Information Security Practice and Experience, 2015 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings Security and Cryptology Series
Coordonnateurs : Lopez Javier, Wu Yongdong
The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.
System Security.- Stream Cipher.- Analysis.- Key Exchange Protocol.- Elliptic Curve Cryptography.- Authentication.- Attribute-Based Encryption.- Mobile Security.- Theory.- Implementation.- Privacy and Indistinguishability.
Includes supplementary material: sn.pub/extras
Date de parution : 04-2015
Ouvrage de 576 p.
15.5x23.5 cm
Thème d’Information Security Practice and Experience :
Mots-clés :
Authentication; Authorization; Cloud computing; Database and storage security; Digital signature; Distributed computation; Encryption; Information security; Key management; Mathematical foundations of cryptography; Network security; Public key encryption; Reverse engineering; Security and privacy; Security in hardware; Security services; Side-channel analysis; Stream cyphers; Symmetric cryptography and hash functions; Systems security