Information Systems Security, 1st ed. 2015 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings Security and Cryptology Series
Coordonnateurs : Jajoda Sushil, Mazumdar Chandan
This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015.
The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography.
Access control.- Attacks and mitigation.- Cloud security.- Crypto systems and protocols.- Information flow control.- Sensor networks and cognitive radio.- Watermarking and steganography.
Includes supplementary material: sn.pub/extras
Date de parution : 11-2015
Ouvrage de 584 p.
15.5x23.5 cm
Thèmes d’Information Systems Security :
Mots-clés :
Access control; Biometric; Cloud security; Cryptography; Watermarking; Anonymity; Bitcoins; Cryptanalysis; Cyber attacks; Denial of service attack; Digital watermarking; Electronic cash system; Information flow control; Internet of things; Protocols; Security; Sensor networks; Steganography; User privacy; Web security