About these proceedings
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applications in the field of information security and cryptology.
Access control Applied cryptography Authentication Cryptography Digital signature Dual encryption system E-coin Elliptic curve cryptography Information security Network security Oblivious transfer One-time password Privacy protection Provably secure Secure applications Secure protocols Secure systems Security Security proofs Side-channel analysis
Springer International Publishing Switzerland 2015
Computer Science (R0)
Series Print ISSN
Series Online ISSN
Buy this book on publisher's site