Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9476)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: CANS 2015.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015.
The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs.
Similar content being viewed by others
Keywords
Table of contents (18 papers)
-
Internet of Things and Privacy
-
Security Modeling and Verification
-
Secure Multi-party Computation
Other volumes
-
Cryptology and Network Security
Editors and Affiliations
Bibliographic Information
Book Title: Cryptology and Network Security
Book Subtitle: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings
Editors: Michael Reiter, David Naccache
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-26823-1
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-26822-4Published: 20 November 2015
eBook ISBN: 978-3-319-26823-1Published: 19 November 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 257
Number of Illustrations: 41 illustrations in colour
Topics: Cryptology, Systems and Data Security, Management of Computing and Information Systems, Computer Communication Networks