9783319308395-3319308394-Information Security and Cryptology - ICISC 2015: 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers

Information Security and Cryptology - ICISC 2015: 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers

ISBN-13: 9783319308395
ISBN-10: 3319308394
Edition: 1st ed. 2016
Author: Soonhak Kwon, Aaram Yun
Publication date: 2016
Publisher: Springer
Format: Paperback 387 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9783319308395
ISBN-10: 3319308394
Edition: 1st ed. 2016
Author: Soonhak Kwon, Aaram Yun
Publication date: 2016
Publisher: Springer
Format: Paperback 387 pages

Summary

Information Security and Cryptology - ICISC 2015: 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers (ISBN-13: 9783319308395 and ISBN-10: 3319308394), written by authors Soonhak Kwon, Aaram Yun, was published by Springer in 2016. With an overall rating of 3.7 stars, it's a notable title among other books. You can easily purchase or rent Information Security and Cryptology - ICISC 2015: 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security and Cryptology, ICISC 2015, held in Seoul, South Korea, in November 2015.

The 23 revised full papers presented were carefully selected from 84 submissions during two rounds of reviewing and improvement. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are grouped around the following topics: digital signatures; public-key cryptography; block cipher cryptanalysis; elliptic curve cryptography; protocols; security; side-channel attacks.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book