Public-Key Encryption.- Authentication.- Symmetric Key Cryptography.- Zero-Knowledge Proofs and Arguments.- Outsourced and Multi-party Computations.- Implementation.- Information Leakage.- Firewall and Forensics.- Web Security.- Android Security.